for AI-powered tools and GenAI applications. You'll work in a greenfield, lab-first environment to prototype, iterate, and deploy solutions that meet the highest standards of performance, security, and compliance in a regulated financial setting. Accountabilities & Responsibilities Design and develop modern, responsive front-end applications from the ground up using React, TypeScript, and Next.js. Build secure, performant … user interfaces that integrate with LLM APIs (e.g., Gemini, Azure OpenAI) and internal systems. Implement advanced front-end security features including token handling, session management, data masking, and audit logging. Translate UX/UI designs into modular, reusable components aligned with enterprise design systems. Integrate front-end applications with REST/GraphQL APIs, WebSockets, and backend services. Collaborate with … data privacy standards through secure coding practices and regular code reviews. Deploy applications to GCP (Firebase, Cloud Run) and Azure App Services using CI/CD pipelines hardened for security and compliance. Participate in code reviews, technical design discussions, and architecture planning sessions. Required Knowledge, Skills & Experience Proven experience building secure, production-grade front-end applications in regulated environments More ❯
Telford, Shropshire, West Midlands, United Kingdom Hybrid / WFH Options
TALENT LEADERS LTD
Strategy that aligns to the overall executive business strategy moving forward Around their4 Strategic Key Pillarsof: 1. Digital Access & Trust 2. Data & Insight 3. Core Systems & Technology 4. Governance & Security This spans the current technical environment to include - Infrastructure, Cloud, Security, Project, Data, BI and Product As well as ways of working people structure and future proofing the … for how digital experiences work & drive the development of digital services that significantly enhance the experience of both customers & colleagues. Cybersecurity & Risk Management -Maintain and strengthen a robust cyber securityposture, ensuring the organisation remains resilient in the face of evolving threats Leadership & Culture Build and develop high performing teams Financial Stewardship Ownership & full budgetary responsibility You are … transformation & delivery focus Demonstrable success in leading enterprise-wide change programmes and PMO functions. Strong understanding of data strategy, analytics platforms, and digital enablement. Expertise in cloud infrastructure, cyber security, and enterprise systems. Excellent stakeholder engagement and communication skills, with the ability to influence at Board and Executive level. Track record of building high-performing teams and leading through More ❯
emerging technologies and develop business cases for their integration. Coach and develop infrastructure, networking, and telecom teams. Set clear objectives and performance goals for teams, addressing performance issues. Ensure security by design and maintain high securityposture through processes and behaviors. Maintain Business Continuity and Disaster Recovery Plans. Promote continuous improvement and communicate benefits to stakeholders. Liaise … with NPL for synergies and shared services. Essential Skills and Experience Broad understanding of enterprise architectures in high-security environments. Knowledge of 4G, 5G, and fixed/mobile networks (desirable). Systematic approach to architecture design, including "as is" and "to be" states. Experience with virtualization, containerization, and IP network design. Understanding of testing processes and quality assurance. Experience … to foster high performance. Additional Information Applicants will be reviewed throughout the posting period, and interviews may be conducted at any time. We encourage early applications. Note: Due to security requirements, candidates must have or be able to obtain SC clearance. More ❯
for AI-powered tools and GenAI applications. Working in a greenfield, lab-first environment, you will prototype, iterate, and deploy solutions that adhere to the highest standards of performance, security, and compliance in a regulated financial setting. Key Responsibilities: Design and develop modern, responsive front-end applications from the ground up using React, TypeScript, and Next.js. Build secure, performant … user interfaces that integrate with LLM APIs (e.g., Gemini, Azure OpenAI) and internal systems. Implement advanced front-end security features, including token handling, session management, data masking, and audit logging. Translate UX/UI designs into modular, reusable components aligned with enterprise design systems. Integrate front-end applications with REST/GraphQL APIs, WebSockets, and backend services. Collaborate closely … data privacy standards through secure coding practises and regular code reviews. Deploy applications to GCP (Firebase, Cloud Run) and Azure App Services using CI/CD pipelines hardened for security and compliance. Participate in code reviews, technical design discussions, and architecture planning sessions. Required Skills & Experience: Proven experience building secure, production-grade front-end applications in regulated environments (e.g. More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
IBEX RECRUITMENT LTD
Familiarity with SOC tooling (Sentinel, Defender, QRadar, Cortex XDR, etc.) Knowledge of threat frameworks like MITRE ATT&CK and NIST Self-starter who can work independently in a lean security function Comfortable driving change and making meaningful improvements in securityposture Why Apply? Youll join at a time where you can make a real difference, taking ownership More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
and governance. Key Responsibilities Provide third-line support for IAM systems across hybrid cloud environments. Lead on the technical design and implementation of identity solutions. Monitor, identify, and resolve security risks and operational incidents. Improve the organisation's securityposture through configuration of Microsoft Secure Score, Conditional Access, and PIM. Manage and migrate single sign-on (SSO More ❯
working with a key client on a Network Analyst requirement. We’re looking for someone to play a pivotal role in delivering a network segmentation programme focused on improving securityposture and preventing lateral movement. Essential Proven experience implementing network segmentation strategies Strong understanding of lateral movement risks and mitigation techniques Skilled in mapping data flows across complex More ❯
working with a key client on a Network Analyst requirement. We’re looking for someone to play a pivotal role in delivering a network segmentation programme focused on improving securityposture and preventing lateral movement. Essential Proven experience implementing network segmentation strategies Strong understanding of lateral movement risks and mitigation techniques Skilled in mapping data flows across complex More ❯
The High Barn, Pinner Hill Farm, Pinner Hill Road, Pinner, England
DAMIRA DENTAL STUDIOS LIMITED
may be necessary – providing feedback on behalf of the business as required. Projects Under the direction of the Central Operations Manager, administer development projects contributing to IT infrastructure, cyber securityposture and process automation. Assist in the delivery of wider projects and programmes of work as when required. Communication and Relationships: Act as the first point of business More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
and enterprise tools like Kendo UI. You’ll guide architecture decisions, review code, and ensure robust CI/CD pipelines using tools like GitLab, Jenkins, Azure DevOps. Experience in security-sensitive environments or delivering to regulated financial institutions is a plus.Key Responsibilities:Mentor developers and lead technical reviews to ensure code quality and consistency.Own and evolve technical architecture and … engineering operating models.Drive on-time delivery aligned with quarterly release cycles.Collaborate with Product, Delivery, and Sales to align tech execution with business goals.Champion engineering standards, securityposture, and audit readiness.Support career development, succession planning, and team growth.This is a hybrid role based in Basingstoke, offering the opportunity to influence engineering culture, mentor senior developers, and evolve into a More ❯
City of London, London, United Kingdom Hybrid / WFH Options
DGH Recruitment
Senior Cyber Security Engineer Hybrid working policy: 3 days per week required in the office in London. The role will be responsible for developing, implementing, and maintaining security solutions that protect systems from ever-evolving cyber threats moving towards a zero-trust operating model. The role will serve as the technical lead, drive key security initiatives, play … a pivotal role in mentoring junior team members and increasing overall security posture. Core responsibilities: - Overall management and maintenance of the CrowdStrike platform, including configuring EDR policies, tuning SIEM rules, and optimizing the system for performance - Leading or participating in incident response efforts, conducting root cause analysis, and developing runbooks for incident handling - Monitoring for security threats, analysing … alerts, and responding to incidents using CrowdStrike and other security tools. Conduct vulnerability scans and support remediation and risk mitigation efforts - Oversee WAF, DDoS, VPN, and perimeter firewalls - Manage Email and Web Security Gateways - Work with Endpoint team to administer MFA, SSO, PAM, MDM/MAM, and Conditional Access - Maintain security certificates, encryption keys, and IDS/ More ❯
dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall, VPN Gateway, etc.). Integrate M365 security features (Defender for Office 365, Conditional Access … Entra. Consulting & Advisory: Provide expert guidance to clients on cybersecurity best practices, compliance (e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloud security postures. Deliver workshops and training sessions on M365 and Azure security capabilities. Incident Response & Monitoring: Collaborate with SOC teams to monitor and respond to network-based threats. Utilize … for Cloud to detect and remediate vulnerabilities. Develop playbooks and automation for threat response. Required Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 security and compliance features. Hands-on experience with Azure networking and security services. Familiarity with SIEM tools, especially Microsoft Sentinel. Understanding of identity and access management (IAM), MFA, and More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall, VPN Gateway, etc.). Integrate M365 security features (Defender for Office 365, Conditional Access … Entra. Consulting & Advisory: Provide expert guidance to clients on cybersecurity best practices, compliance (e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloud security postures. Deliver workshops and training sessions on M365 and Azure security capabilities. Incident Response & Monitoring: Collaborate with SOC teams to monitor and respond to network-based threats. Utilize … for Cloud to detect and remediate vulnerabilities. Develop playbooks and automation for threat response. Required Skills & Experience: Proven experience in networking and cybersecurity consulting. Strong knowledge of Microsoft 365 security and compliance features. Hands-on experience with Azure networking and security services. Familiarity with SIEM tools, especially Microsoft Sentinel. Understanding of identity and access management (IAM), MFA, and More ❯
Cyber Security - Secure by Design Consultant (Contract) London | £680 per day | 6-month initial contract (with strong potential to go permanent) Deerfoot Recruitment is working with a leading financial services organisation to recruit a Secure by Design Consultant to join their IT Risk, Security & Control function in London. This is a 6-month contract paying £680 per day … high likelihood of converting to a permanent role. The successful candidate will play a key role in delivering secure-by-design assessments across technology projects, ensuring compliance with IT security policies and industry standards. You will work closely with senior stakeholders, providing assurance on cybersecurity controls, identifying risks, and recommending actions to strengthen the organisation's security posture. … Key responsibilities include: Conducting IT security assessments across infrastructure, cloud, applications, and service operations projects. Reviewing and testing security controls to ensure operating effectiveness. Documenting risks, gaps, and recommendations for remediation. Supporting project teams to embed security requirements from the outset. Engaging with senior stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT More ❯
Cyber Security - Secure by Design Consultant (Contract) London | £680 per day | 6-month initial contract (with strong potential to go permanent) Deerfoot Recruitment is working with a leading financial services organisation to recruit a Secure by Design Consultant to join their IT Risk, Security & Control function in London. This is a 6-month contract paying £680 per day … high likelihood of converting to a permanent role. The successful candidate will play a key role in delivering secure-by-design assessments across technology projects, ensuring compliance with IT security policies and industry standards. You will work closely with senior stakeholders, providing assurance on cybersecurity controls, identifying risks, and recommending actions to strengthen the organisation's security posture. … Key responsibilities include: Conducting IT security assessments across infrastructure, cloud, applications, and service operations projects. Reviewing and testing security controls to ensure operating effectiveness. Documenting risks, gaps, and recommendations for remediation. Supporting project teams to embed security requirements from the outset. Engaging with senior stakeholders and providing clear, actionable reporting. Skills & experience sought: Strong background in IT More ❯
Design and implement PostgreSQL schemas, migrations, and triggers; ensure data integrity and performance. Integrate with Identity and Access Management (IdAM) systems. Ensure secure coding practices and compliance with platform security posture. Collaborate with UX, QA, and DevSecOps teams to deliver accessible, performant, and maintainable features. Monitor and troubleshoot applications Contribute to design discussions, code reviews, and maintain documentation in More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
A leading Fintech/Payments company is looking for a proactive and technically skilled Application Security Engineer/DevSecOps to champion secure development practices across our software delivery lifecycle. In this role, youll play a key part in identifying and reducing application-layer risks, integrating security into the development pipeline, and ensuring that security considerations are embedded … throughout the SDLC. Working closely with engineering and platform teams, youll help automate security processes, lead threat modelling exercises, and continually improve the organisations application security posture. Key Responsibilities Secure Development Lifecycle (SDLC) Experience working with static and dynamic code analysis tools (SAST, DAST) is essentialwhile you dont need to have set them up, you should have collaborated … with developers to ensure code is scanned and critical vulnerabilities are blocked in the pipeline. Integrate security controls into CI/CD pipelines and development workflows. Manage and monitor SAST, DAST, and SCA tools to detect vulnerabilities early in the lifecycle. Conduct secure code reviews and support remediation efforts. Threat Modelling & Architecture Review Requirements (Primarily Essential) 2+ years of More ❯
to choose the optimal virtual desktop, secure browser, or application streaming service for your specific needs, enabling workers to be productive from any supported device, while maintaining a strong securityposture, improving agility, and reducing cost. This is a unique opportunity to be part of rapidly growing business that promises to be unique in the web services arena. More ❯
Outpost24 is hiring a Cyber Security Consultant to join our growing team in the London, Amsterdam, or Leuven! In this role, you will play a vital part in supporting and enhancing the delivery of our services to customers worldwide. We're seeking a professional with strong communication and organizational skills, combined with a hands-on approach to client issue … for our expanding global customer base. If you're ready to make an impact and grow your career in a fast-paced cybersecurity environment, keep reading! As a Cyber Security Consultant your key responsibilities will include: Customer Engagement : Engaging with customers through advisory sessions, acting as their trusted security expert. Threat Landscape Analysis : Providing insights on the evolving … threat landscape and recommending tailored solutions. Solution Design and Recommendation : Assess customers' current security frameworks and provide actionable insights for improvement. You will suggest appropriate tools, technologies, and methodologies to strengthen their security posture. Collaboration and Communication : Collaborating with internal teams to address customer needs and communicate technical concepts clearly to both technical and non-technical stakeholders. Compliance More ❯
Job Title: WAF & Application Security SME Location: Remote - UK Contract: 6 months extendable contract About the Role A leading banking client is looking for a WAF & Application Security SME to strengthen its web security posture. The role focuses on improving Web Application Firewall (WAF) effectiveness, tuning configurations, and protecting applications from web-based threats. You will work … closely with security, DevOps, and application teams to ensure WAF solutions are properly designed, tested, and maintained. Key Responsibilities Design and implement custom WAF rules to close security gaps. Test and validate WAF policies, integrating them into CI/CD pipelines. Tune WAF rules by analysing logs, identifying false positives, and making adjustments. Support Proof of Concepts (PoCs … on web and API attack techniques and mitigations. Collaborate with DevSecOps teams on automation and pipeline integration. Maintain clear documentation of WAF rules, procedures, and configurations. Monitor emerging web security threats and recommend improvements. Conduct regular reviews and audits of WAF configurations. Ideal Candidate Strong experience in WAF management, tuning, and engineering. Background in SOC, CSIRT, Application SecurityMore ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Crimson
Head of IT Security Incident and Threat Management - Solihull Crimson and IMI have joined forces to build IMI's new security team, and we are looking for talented individuals to join us on this exciting journey. If you are passionate about IT security and want to be part of a dynamic team that is shaping the future … of security within a successful global company, we want to hear from you! We are seeking a highly skilled and experienced Head of IT Security Incident and Threat Management to join our team. In this role, you will be responsible for leading the strategic efforts to safeguard the company's digital assets against potential threats and incidents. This … note this role is based on site for the first 3 months followed by a hybrid working arrangement. Key Responsibilities Develop and implement comprehensive incident response strategies to address security threats swiftly and effectively Lead the threat and intelligence program, ensuring timely detection and mitigation of cyber risks. Ensure compliance with relevant security standards and regulations. Conduct regular More ❯
and application packaging. Your key responsibilities will include maintaining and enhancing the endpoint estate through proactive maintenance and continuous improvement, reacting to incidents and changes, and bolstering our cyber security posture. The role also involves working collaboratively across the local and global IT estate, engaging with internal end users and external partners. Key Responsibilities: Implementation, administration, configuration and maintenance … point platforms Maintaining the endpoint inventory and relevant CMDB entries Producing regular management reports and telemetry on the health of the endpoint estate Packaging, testing, and applying patches and security updates for Operating Systems Desktop deployment automation architecture, SCCM/Intune hierarchy, and troubleshooting Creating, testing, and deployment of OS images using MS Autopilot Packaging, deployment, and configuration of … approved software Software asset management: licence compliance and harvesting Support for Cyber Security colleagues, embracing the DevSecOps culture Providing technical expertise, guidance, and strategic recommendations to other IT groups Developing and promoting standard operating procedures and schedules Conducting hardware and software audits to ensure compliance General IT support (L2) as needed Job Requirements: Working knowledge of enterprise IT environments More ❯
Location : London (Hybrid, 23 days in office) | Rate : Market About the Role Our client, a leading global organization, is looking for a skilled Internal Pentester to join a leading security team in London. This contract role is perfect for someone experienced in penetration testing across networks, systems, web applications, APIs, and cloud environments, who can identify vulnerabilities, simulate attacks … and deliver actionable remediation advice. Youll work in a compliance-driven, high-security environment, collaborating with cross-functional teams to strengthen the organizations security posture. What Youll Do Conduct full-scope penetration tests on applications, APIs, internal infrastructure, networks, and cloud environments (AWS, Azure, GCP). Identify and exploit security flaws: insecure authentication, authorization bypass, input validation … issues, cloud misconfigurations, AD misuse, etc. Perform internal/external network testing, AD enumeration, privilege escalation. Automate security testing where possible, integrating IaC and ServiceNow workflows. Simulate real-world attacks using the same techniques and tools as malicious actors. Produce detailed, actionable reports with executive summaries and technical findings. Collaborate with development, cloud, and infrastructure teams on remediation. Keep More ❯