and domain expert within the organization and be able to communicate security risk and concepts to both technical and non-technical audiences. Lead initiatives with Engineering teams to optimize threat models and mitigate risks. Encourage a positive security culture across the Engineering organization. Relentlessly champion for security outcomes on behalf of our customers. Work with other engineering leaders to … embed security into day-to-day development processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threatdetection capabilities. Seek opportunities for … tooling and automation WHAT YOU'LL BRING: 5+ years of proven experience securing enterprise applications and infrastructure, preferably in the Crypto and FinTech space. Experience with the application of threat modeling and other risk identification techniques. Strong understanding of the OWASP top 10, including details of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth More ❯
projects aligned with industry frameworks and compliance requirements, such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Leverage emerging technologies such as AI, IoT, cloud solutions, and advanced threatdetection systems. Advise on their application, assess their suitability for specific environments, and determine optimal implementation timing and approach. Manage large-scale programmatic engagements, including stakeholder engagement, scoping … and issue escalation. Business development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyber threat intelligence, assurance, and incident response practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased long-term More ❯
projects aligned with industry frameworks and compliance requirements, such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Leverage emerging technologies such as AI, IoT, cloud solutions, and advanced threatdetection systems. Advise on their application, assess their suitability for specific environments, and determine optimal implementation timing and approach. Manage large-scale programmatic engagements, including stakeholder engagement, scoping … and issue escalation. Business development: Identify and originate cyber risk management and technology resilience opportunities. Manage key client relationships, supported by account, sales, and marketing plans. Position our cyber threat intelligence, assurance, and incident response practices. Provide energetic consulting leadership in KSA, promoting Control Risks as a trusted advisor on cyber and technology risk, leading to increased long-term More ❯
Darlington, County Durham, United Kingdom Hybrid / WFH Options
Sellick Partnership
approach and be able to translate complex technical risks into clear and actionable insights for the organisation. Responsibilities: Development and management of the security operational roadmap, ensuring vulnerability management, threatdetection and effective incident management. Be the primary point of escalation for security events and incidents in the organisation. Leading on, developing and implementing the cyber security strategy … as CISM, CISSP, CISA. Proven experience as a cyber security leader, responsible for security strategy with a strong technical understanding. Strong knowledge of cyber risk management, vulnerability management and threat intelligence. Knowledge of compliance and regulatory frameworks such as Cyber Essentials, GDPR and ISO 27001. Certifications in Microsoft security such as AZ-500, SC-200, SC-300 are desirable. More ❯
day-to-day operation of identity and access services, including: o Access Management o Identity Governance o Role-Based Access Control (RBAC) o Privileged Access Management (PAM) o Identity ThreatDetection and Response o Access Reviews and Certifications o Identity Data Analysis and Reporting Help ensure users only have access to the systems and data they need, working More ❯
development and day-to-day operation of identity and access services, including: o Access Managemento Identity Governanceo Role-Based Access Control (RBAC)o Privileged Access Management (PAM)o Identity ThreatDetection and Responseo Access Reviews and Certificationso Identity Data Analysis and Reporting Help ensure users only have access to the systems and data they need, working with managers More ❯
work as part of a small, expert team responsible for protecting enterprise systems and data. This role offers hands-on involvement with a wide range of technologies-from endpoint detection and SIEM platforms to firewalls, MFA, and vulnerability management-providing a well-rounded foundation in enterprise security operations. You'll gain exposure to advanced security practices, assist in running … and responding to threatdetection systems, and contribute to projects that strengthen security across the organisation. Key Responsibilities Monitor and respond to security alerts and incidents (EDR, SIEM, Identity Protection, SOAR). Assist in vulnerability scanning and remediation activities. Help manage systems such as email and web security gateways, VPNs, MFA, SSO, and mobile device security. Support the More ❯
configurations and infrastructure deployments. Optimize and manage security configurations including IAM policies, network access controls, and encryption protocols . Proactively monitor and respond to security incidents using AWS-native detection and response services. Conduct periodic security assessments, audits, and reviews to align with best practices and regulatory standards. Collaborate with internal stakeholders, including engineering and operations teams, to integrate … security into cloud-native development workflows. Produce detailed documentation and reports related to threatdetection, incident response, and mitigation efforts. Provide mentorship, technical leadership, and establish best practices for cloud security implementation. Work closely with external partners or clients to understand their security needs and design tailored cloud protection strategies. More ❯
Compensation $100,000 - $115,000 depending on experience and skillset What You'll Be Doing Leading incident response and managing containment, analysis, and resolution Monitoring security systems (SIEM, EDR, threat intel) to identify and respond to threats Conducting vulnerability assessments and supporting remediation for financial systems Ensuring compliance with GLBA, PCI, FFIEC, and other regulatory frameworks Supporting risk reviews … of relevant experience Prior experience in financial services, banking, or fintech cybersecurity Expertise with SIEM, EDR, NGFW, and vulnerability management tools Familiarity with scripting (Python, PowerShell) for automation and threatdetection Experience conducting third-party risk reviews and regulatory reporting ITAC Solutions firstName lastName Email Address Phone Number Attach Resume Accepted file types: pdf, doc, docx, Max. file More ❯
on IaaS, container security (e.g., AKS), and DevOps pipelines Evaluate Terraform scripts, advising on automation processes for secure infrastructure deployment Optimize Azure Defender and other monitoring tools to elevate threatdetection capabilities Implement Conditional Access policies, enforcing zero trust and least privilege principles Collaborate across teams to align security protocols with operational objectives Required Skills/Qualifications: Experience More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group
days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls * ThreatDetection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches * Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. More ❯
South Croydon, Surrey, England, United Kingdom Hybrid / WFH Options
Gold Group Ltd
days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls* ThreatDetection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches* Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. More ❯
securing application connectivity, anywhere. We are the leader in hybrid, multi-cloud cybersecurity for secure application connectivity in a hybrid world. Our AI-driven platform provides visibility, real-time threatdetection, and compliance automation for enterprise customers. With strong market traction, year on year ARR growth and profitable, we are entering a high-growth phase as we go More ❯
technologies to enhance operational efficiency and security. Infrastructure & Security Management Oversee the management of IT infrastructure, networks, trading and cloud environments. Ensure robust cybersecurity measures are in place, including threatdetection, data protection, and compliance with financial regulations. Manage business continuity and disaster recovery plans to safeguard IT operations. Production Support Lead the IT helpdesk team in delivering More ❯
challenges. Serve as a technical leader, guiding teams through the implementation of solutions. Provide mentorship and knowledge transfer to team members. Implement security best practices, including access control and threatdetection, and ensure compliance with industry standards. Collaborate with cross-functional teams and effectively communicate technical concepts and solutions to non-technical stakeholders. We are developing our engineering More ❯
East London, London, United Kingdom Hybrid / WFH Options
UK Health Security Agency
challenges. Serve as a technical leader, guiding teams through the implementation of solutions. Provide mentorship and knowledge transfer to team members. Implement security best practices, including access control and threatdetection, and ensure compliance with industry standards. Collaborate with cross-functional teams and effectively communicate technical concepts and solutions to non-technical stakeholders. We are developing our engineering More ❯
Employment Type: Permanent, Part Time, Work From Home
Guildford, Surrey, England, United Kingdom Hybrid / WFH Options
4Square Recruitment Ltd
. Additional Skills (Preferred): Experience with Microsoft Endpoint Configuration Manager (SCCM) co-management with Intune. PowerShell scripting for automation and bulk administration . Knowledge of Microsoft Sentinel for advanced threat detection. Familiarity with Microsoft Teams administration (voice, meetings, policies). Qualifications & Experience: 3+ years of hands-on experience as a Microsoft 365 Administrator or similar role. Microsoft 365 Certified More ❯
the solution that is both robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firm's information security threatdetection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and contribute to our ongoing success More ❯
securing application connectivity, anywhere. We are the leader in hybrid, multi-cloud cybersecurity for secure application connectivity in a hybrid world. Our AI-driven platform provides visibility, real-time threatdetection, and compliance automation for enterprise customers. With strong market traction, year on year ARR growth and profitable, we are entering a high-growth phase as we go More ❯
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
national programme delivery. The National Management Centre will provide visibility and control of information risks for Policing. It will support the 24x7x365 nature of the police operations, providing a threatdetection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the More ❯
preston, lancashire, north west england, united kingdom Hybrid / WFH Options
Police Digital Services
national programme delivery. The National Management Centre will provide visibility and control of information risks for Policing. It will support the 24x7x365 nature of the police operations, providing a threatdetection and response capability for digital services before, during and after cyber attacks, enabling stakeholders to understand and proactively manage risk across the technology estate at both the More ❯
Suite helps orgainzations understand, control, and manage the data flowing through employee collaboration systems like Microsoft Teams and Slack, providing unprecedented visibility and context for internal investigations, litigation support, threatdetection, and governance and compliance assurance. With our product Aware, compliance and legal teams easily protect and manage corporate data while fostering a collaborative and productive culture for More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Frontier Economics
Technology Partnership team to uphold security standards and comply with internal policies and regulations. Implement encryption, data masking, secure transmission, and robust access controls. Support incident response and integrate threatdetection into data workflows. Contribute to developing and maintaining data governance frameworks. Stakeholder Engagement & Communication Work alongside the Technology Operations Manager to deliver on operational objectives. Communicate technical More ❯
Company Description I am working closely with a Cyber Security and IT services provider that operates on a global scale, offering a wide range of services, including testing, threatdetection, risk management, and network security. As part of the gaming industry, they offer exciting positions and never-ending learning opportunities. Standing out because of their extensive expertise, this More ❯