City of London, London, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
posture has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST … Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerabilitymanagement, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure adherence … risk frameworks (COSO, FAIR), and regulatory obligations (GDPR, PCI-DSS, SOX). Proven track record of managing enterprise-level security programs, including incident response and business continuity. Excellent stakeholder management skills, with experience reporting at board level. Strong grasp of both technical cybersecurity and governance frameworks, with the ability to balance business priorities and risk. Hands-on leadership style More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
posture has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST … Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerabilitymanagement, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure adherence … risk frameworks (COSO, FAIR), and regulatory obligations (GDPR, PCI-DSS, SOX). Proven track record of managing enterprise-level security programs, including incident response and business continuity. Excellent stakeholder management skills, with experience reporting at board level. Strong grasp of both technical cybersecurity and governance frameworks, with the ability to balance business priorities and risk. Hands-on leadership style More ❯
South East London, England, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
posture has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities GRC Leadership: Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST … Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerabilitymanagement, and network security. Risk Management: Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure adherence … risk frameworks (COSO, FAIR), and regulatory obligations (GDPR, PCI-DSS, SOX). Proven track record of managing enterprise-level security programs, including incident response and business continuity. Excellent stakeholder management skills, with experience reporting at board level. Strong grasp of both technical cybersecurity and governance frameworks, with the ability to balance business priorities and risk. Hands-on leadership style More ❯
Board Communicate the information security strategy to relevant parties, as well as developing supporting policies and procedures required to meet the strategy Develop, maintain, and expand the Cyber Risk Management Framework as part of the overall Information Security Management System (“ISMS”) Responsible for the Company’s information security capabilities, including the technical training and awareness of colleagues, ensuring … containment and mitigation activities, as well as preparing for incidents by running threat simulations, tabletop and red team exercises Assess emerging and potential security threats using the Cyber Risk Management Framework and act proactively to mitigate relevant threats End-to-end vulnerabilitymanagement across the hybrid cloud environment Manage security toolset, including managing the relationship with the … GDPR, etc. Good communication and interpersonal skills, with the ability to effectively communicate security-related questions to technical and non-technical stakeholders (employees, customers, and/or partners) Project management skills, with the ability to manage projects such as processes implementation and improvement, security systems implementation Ability to collaborate cross-functionally and influence stakeholders at all levels of the More ❯
GRC working group. Requirements Operationalising and ensuring delivery of security policy, standards and procedures Assuring day-to-day execution of operational security tasks across multiple areas including threat and vulnerabilitymanagement, anti-virus management, security monitoring etc. Supporting the Technology team to keep information security infrastructure up to date with emerging threats and vulnerabilities, including advising on … looking for include: Experience with GDPR/UK Data Protection, Cyber Essentials and ISO 27001 frameworks Managing technical risks and proposing solutions and recommendations Security Operations procedures, i.e. Incident management and response Configuring, optimising and reporting with Microsoft 365 Security and Compliance modules, including Defender, Security Centre, Protection, Compliance Centre Configuring and maintaining endpoint security technologies (AV, firewall, encryption … RBAC, Security by Design, PAM, Segregation of Duties Data Protection and DLP Experience with the following would also be beneficial: NIST, SOC2 and additional compliance and regulatory frameworks Project Management and technical delivery Experience of, or a keen interest in, the business of sport #J-18808-Ljbffr More ❯
SOC services with business priorities is also essential. Qualifications Degree or equivalent experience Recognized security qualifications (e.g., CISM, CISSP) preferred Experience leading security teams or senior security analysts Project management experience (preferred) Leadership skills for managing security analysts and specialists Expertise in incident detection, analysis, response, and coordination Deep understanding of cybersecurity principles and technologies Proficiency with SOC tools … to evolving threats and technologies Experience Extensive security operations experience Prior CIRT team experience Leadership in Security Incident Response Experience with SIEM/SOAR tools Knowledge of threat intelligence, vulnerabilitymanagement, network security Experience with threat analysis and security alerts Familiarity with frameworks like MITRE ATT&CK, NIST CSF Leadership or strong potential in security teams Performance managementMore ❯
response, and driving the implementation of best-in-class security operations across the business. Microsoft Security Engineer Key Responsibilities: Oversee the end-to-end security monitoring process, including log management, threat detection, and response using tools like Microsoft Sentinel . Drive vulnerabilitymanagement efforts and support remediation in collaboration with IT teams. Lead investigations into security incidents … coordinating with internal teams and external partners as needed. Maintain and continuously improve security controls across Microsoft Defender, Azure, Intune, and Purview. Design and implement and access management solutions with a security-first mindset. Support compliance initiatives across ISO 27001, Cyber Essentials, GDPR, and DPA. Align system configurations (Windows, Linux, network) with CIS benchmarks and ISO 27001 controls. Act More ❯
of security tools and technologies (e.g., SIEM, IDS/IPS, EDR/XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Desirable skills Ideally you will come from an Infrastructure engineering background. Relevant industry qualifications and certifications (CompTIA Security+, CEH, GCIH, GCIA CISSP etc) Experience … Knowledge of the following security products are ideal: ? SEIM (Rapid7 IDR, MS Sentinel, SPLUNK) ? SOAR (Rapid7 ICON, MS Sentinel) ? Endpoint Detection and Response (Microsoft Defender) ? Email Security (Proofpoint, Mimecast) ? VulnerabilityManagement (Rapid7 IVM, Nessus, Tenable) Proficiency with scripting and automation (e.g., Powershell, Python) Understanding of Zero-Trust Architecture within a hybrid cloud environment. Working knowledge of cyber threat More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
Liverpool, England, United Kingdom Hybrid / WFH Options
Techwaka
with stakeholders to maintain compliance with industry standards such as ISO27001, Cyber Essentials Plus, PCI/DSS Stay ahead of cyber threats, maintaining and improving security monitoring and risk management processes Support vulnerabilitymanagement, penetration testing, and incident response Requirements for this role: 3+ years' experience in a senior cyber security role Strong knowledge of security frameworks More ❯
industry Skills/Knowledge Knowledge of audit procedures and technical security and control standards usually obtained through related work experience Solid understanding of ITGC and related processes (e.g., Configuration Management, Vendor Management, Access and Identity Management) Understanding of Information Technology Service Management (ITSM) controls (e.g., Incident Management, Change Management, Problem Management) Skills as … needed to perform testing of application controls (e.g., BC/DR, Application Security Testing, Interface Controls) Skills as needed to perform testing of information security and cybersecurity controls (e.g., VulnerabilityManagement, Incident Response, Network Security) Analytical and organizational skills are necessary to conduct audits Strong issue writing and workpaper documentation skills Knowledge and awareness on NIST More ❯
of tools including Sentinel, Purview suite, Exchange Online, SharePoint, Teams VMware Server and Storage Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Penetration Testing & VulnerabilityManagement Applications Cloud-based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption Candidate Profile The right candidate will have a demonstrable background in Cyber … the last 5 years. Working towards or holding a Cyber Security Certification. Understanding of Compliance Frameworks and Cyber Security Certifications (e.g., NIST or Cyber Security Essentials). Knowledge of vulnerability databases (e.g., NIST/CVSS). Experience operating within the ITIL Framework. Experience using Vulnerability & Compliance scanning tools. Experience with Code Security scanning tools. Educational Requirements This role More ❯
operation of their services. Key Responsibilities: Implement and manage security tools and technologies: Deploy and manage security solutions such as Microsoft Sentinel for SIEM and Tanium for Threat and VulnerabilityManagement (TVM). Conduct security assessments and vulnerability scans: Regularly assess the security posture of applications and infrastructure, identifying and mitigating vulnerabilities. Monitor and respond to security More ❯
Your main duties & responsibilities: Operationalising and ensuring delivery of security policy, standards and procedures Assuring day-to-day execution of operational security tasks across multiple areas including threat and vulnerabilitymanagement, anti-virus management, security monitoring etc Supporting the Technology team to keep information security infrastructure up to date with emerging threats and vulnerabilities, including advising on … looking for include: Experience with GDPR/UK Data Protection, Cyber Essentials and ISO 27001 frameworks Managing technical risks and proposing solutions and recommendations Security Operations procedures, i.e. Incident management and response Configuring, optimising and reporting with Microsoft 365 Security and Compliance modules, including Defender, Security Centre, Protection, Compliance Centre Configuring and maintaining endpoint security technologies (AV, firewall, encryption … RBAC, Security by Design, PAM, Segregation of Duties Data Protection and DLP Experience with the following would also be beneficial: NIST, SOC2 and additional compliance and regulatory frameworks Project Management and technical delivery Experience of, or a keen interest in, the business of sport Seniority level Seniority level Mid-Senior level Employment type Employment type Full-time Job function More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
posture has never been greater. You will own the security vision and strategy while rolling up your sleeves to implement, scale, and continually improve our approach to GRC, risk management, threat mitigation, and compliance frameworks. Key Responsibilities Design and implement a scalable GRC framework tailored to the business, addressing risk management, compliance standards (ISO 27001, NIST, SOC … Develop and execute a long-term cybersecurity strategy aligned with business goals, balancing innovation and risk. Security Operations: Oversee day-to-day cybersecurity operations, including threat detection, incident response, vulnerabilitymanagement, and network security. Identify and manage risks to information assets and IT systems. Lead enterprise risk assessments and mitigation planning. Compliance & Regulatory: Ensure adherence to global data … risk frameworks (COSO, FAIR), and regulatory obligations (GDPR, PCI-DSS, SOX). Proven track record of managing enterprise-level security programs, including incident response and business continuity. Excellent stakeholder management skills, with experience reporting at board level. Strong grasp of both technical cybersecurity and governance frameworks, with the ability to balance business priorities and risk. Hands-on leadership style More ❯
including project risk assessments, control design reviews, and penetration testing), and ensuring adherence to security standards in various development environments. The ideal candidate must demonstrate exceptional business insight, stakeholder management skills, and the ability to deploy consulting and influencing skills effectively. This is a critical role for us and requires a strong, experienced, highly motivated, and knowledgeable individual with … extensive leadership skills and experience operating in a complex, global matrix organization. KEY ACCOUNTABILITIES Leadership and Management: Lead and manage a team of experienced security design assurance professionals. Provide coaching and direction to senior managers and team members throughout the lifecycle, including risk mitigation discussions and service portfolio improvements. Build relationships and collaborate with senior leaders and professionals across … meet security standards, baselines, and architecture patterns, and follow relevant regulations. Identify control gaps and facilitate discussions with product/business owners to implement interim compensatory measures and risk management processes. Manage DevSecOps pipelines, including risk assessments, triaging, tool onboarding, developer feedback, and ongoing service management to ensure continuous delivery. Oversee multi-cloud build-out/operations, control More ❯
London, England, United Kingdom Hybrid / WFH Options
Eutelsat Communications SA
systems required to support the Eutelsat Group mission. You will also contribute to the design, build, and support of the Security Operations technology infrastructure. Responsibilities include: Provide effective incident management through monitoring and analysis of Security Events and Incidents on a diverse range of SIEM tools and monitoring capabilities. Triage, mitigate and escalate incidents accordingly, while capturing and recording … Cybersecurity role. Experience of working with SIEM tools. Experience of Incident Response and/or forensic skills. Thorough understanding of Cybersecurity Tactics, Techniques and Procedures (TTPs). Understanding of vulnerabilitymanagement, gap remediation, risk logging, and tracking. Excellent interpersonal and customer facing skills. Excellent communication skills including strong verbal and written skills. What We’d Love: Experience of … 27001. Awareness of pentesting, threat hunting and red teaming in operational environments. Networking principles including TCP/IP, WAN's, LAN's, and commonly used Internet protocols. Security incident management and control. Experience of Linux/Windows Server administration and configuration. Experience of PowerShell and Python scripting. Working in an ITIL/Agile environment. Where You’ll Be: White More ❯
London, England, United Kingdom Hybrid / WFH Options
Flagstone
and availability to our clients who trust us with their transactions, data, and availability. You will help to grow the dedicated security function at Flagstone and assist with the management of a secure modern Microsoft Azure hosted services as well as help us to build out our automation and controls in the same way we build and provide our … London, England, United Kingdom 1 week ago London, England, United Kingdom 1 month ago IT Security Solution Architect - Director London, England, United Kingdom 2 weeks ago Senior Security Analyst - VulnerabilityManagement Information Security Architect/Manager London, England, United Kingdom 1 week ago London, England, United Kingdom 1 week ago Experienced Security Architect | Professional Pension Management Firm More ❯
are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security weaknesses in web, mobile, and … play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of potential … with recommended remediation steps for developers and system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerabilitymanagement program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work with stakeholders to develop mitigation More ❯
positive difference to the lives of our clients, customers, colleagues, shareholders and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses, interactive investor (ii), Investments and Adviser … cyber-attacks. This role is technical and will help to deliver continuous operational security improvements across the Cyber Defence function including; Cyber Security Compliance, Penetration Testing , External Attack Surface Management , VulnerabilityManagement and Cloud and Network security The role reports directly to the Cyber Defence Lead and is based in Edinburgh. The role holder will work closely … Security Compliance, Managing Policy Compliance scanning and reporting and Azure Policy compliance Ticket triage & response, managing the Information Security Queue in relation to Cyber Defence tickets External Attack Surface Management, Using our various toolsets to assess and understand our external attack surface and raise actions for technical teams to remediate or mitigate risks.. VulnerabilityManagement, including deploying More ❯
role offers a chance to make a real impact by ensuring the integrity and resilience of the company’s IT environment against evolving cyber threats. Key Responsibilities: Support incident management and security response efforts, providing expertise to address and resolve security incidents quickly and effectively. Perform regular security checks, including daily, weekly, and monthly monitoring of systems and resolving … security standards such as ISO 27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess security risks. Solid understanding of … make an impact in a global organisation, apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, VulnerabilityManagement, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
seeking to appoint a Senior IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service vendors to manage security products … and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform … role Strong understanding of security principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical audiences. Proven hands-on expertise More ❯
IT Risk Register Coordinate client security audits and support external certifications (e.g., TPN) Complete and manage client security questionnaires during bidding or audit processes Conduct internal penetration tests and vulnerability assessments to proactively identify and mitigate security risks Infrastructure & Systems Security Manage the firewall whitelisting and approval process Oversee vulnerability and patch management workflows Maintain sandbox and … from a security perspective Develop user and technical security documentation and training resources Document and maintain critical security and infrastructure policies, e.g., Incident Response Plan, Business Continuity Plan, Change Management Procedures, and Disaster Recovery Plan Test and improve Disaster Recovery capabilities and identify process gaps Physical & On-Set Security Manage and maintain physical security systems including CCTV, alarm, and … enterprise environment Familiarity with enterprise information security standards such as Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR Proficiency in Microsoft O365 Security solutions, Networking, Security operations, VulnerabilityManagement, and Security Auditing Experience in security testing, vulnerability scanning, and risk management Ability to create formal documents such as reports or procedures Detailed knowledge of More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Walsh Employment
now seeking a Cyber Security Analyst to join the information security function. Reporting to the Information Security Manager , you will support critical activities related to threat monitoring, incident response, vulnerabilitymanagement and risk mitigation, while also acting as a key advocate for cyber awareness across the wider organisation Key Requirements Essential: 3+ years experience in cyber security Proficiency … in SIEM , antivirus , and vulnerabilitymanagement tools Understanding of AD , Office 365 , Windows Server , and infrastructure security Strong IT skills with experience across networks, OS, and security protocols Incident response and threat analysis expertise Familiar with Azure/Microsoft Defender and best practice frameworks ITIL Foundation certified (v3 or later) or experience in an ITIL environment Awareness of More ❯
London, England, United Kingdom Hybrid / WFH Options
Leonardo
support the development and delivery of the products (whilst considering cyber resilience) with the ambition to meet the Secure by Design principles. You'll ensure the development, implementation, and management of security protocols, tools, and practices on maturing products meets the appropriate standards and Def Cons. Working closely with the Integrated Product Team (IPT) frameworks with specialists from other … support the development and delivery of the products (whilst considering cyber resilience) with the ambition to meet the Secure by Design principles. You'll ensure the development, implementation, and management of security protocols, tools, and practices on maturing products meets the appropriate standards and Def Cons. Working closely with the Integrated Product Team (IPT) frameworks with specialists from other … wider Product IA and Security community across Leonardo Electronics UK, influencing corporate policies, processes and guidance. Managing architects such as the generation of Technical Risk Assessments, Security Design and Management Documentation, and Remediation Action Plans. As well as this, you’ll oversee the generation and approval of Product Security and Information Assurance Management Plan; Product Design Reviews; generation More ❯