East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … with external parties. You will stand out if you bring Bachelors degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … external parties. You will stand out if you bring Bachelor's degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
should also have a proven experience and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital … and IAST tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
IPS, micro-segmentation, and host security. Hands on experience with the following security products Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT and Cookie based authentication. Incident detection and response in MOD environments. Security compliance and regulatory More ❯
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
Bolton, Lancashire, England, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
eg. EDR, AV, incident response, forensics, SIEM, firewall, HIPS/IDS, etc. Knowledge of malware, threat intelligence, and/or sandbox analysis. Certifications such as CISSP, CEH,OSCP, and SANS also a plus About Dataminr At Dataminr, we are a mission driven team of talented builders, creators and visionaries who have real-world impact on how organizations are able More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Damco Spain SL
essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go More ❯
software and development Proficiency in securing cloud technologies Proficiency in reading, writing, and auditing code and the ability to learn new languages/technologies. Experience with OWASP Top10 or SANS Top 25 Experience breaking down complex systems and applications to identify threats. Excellent ability to communicate, verbally and in writing, complicated technical issues and the risks they pose to More ❯