countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. You'll be bringing your unique skills and perspectives to the team, inspiring and taking inspiration from your teammates as you More ❯
risks, dependencies, and critical issues, resolving challenges hands-on. Ensure IT projects comply with regulatory requirements, security policies, and data privacy laws. Partner with Cybersecurity, Risk, and Compliance teams to embed security best practices in IT projects. Establish IT risk frameworks to proactively identify and address vulnerabilities in project execution. More ❯
different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge More ❯
signed off.3 To support LGT's Active Directory, Azure Platform, Intune and MECM and other laptop configuration tools, patching servers and workstations, maintaining the cybersecurity of the IT systems that are in use at LGT.4 To ensure that Change Control procedures and implemented and adhered to raise CCNs appropriately.5 Keep More ❯
requirements. Facilitate effective communication between technical and non-technical stakeholders to drive informed decision-making. Risk Management & Compliance: Identify and mitigate technological risks, including cybersecurity threats and system failures. Ensure all systems comply with industry regulations and internal policies. Budgeting & Resource Allocation: Built and manage the technology budget, ensuring cost More ❯
requirements. Facilitate effective communication between technical and non-technical stakeholders to drive informed decision-making. Risk Management & Compliance: Identify and mitigate technological risks, including cybersecurity threats and system failures. Ensure all systems comply with industry regulations and internal policies. Budgeting & Resource Allocation: Built and manage the technology budget, ensuring cost More ❯
requirements. Facilitate effective communication between technical and non-technical stakeholders to drive informed decision-making. Risk Management & Compliance: Identify and mitigate technological risks, including cybersecurity threats and system failures. Ensure all systems comply with industry regulations and internal policies. Budgeting & Resource Allocation: Built and manage the technology budget, ensuring cost More ❯
requirements. Facilitate effective communication between technical and non-technical stakeholders to drive informed decision-making. Risk Management & Compliance: Identify and mitigate technological risks, including cybersecurity threats and system failures. Ensure all systems comply with industry regulations and internal policies. Budgeting & Resource Allocation: Built and manage the technology budget, ensuring cost More ❯
JSON, XML or SOAP web services. Knowledge of SSO, RBAC, MFA in Azure AD and other modern authentication concepts. Up-to-date knowledge of cybersecurity threats, current best security practices, threat modelling and risk mitigation techniques. Ability to define Minimum Viable Products (MVPs) and experience delivering them rapidly and with More ❯
deliver impactful reports. Excellent analytical skills and financial acumen to understand business performance and to translate into meaningful insights for the client. Knowledge of cybersecurity risk management frameworks, methodologies and technical risk assessments is highly desirable. HOW WE SUPPORT OUR COLLEAGUES In addition to our comprehensive benefits package, we are More ❯
consultant, specialising in delivering transformative technology solutions with industry-leading client experience across business, public sector and not for profit organisations. From cloud computing, cybersecurity, and data management to power app development, we are dedicated to pioneering technology with Microsoft innovation. Guided by our 3 values of building relationships, customer More ❯
creative solutions to overcome them. Risk Management: Strong risk management skills are essential for identifying and mitigating risks associated with digital transformation, such as cybersecurity threats, data privacy concerns, and regulatory compliance issues. Vendor Management: Proficiency in managing relationships with external vendors and partners, including contract negotiations, performance monitoring, and More ❯
countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. We really believe in creating a partnership with our customers. Using our Accelerated Solutions Environment (ASE), you'll get to know More ❯
countless training and development opportunities from thinktanks to hackathons, and access to 250,000 courses with numerous external certifications from AWS, Microsoft, Harvard ManageMentor, Cybersecurity qualifications and much more. We really believe in creating a partnership with our customers. Using our Accelerated Solutions Environment (ASE), you'll get to know More ❯
CyberSecurity Consultant Location: Remote in the United Kingdom Purpose, objectives, and requirements of the role: BlueVoyant CyberSecurity Consultants work within the Professional Services team advising, supporting, and managing clients with multiple activities, including but not limited to: Technical & organizational security controls Cyber and digital transformation activities Remediation workstreams … proactive, and able to lead, manage, and problem-solve on multiple workstreams across varied client sectors by contributing to, managing, overseeing, or supporting complex cyber-security and technology transformation programs, with limited oversight. There is a base requirement to demonstrate understanding of and find ways to integrate activity with BlueVoyant … appropriate, to produce threat-aware products, services and outputs that are impactful, efficient, cohesive, and are enhanced with intelligence and automation. BlueVoyant are trusted cyber-security partners and advisors to some of the most high-profile organizations, entities, and governments in the world. Deep and wide-ranging expertise & experience, credibility More ❯
to be excited to learn about them! BASIC QUALIFICATIONS - BS degree in Computer Science, Computer Engineering, Electrical Engineering or equivalent related field. Alternatively, equivalent cybersecurity experience or certifications (GIAC etc). - 5+ years of demonstrated experience with a focus in areas such as systems, network, and/or application More ❯
SO) Governance Program at State Street. This includes gathering, analyzing, and enriching data for utilization on scorecards and related to governance reporting across the cybersecurity space related to Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM … What you will be responsible for As a Reporting and Analytics Analyst you will: Produce regular reporting related to the governance of the broader cybersecurity space, which includes DLP, KCEM, SDLC, CS, CIM, and TVM to assess compliance with the Information Protection Standard Distribute reporting to various committees, councils, and … Street and vendors to perform related governance functions What we value These skills will help you succeed in this role A deep understanding of cybersecurity governance across domains Strong problem solving and analytical skills Ability to effectively drive results, provide feedback/direction, and build relationships with leaders and team More ❯
risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop … of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and … implement cybersecurity solutions to maintain confidentiality, integrity, and availability. Participate in proofs-of-concept for new security technologies. Develop and test security incident response plans, acting as incident response leader. Develop security, risk, and compliance reports and alerts. Review policies and procedures annually for security compliance. Develop, test, and implement More ❯
role is based in our East Finchley office working 3 days in the office and 2 days remotely. Job Description: The Opportunity As a CyberSecurity Officer you will be responsible for implementing and upholding a framework that spans people, process and technology to ensure that McDonald's information systems … and data remains secure. The role holder will work extensively across a variety of computer systems, network devices and cybersecurity toolsets, as well as enforcing and improving key processes such as cybersecurity education, awareness and training. What will my accountabilities be? Responsibility for operating and maintaining existing cyber … security processes and toolsets will be a fundamental part of this role, as well as research, design and implementation of future cybersecurity processes and toolsets that are most suited to McDonald's environment. This could vary from being responsible for the maintenance and development of the organisation's cyberMore ❯
london, south east england, United Kingdom Hybrid / WFH Options
ZKM Consulting
Security Analyst (French Speaking) Location: London Hybrid Type: Permanent Salary: Up to £80,000 We are working with a fast-growing leader in the Cybersecurity space, looking for a French speaking Security Analyst . This role supports enterprise customers by delivering security insights, enhancing incident response capabilities, and integrating More ❯
complex programme. Key Requirements: Proven expertise in Security Architecture Strong working knowledge of cloud security architecture, including AWS, Azure and GCP Good understanding of cybersecurity principles, including authentication, authorisation, encryption, network security, and application security Previous experience of designing and implementing security solutions with a strong understanding of security frameworks More ❯
security audits for cloud environments. Monitor for emerging threats and vulnerabilities in cloud platforms and recommend proactive controls. Skills 5+ years of experience in cybersecurity with at least 3 years focused on cloud security architecture. Technical background and in-depth knowledge of cloud platforms (AWS, Azure, GCP) and associated securityMore ❯
security audits for cloud environments. Monitor for emerging threats and vulnerabilities in cloud platforms and recommend proactive controls. Skills 5+ years of experience in cybersecurity with at least 3 years focused on cloud security architecture. Technical background and in-depth knowledge of cloud platforms (AWS, Azure, GCP) and associated securityMore ❯
London, England, United Kingdom Hybrid / WFH Options
Pulse Recruit
Job Description Pulse Recruit is partnering with a prestigious university in London to hire a Security Analyst to strengthen their cybersecurity defenses and protect vital academic and research infrastructure. This is a predominantly remote role with occasional visits (1-2 times per month) to the London office. About the Role More ❯
security audits for cloud environments. Monitor for emerging threats and vulnerabilities in cloud platforms and recommend proactive controls. Skills 5+ years of experience in cybersecurity with at least 3 years focused on cloud security architecture. Technical background and in-depth knowledge of cloud platforms (AWS, Azure, GCP) and associated securityMore ❯