London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
Job Description Senior Information SecurityAnalyst Our Client is a leading global company specialising in pharma products. They are looking to recruit a Senior Information SecurityAnalyst with at least 5 to 7 years expertise in Technology Security. The Senior Information SecurityAnalyst is responsible for maintaining information security policies, architecture, technical standards … technical controls, security solutions, guidelines, procedures, and other elements necessary to maintain security posture. Responsible for assessing information risk and facilitating remediation of identified vulnerabilities & risks across the organization. Accountable for coordinating the execution of security measures to protect our computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information … SecurityAnalyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts More ❯
Job Description Senior Information SecurityAnalyst Our Client is a leading global company specialising in pharma products. They are looking to recruit a Senior Information SecurityAnalyst with at least 5 to 7 years of expertise in Technology Security. The Senior Information SecurityAnalyst is responsible for maintaining information security policies, architecture, technical … standards, controls, solutions, guidelines, procedures, and other elements necessary to maintain security posture. Responsible for assessing information risk and facilitating remediation of vulnerabilities and risks across the organization. Accountable for coordinating security measures to protect our computer infrastructure and information systems, ensuring an acceptable risk posture. The Senior Information SecurityAnalyst is highly engaged in risk … cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data leakage prevention, patching, encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address securityMore ❯
Join to apply for the Information SecurityAnalyst role at CooperVision Continue with Google Continue with Google Join to apply for the Information SecurityAnalyst role at CooperVision Get AI-powered advice on this job and more exclusive features. Direct message the job poster from CooperVision Job Description Job title: Information SecurityAnalyst Department … about their daily lives. We’re all about bright futures – for our people and those who wear our contact lenses. Job summary – What to expect: Join our Global Information Security Team as an Information SecurityAnalyst, where you'll play a key role in protecting our enterprise systems and data. You'll support daily security operations … investigate incidents, and implement technical controls to maintain a strong security posture. Working closely with senior analysts, engineers, and cross-functional teams, you'll help manage risk, evaluate vendor and third-party security, and contribute to policy development and compliance. This role also involves coordinating penetration testing, vulnerability scanning, and advising on secure configurations for a range of More ❯
Incident Response Lead Analyst - Cyber Security Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston Consulting Group (BCG) Incident Response Lead Analyst - Cyber Security 1 day ago Be among the first 25 applicants Join to apply for the Incident Response Lead Analyst - Cyber Security role at Boston … model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This … role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our More ❯
model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Position Overview As a Cyber Security Incident Response Manager at BCG, you will be a key member of our Cyber Security Incident Response Team (CSIRT), responsible for identifying, analyzing, and mitigating cyber threats. This … role requires a proactive approach to threat hunting, cyber threat intelligence, and incident response, ensuring the protection of BCG’s global network. You will work closely with the Security Operations Center (SOC), Security Information and Event Management (SIEM), and Managed Security Service Provider (MSSP) to enhance detection and response capabilities. Your expertise will contribute to strengthening our … security posture and minimizing business risks associated with cyber threats. What Will You Do? Act as a Tier 3 Incident Responder, supporting complex investigations into cyber security incidents. Conduct proactive threat hunting to detect and neutralize emerging threats. Monitor and analyze logs via SIEM, EDR, and network traffic analysis tools for potential attack indicators. Investigate security incidents More ❯
message the job poster from Tiger Resourcing Group Principal Staff Advisor - ITS/Mobility, Smart Ticketing, Tolling and Fare Collection sector Global Executive Search - North America & EMEA Senior Information SecurityAnalyst Are you an experienced information security professional looking to take the next step in a forward-thinking and collaborative team? We’re searching for a Senior … Information SecurityAnalyst to support the continued development of a robust security programme across cloud-based IT services and managed environments (particularly Microsoft 365 and Azure). This role spans security operations, governance, risk, and assurance , and will suit someone with a blend of hands-on technical skills and strategic thinking. What You'll Be Doing … Support and improve day-to-day security operations, incident response, and vulnerability management. Lead on security investigations and ensure remediation is aligned with industry best practices. Conduct risk assessments and provide security consultancy for technical projects and service design. Help maintain ISMS policies and ensure regulatory compliance (e.g. PCI-DSS, GDPR, FCA). Play a key role More ❯
London, England, United Kingdom Hybrid / WFH Options
Thomas Miller
Join to apply for the Cyber SecurityAnalyst role at Thomas Miller Join to apply for the Cyber SecurityAnalyst role at Thomas Miller Direct message the job poster from Thomas Miller Working Arrangements: Monday to Friday 9.30am-5.30pm Hybrid work pattern Overall Objective of Role: The Cyber Security Operations Team is a critical component … of the Thomas Miller security infrastructure, responsible for monitoring, detecting, and responding to security threats in real time. The team partner with a 3rd party to ensure constant vigilance over the security landscape. The Cyber SecurityAnalyst detects, analyses, investigates and responds to alerts and threats within the environment. Specific Responsibilities: Monitor security alerts … events, and potential threats using SOC tools. Respond to and investigate cyber security incidents, including malware outbreaks, phishing attempts and data breaches. Perform incident response, including triaging, investigation, and resolution of security incidents. Analyse network traffic, logs, and alerts to detect malicious activity. Conduct root-cause analysis on security breaches and vulnerabilities. Prepare and maintain detailed incident More ❯
London, England, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
As a Senior Cyber SecurityAnalyst , you will play a critical role in strengthening Thames Water's digital defenses by maintaining and optimizing security operations tools and processes. You'll focus on monitoring, analyzing, and responding to cyber threats, while supporting the SOC team and ensuring effective incident management across the business. Your role will involve collaborating … with technology and business stakeholders, investigating security alerts, enhancing tooling performance, and supporting the delivery of continuous improvement and risk reduction initiatives. You'll also contribute to readiness for significant incidents and play a key role in proactive threat hunting and compliance reporting. What you'll be doing as a Senior Cyber SecurityAnalyst: Security Incident … Response : Investigate security alerts from SIEM and third-party MSSPs, triage and respond to incidents, and support root cause analysis to drive remediation. Stakeholder Engagement : Work closely with technology and business teams to communicate cyber risks, recommend actions, and ensure proportionate implementation of controls. Tool Performance & Optimisation : Monitor and enhance the performance of SecOps tools such as Microsoft Sentinel More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
Information SecurityAnalyst - Audit, Compliance & Cybersecurity United Kingdom - Southampton At NICE, we don't limit our challenges. We challenge our limits. Always. We're ambitious. We're game changers. And we play to win. We set the highest standards and execute beyond them. And if you're like us, we can offer you the ultimate career opportunity that … if you're like us, we can offer you the ultimate career opportunity that will light a fire within you. So, what's the role all about? The Information SecurityAnalyst is primarily responsible for ensuring compliance with information security frameworks such as Cyber Essentials, Cyber Essentials Plus, ISO 27001, ISO 27701, ISO 42001, GDPR, and DORA. … reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as Rapid7 InsightIDR or other SIEM solutions to assist with security monitoring and incident detection. Incident Response Support: Participate in incident response efforts, documenting More ❯
Hedge End, England, United Kingdom Hybrid / WFH Options
NICE
if you're like us, we can offer you the ultimate career opportunity that will light a fire within you. So, what's the role all about? The Information SecurityAnalyst is primarily responsible for ensuring compliance with information security frameworks such as Cyber Essentials, Cyber Essentials Plus, ISO 27001, ISO 27701, ISO 42001, GDPR, and DORA. … reports and present findings to management during status updates and closing meetings. External Audit Coordination: Collaborate with external audit teams to streamline processes and provide requested documentation and evidence. Security Monitoring: Use tools such as Rapid7 InsightIDR or other SIEM solutions to assist with security monitoring and incident detection. Incident Response Support: Participate in incident response efforts, documenting … security incidents and assisting in containment and recovery actions. Threat Identification: Contribute to analyzing cybersecurity threats and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. Vulnerability Management: Support the tracking and remediation of vulnerabilities in coordination with IT More ❯
for, it’s something to build. We don’t just invest, we create. Bringing together strategic insight and technical horsepower to deliver outcomes that endure. The Position The IT Security team is responsible for the oversight and execution of a “cloud-first” Cyber Defense, Business Continuity and Risk Management programs to support our business goals. This includes, but is … not limited to security operations, vulnerability and patch management, incident response, disaster recovery, business continuity, risk identification and mitigation planning/implementation, identity management, network security, privacy, and compliance. In the Cyber Defense SecurityAnalyst role, you will be working to help build and maintain security programs at a rapidly growing investment company as well … project member on multiple projects simultaneously and will interact regularly with technical subject matter experts. The ideal candidate will hold a Bachelor of Science degree in Information/Cyber Security or applicable field and have at least 3+ years of experience in a Security or Technology role. The candidate must possess a strong understanding of the role of More ❯
for, it’s something to build. We don’t just invest, we create. Bringing together strategic insight and technical horsepower to deliver outcomes that endure. The Position The IT Security team is responsible for the oversight and execution of a “cloud-first” Cyber Defense, Business Continuity and Risk Management programs to support our business goals. This includes, but is … not limited to security operations, vulnerability and patch management, incident response, disaster recovery, business continuity, risk identification and mitigation planning/implementation, identity management, network security, privacy, and compliance. In the Cyber Defense SecurityAnalyst role, you will be working to help build and maintain security programs at a rapidly growing investment company as well … project member on multiple projects simultaneously and will interact regularly with technical subject matter experts. The ideal candidate will hold a Bachelor of Science degree in Information/Cyber Security or applicable field and have at least 3+ years of experience in a Security or Technology role. The candidate must possess a strong understanding of the role of More ❯
You will need to login before you can apply for a job. Senior Information SecurityAnalyst Runa is pioneering a first-of-its-kind payment rail that enables the seamless, global money movement at scale. Legacy banking and payment infrastructure struggles to support the demands of today's low-volume, high-velocity payouts, leading to inefficiencies in global … such as Sodexo, TopCashback, Perkbox, Sweatcoin, Coinbase, and Globetopper rely on Runa to facilitate instant, flexible global payouts to tens of millions of consumers. The Role The Senior Information SecurityAnalyst ensures security controls, policies, and processes are embedded across the organisation. You will enhance cybersecurity by implementing strategies, analysing breaches, and ensuring compliance. This role is … key in guiding engineering teams on application security and integrating security best practices across our technology stack. What Excites You Help build world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, lead external penetration testing, and risk analysis to identify weaknesses in applications, systems, and More ❯
Permanent Job Description Cyber SecurityAnalyst In this role as a Cyber SecurityAnalyst, you'll be instrumental in safeguarding digital assets, ensuring data confidentiality, and maintaining system integrity. You'll work within a team to monitor, analyze, and respond to security incidents while implementing critical security measures to defend against cyber threats. …/7 Virtual GP access for you and your household Onsite perks including free parking, tea and coffee stations, and a subsidized café with free breakfast toast Responsibilities Security Monitoring & Incident Response: Use SIEM tools like Exabeam, LogRhythm, Splunk, or Arcsight to monitor security events, detect threats, and analyze data to address incidents swiftly. Vulnerability Management Tools: Conduct … regular vulnerability assessments, prioritize and remediate issues, and stay updated on emerging threats. Policy & Compliance Support: Help develop and enforce security policies and procedures to maintain compliance. Security Awareness Training: Assist with employee training on security practices and run phishing tests to build a security-conscious workplace culture. Ideal Experience Degree in computer science, information securityMore ❯
Job Description Job Title: Information SecurityAnalyst Location: Nottingham Contract: Perm Recruiter: Noaman Hussain About the role We are looking for an experienced and proactive Information SecurityAnalyst to join our growing IT2A InfoSec team. You will serve as a critical liaison between Information Security and internal business units, ensuring the implementation of security strategies and the management of information security risks across the organisation. Reporting to the Senior Manager, the SecurityAnalyst will join the Project Advisory team. Key responsibilities Provide high quality security advice to mitigate identified risks and ensure compliance with internal standards and industry best practices. Guide the implementation and operation of physical, procedural, and … technical security controls. Conduct security risk assessments, NFR reviews and business impact analyses for complex systems Identify risks in proposed technical architectures and design alternative solutions or countermeasures. Contribute to the development and continuous improvement of security policies, standards, and guidelines along with internal processes Implement and document new or enhanced security controls and system/ More ❯
Role Responsibilities Key responsibilities for this role may include: Incident Detection & Response: Lead the triage, investigation, and classification of security events using SIEM and other tooling Take ownership of end-to-end handling of medium to high-severity incidents, coordinating containment and remediation efforts Maintain detailed incident records, including timelines, impact assessments, root cause analysis, and mitigation steps Act … indicators of compromise and attribution patterns Lead threat intelligence sharing within the organisation and with external partners Mentor Tier 1 staff in interpreting threat data and logs during investigations Security Monitoring and Detection Engineering: Conduct continuous security monitoring of network traffic, endpoints, and critical systems Proactively tune and improve SIEM rules, alerts, and correlation logic to reduce false … sources into SIEM and help define parsing, enrichment, and correlation logic Lead investigations into recurring false positives or noisy alerts and propose sustainable resolutions Support deployment and configuration of security tooling Compliance, Reporting and Documentation: Lead security audits and assessments, providing evidence of SOC activities and controls Maintain accurate records of all events handled, including triage notes and More ❯
Job Title: Cyber Security Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged Access Management (PAM) or Identity & Access Management (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM … principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention to detail. Excellent communication and collaboration skills. Desirable: Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD pipelines and DevSecOps practices. … Experience with Cloud security testing (AWS, Azure, or Google Cloud). Certifications such as ISTQB, CISSP, CISM, or CyberArk Defender are a plus. Knowledge of security compliance standards (e.g., ISO 27001, GDPR, NIST, PCI-DSS). Kind Regards -- Priyanka Sharma Senior Delivery Consultant Office: 02033759240 Email: psharma@vallumassociates.com More ❯
skills and experience — discuss with your recruiter for more details. Base Pay Range Direct message the job poster from Maxwell Bond Head of Practice @ Maxwell Bond - Information/Cyber Security, IT Infrastructure & Cloud GRC/Governance/Risk/Compliance/Information Security/Infosec/ISO Senior Information SecurityAnalyst (FTC 12 months) Location: Liverpool … Central) We are working with a growing organization seeking a Senior Information SecurityAnalyst for a 12-month fixed-term contract. Based in Liverpool, this hybrid role combines governance, risk & compliance with hands-on technical security work. Key Responsibilities: Serve as a trusted advisor across the organization, identifying and mitigating information security risks. Develop and maintain … security frameworks, policies, and procedures aligned with industry standards and regulations. Lead third-party risk assessments and security audits. Collaborate with technical teams on vulnerability management and remediation. Contribute to the secure design and architecture of new systems. Monitor and improve security tools and incident response processes. Promote security awareness and education throughout the organization. Represent More ❯
London, England, United Kingdom Hybrid / WFH Options
Techwaka
Job Title: SecurityAnalyst Location: Remote Job Summary: We are seeking a skilled and experienced SecurityAnalyst to join our team. The ideal candidate will have a strong background in vulnerability management and experience working with Security Information and Event Management (SIEM) tools such as Microsoft Sentinel. You will play a critical role in ensuring … the security of our cloud environments, infrastructure, and business units by identifying, analyzing, and addressing vulnerabilities and threats. Key Responsibilities: Vulnerability Management: Develop, implement, and operate vulnerability management capabilities using tools like Tenable One. Deploy, configure, and manage vulnerability assessment tools (e.g., Tenable, NCSC's Active Cyber Defence Toolkit) and Attack Surface Management tools. Deliver a seamless vulnerability management … service across infrastructure and business units, ensuring the effectiveness of security measures. Threat Analysis: Utilize various sources of information to identify, analyze, and report on relevant threats and vulnerabilities. Continuously monitor and assess the threat landscape to adjust security measures accordingly. SIEM and EDR: Implement and manage SIEM tools such as Microsoft Sentinel to monitor and respond to More ❯
Access Management (PAM) or Identity & Access Management (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM principles, privileged account security, and least privilege access. Hands-on experience with API testing tools (e.g., Postman, SoapUI). Proficiency in test management tools such as JIRA Strong problem-solving skills and attention … to detail. Excellent communication and collaboration skills. Experience working within an Agile (Scrum/Kanban) environment. Knowledge of CI/CD pipelines and DevSecOps practices. Experience with Cloud security testing (AWS, Azure, or Google Cloud). Certifications such as ISTQB, CISSP, CISM, or CyberArk Defender are a plus. Knowledge of security compliance standards (e.g., ISO 27001, GDPR, NIST … PCI-DSS). Kind Regards -- Senior Delivery Consultant Office: 02033759240 Email: psharma@vallumassociates.com Seniority level Seniority level Mid-Senior level Employment type Employment type Contract Job function Job function Analyst Industries Banking Referrals increase your chances of interviewing at Vallum Associates by 2x Get notified about new Cyber SecurityAnalyst jobs in Sheffield, England, United Kingdom . More ❯
Senior Information Security GRC Analyst Senior Information Security GRC Analyst Locations: London, United Kingdom; Manassas, United States Posted on: 4 Days Ago ABOUT US We're the world's leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves value - across borders, through cities and overseas. No other organisation … relevant. Swift now has a presence in 200+ countries and legal territories to serve a community of more than 12,000 banks and financial institutions. Are you passionate about security Governance, Risk and Compliance (GRC)? Do you thrive in a dynamic environment where your experience and your security expertise can shape the future of our organization? We are … looking for a GRC Specialist like you to join our growing Information Security Governance team. In this role, you will: Develop and implement robust GRC frameworks to ensure compliance with increasingly stringent industry regulations and standards. Lead the reporting and presentation of our GRC activities to internal and external stakeholders, ensuring transparency and accountability. Collaborate with cross-functional securityMore ❯
colleagues. We've achieved big things already, but we're just getting started. This is where you come in... Job Description An opportunity has arisen for a Senior Cyber SecurityAnalyst , to become part of the Radius Cyber Security Team. This is an excellent opportunity for a seasoned professional to contribute to a high-performing Cyber Team … of Cyber and will be located at our Emperor Court office in Crewe . This role is crucial to strengthening the organisation's cyber resilience. As a Senior Cyber SecurityAnalyst, you will play a key role in protecting systems, networks, and data against cyber threats. You will lead threat detection and incident response efforts, support the development … of security policies and controls, and work closely with stakeholders to ensure compliance and security best practice across the business. You will also assist with maintaining and improving the company's accredited Information Security Management System (ISMS), with a particular focus on ISO 27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members More ❯
of ambition, the success of our business is delivered through the diverse and talented team of over 2,200 global colleagues. Purpose of the job As a Group Information SecurityAnalyst, you will support the Group Information SecurityTeam to: Maintain the Collinson Group Information Security Management System and Certification ofthis against ISO27001. Monitor operating company compliance with … Group Protection Level Agreements. Gain assurance operating companies are meeting material client and regulatory security requirements. Ensure operating companies maintain and can demonstrate an information security posturewhich adequately meets the expectations of the markets they operate in. Define, design and deliver strategic Collinson Group information security programmes to efficiently reduce risk and protect Group interests in line … with commercial objectives. Minimise the impact on information security incidents on Collinson’s operations and profitability by ensuring we can detect, respond and contain incidents efficiently and promptly. Reduce likelihood and impact of information security incidents by proactively identifying potential vulnerabilities and implementing safeguards and controls. Key Responsibilities Information Security Posture · Demonstrating security tooling, creation of More ❯
Description SBV seeks an Information SecurityAnalyst L2 who will conduct all activities related to technology risks and remediations to protect the SBV ecosystem from potential threats including partnering with SBV Employees and vendors to drive a Cyber security conscious organisation. Support Technology Transformation & Innovation in your area of responsibility Support with developing and maintaining Cyber Security Road Map and interventions Support with developing company-wide best practices for Technology security Support improving the maturity, or efficiency, of the Cyber Security team, by identifying innovative, problem-solving solutions. Create and maintain appropriate standard operating procedures for the Cyber Security and information protection. Support on Analysis & Planning Activities Identify, respond, predict and analyse security breaches and threats to determine their root cause and report findings to relevant stakeholders on cyber-security threats, attacks, incidents, and other factors that indicate security risks as per SLA. Researching, investigating and developing proficiency in current and emerging threats, vulnerabilities, and security technology developments. Play an active role in Technology Security Planning sessions, driving More ❯
Social network you want to login/join with: Division Description: The Cyber Security operation's function is responsible for the day-to-day provision of enterprise cyber security services to support the business. These services include all aspects of Cyber Risk Management, implementation and maintenance of technical security controls, vulnerability and patch management and operate effective … it to confidently go about its day-to-day activity. Position Description: The purpose of this role is to design new, mature existing and support the operation of cyber security controls and processes within Insight Investment in line with cyber security risks and the cyber security policies and standards. This includes Identity & Access Management (IAM), PAM security monitoring, cloud security, scheduled security checks, security monitoring working with the MSSP (SIEM and other), security incident management, pen-testing. vulnerability management and KRI/KPI reporting. Role Responsibilities • Developing a familiarity with new tools and best practices for security operations • Defining, implementing and maintaining operational security processes • Reviewing and maturing the Identity More ❯