and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Tackling cybersecurity hurdles for organisations, particularly in Operational Technology (OT) Hybrid working with the team on client site or in our office a minimum of two days per week. However, the actual … your background might be better suited to. Security management of industrial control and operational technology systems and applications such as: Process control SCADA Distributed control PLCs and RTUs Industrial cybersecurity and data communications Electricity transmission and distribution network control. IoT and Industrial IoT Industrial cybersecurity risk management, architecture and security monitoring Key industries such as: Electricity generation, transmission More ❯
and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Tackling cybersecurity hurdles for organisations, particularly in Operational Technology (OT) Hybrid working with the team on client site or in our office a minimum of two days per week. However, the actual … your background might be better suited to. Security management of industrial control and operational technology systems and applications such as: Process control SCADA Distributed control PLCs and RTUs Industrial cybersecurity and data communications Electricity transmission and distribution network control. IoT and Industrial IoT Industrial cybersecurity risk management, architecture and security monitoring Key industries such as: Electricity generation, transmission More ❯
you do for graduation/post graduation? I completed my bachelor's degreein Computer Engineering from PuneUniversity. What made you choose such an offbeat, unconventional and cool career in Cybersecurity? My journey into IT and Cybersecurity has been shaped by a mix of curiosity, inspiration, and pivotal experiences. Growing up, I was always fascinated by technology. I remember being the More ❯
progress updates, and data-backed recommendations that influence key business decisions. What You'll Bring: 7+ years of experience in GTM strategy, sales enablement, or program management within SaaS, cybersecurity, or high-growth technology companies. Demonstrated success leading cross-functional programs that drive measurable improvements in sales performance and operational efficiency. Deep understanding of sales operations, lead-to-revenue processes … some things you'd rather not know) about the world of cyber threat intelligence Linkedin , Instagram &Twitter : What's happening at Recorded Future The Record : The Record is a cybersecurity news publication that explores the untold stories in this rapidly changing field Timeline : History of Recorded Future Recognition : Check out our awards and announcements We are committed to maintaining an More ❯
billion. Eviden Hardware and Software is a high-growth, R&D-intensive business and focuses on Digital Security and Advanced Computing products and services. Eviden HW & SW offers CyberSecurity Products, Mission Critical Systems, High-Performance Computing, Quantum, Business Computing, Edge, AI and 5G Solutions, Products and Services. Under the Eviden brand, HW & SW federates Atos global R&D efforts … to grow the business technologist's IP capabilities and portfolio. in Europe and worldwide in high-end HPC/AI Top European player in business computing & AI, cybersecurity products and mission-critical systems 1,1 Bn Euro Eviden partner with private and public sector organisations across Finance, Energy, Manufacturing, Media and Government, helping them to understand the true organisational More ❯
to data protection and advise senior leadership on mitigating measures. Conduct Data Protection Impact Assessments (DPIA) and oversee risk mitigation strategies. Collaborate with IT and security teams to implement cybersecurity measures protecting personal and sensitive data. Lead periodic audits and assessments to identify vulnerabilities and ensure compliance with security standards. Design and deliver training programs to educate employees on data More ❯
including compute, networking, security, and identity. Familiarity with DevOps and CI/CD tools (e.g., Terraform, Jenkins, GitLab CI). Understanding of AWS security best practices, compliance frameworks, and cybersecurity principles. Experience working within Agile delivery environments. Excellent communication skills and a collaborative mindset. Desirable Qualifications & Experience While not essential, experience in any of the following areas would be More ❯
including compute, networking, security, and identity. Familiarity with DevOps and CI/CD tools (e.g., Terraform, Jenkins, GitLab CI). Understanding of AWS security best practices, compliance frameworks, and cybersecurity principles. Experience working within Agile delivery environments. Excellent communication skills and a collaborative mindset. Desirable Qualifications & Experience While not essential, experience in any of the following areas would be More ❯
Are you a Project Manager looking for a new challenge? At Sopra Steria, our Aerospace, Defence & Security division delivers digital transformation, IT modernisation, and cybersecurity solutions to highly regulated industries. We work closely with governments, defence agencies, and aerospace organisations to drive efficiency, security, and innovation. We're seeking Project Managers to lead critical, mission-focused programmes that truly make More ❯
ensure technical feasibility and alignment with best practices. Ensure integration with market data feeds and execution systems using FIX protocol . Contribute to architectural discussions and design reviews. Uphold cybersecurity standards in coordination with security consultants. Leverage AWS infrastructure for deploying, monitoring, and scaling platform components. Use Python scripts for automation, prototyping, and light data analysis when needed. Track KPIs … in a technical Product Manager role, ideally in fintech, crypto, or capital markets. Strong technical background - able to engage deeply with engineers on system design and infrastructure. Familiarity with cybersecurity principles , identity/access management, and secure APIs. Experience with AWS services (e.g., EC2, RDS, S3, Lambda, IAM, CloudWatch). Proficiency in Python scripting for basic automation or data parsing … and private networking concepts , including firewalls, VPNs, VPCs, subnets, and routing in cloud and hybrid environments. Knowledge of crypto markets, blockchain infrastructure, and DeFi protocols. Certifications in AWS or cybersecurity are a plus. Join our dynamic team and benefit from: Working at one of the most innovative trading firms globally. Engaging projects offering accelerated responsibilities and ownership compared to traditional More ❯
immediate assistance for common IT issues using SharePoint, Microsoft Teams, Office 365, and more, while escalating complex problems when necessary. System Administration: Manage and update digital systems, ensuring optimal cybersecurity practices and infrastructure management. Equipment Maintenance: Monitor and maintain ICT equipment and network infrastructure, liaising with contractors for any necessary repairs or updates. Helpdesk Support: Work with external helpdesk services … GCSEs (grades 6 to 9) and a Diploma or Degree in Information Technology. Technical Proficiency: Experience with Windows 11, Office 365, Microsoft Teams, SharePoint, and general IT maintenance. Cybersecurity Knowledge: Understanding of cybersecurity principles, including cyber essentials. Strong Organizational Skills: Ability to manage schedules, prioritise tasks, and work under pressure in a dynamic environment. Communication: Excellent communication skills are essential More ❯
search processing language (SPL) Excellent knowledge of Splunk Enterprise and Splunk Enterprise Security Sound knowledge about Splunk Common Information Model and log normalization using Data Models Solid understanding of cybersecurity technologies, protocols, and applications Excellent English communication skills (written and oral)! Nice to have: Splunk Core Certified (Advanced) Power User (crucial) Splunk Certified Developer (nice to have) Splunk Enterprise Certified More ❯
ll use: Professional Skills Customer Orientation Complex Problem Solving Strategic Thinking Creative Thinking Effective Communication Tech Industry & SAP General Skills Agile Methodology Process Improvement Software as a Service (SaaS) CyberSecurity Key Performance Indicators (KPIs) SAP Cloud Suite Portfolio RISE and GROW with SAP Role Specific Skills Relationship Building Partner Relationship Management Account Governance Customer Value Journey Alignment Industry Knowledge … Locations: . Requisition ID: 430959 Posted Date: Jul 4, 2025 Employment Type: Regular Full Time Expected Travel: 0 - 10% Location: Middlesex, GB, TW148HD Job Segment: Cloud, Account Manager, ERP, CyberSecurity, Project Manager, Technology, Sales, SecurityMore ❯
by Jobgether on behalf of Torq. We are currently looking for a Customer Success Engineer in London. This role offers a dynamic opportunity to join a fast-growing, innovative cybersecurity company as a vital member of the Field Engineering team. As a Customer Success Engineer, you will help customers maximize the value of a cutting-edge security hyperautomation platform by More ❯
hub has an end- to-end portfolio of market leading services and develops integrated technology solutions to accelerate digital transformation through: Cloud, Data & AI, Enterprise Applications, Workplace Services and CyberSecurity & Networking. Values: Open, Trusted and Bold Trusted Partners: Microsoft: Top 3 Service Providers, Azure Expert Status, Fastrack & Inner Circle Partner HPE: Platinum Partner - FY23 UK&I Solution Provider of … the Year Palo Alto & Crowdstrike: part of our NextDefense CyberSecurity Portfolio Fortinet: Elite VIP Program - one of only 2 in the UK AWS: Advanced Solution & Managed Service Provider Program Job Description The role sits within the Managed Services function of the Data & AI practice. The delivery function develops and builds Data Platforms, Integrations, ML platforms etc for our clients More ❯
services and Microsoft Entra experience Knowledge of Third-Party Access controls Experience with M&A integrations Familiarity with AWS, GCP, Microsoft cloud access models Solid communicator and team player CyberSecurity know-how (CISSP/CISM a plus) Hands-on with IGA tools like SailPoint, Saviynt, Okta, etc. If you've got the expertise and the client-focused mindset, let More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oscar Technology
services and Microsoft Entra experience Knowledge of Third-Party Access controls Experience with M&A integrations Familiarity with AWS, GCP, Microsoft cloud access models Solid communicator and team player CyberSecurity know-how (CISSP/CISM a plus) Hands-on with IGA tools like SailPoint, Saviynt, Okta, etc. If you've got the expertise and the client-focused mindset, let More ❯
Remote Reports to: Director of Finance Department: Finance, Procurement Team Employment Type: Full-time About Atlas Technica Atlas Technica's mission is to shoulder IT management, user support, and cybersecurity for our clients, who are hedge funds and other investment firms. Founded in 2016, we have grown 100% year over year through our uncompromising focus on service. We value ownership More ❯
reliability and scalability of their models in production environments. What You'll Do Spearhead the design and refinement of machine learning models focused on understanding behaviour patterns and identifying cybersecurity anomalies. Partner with product, engineering, and domain experts to translate strategic goals and customer needs into practical, scalable ML solutions. Drive model development end-to-end, from exploratory analysis, feature … Strong written and verbal communication skills, especially in cross-functional contexts. Bonus Experience (Nice to Have) Exposure to large language models (LLMs) or foundational model adaptation. Previous work in cybersecurity, anomaly detection, or behavioural analytics. Familiarity with orchestration frameworks (Airflow or similar). Experience with scalable ML systems, pipelines, or Real Time data processing. Advanced degree or equivalent experience in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Method Resourcing
reliability and scalability of their models in production environments. What You'll Do Spearhead the design and refinement of machine learning models focused on understanding behaviour patterns and identifying cybersecurity anomalies. Partner with product, engineering, and domain experts to translate strategic goals and customer needs into practical, scalable ML solutions. Drive model development end-to-end, from exploratory analysis, feature … Strong written and verbal communication skills, especially in cross-functional contexts. Bonus Experience (Nice to Have) Exposure to large language models (LLMs) or foundational model adaptation. Previous work in cybersecurity, anomaly detection, or behavioural analytics. Familiarity with orchestration frameworks (Airflow or similar). Experience with scalable ML systems, pipelines, or real-time data processing. Advanced degree or equivalent experience in More ❯
Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
fault finding and liaising with suppliers Experience using IT service management tools, ideally ServiceNow, for logging, tracking, and resolving support tickets in line with SLAs Security awareness: Understanding of cybersecurity best practices, such as MFA, phishing prevention, and endpoint security Ability to create and maintain technical documentation, user guides, and knowledge base articles Excellent communication skills, with the ability to More ❯
The driving force behind our Machine Learning and Data Science infrastructure at Mimecast Embrace the incredible opportunities that lie within Mimecast, where innovation and impact converge. The cybersecurity industry is experiencing exponential growth, and by joining us, you'll be at the forefront of this ever-evolving landscape. The field is rapidly changing, as threat actors employ AI to scale … amongst the most senior roles in the team, directly reporting to the Director of Data Science. Join us on this exhilarating journey, where you'll shape the future of cybersecurity by developing large-scale data products for ML models that push the boundaries of innovation and make an indelible impact in protecting our digital world." - Hiring Manager Responsibilities Design and … and creativity within and between teams Introduces employees to priorities outside of their immediate realm Ensures important interpersonal relationships and connections with one another and our community! DEI Statement Cybersecurity is a community effort. That's why we're committed to building an inclusive, diverse community that celebrates and welcomes everyone - unless they're a cybercriminal, of course. We're More ❯
Scientist | Lead Data Scientist | Senior Data Engineer | Lead Data Engineer | Data Architect I am currently working with a brilliant consultancy with deep expertise in their field of Data and CyberSecurity solutions, predominantly with Central Government organisations but they also have strong ties with Defence and Telco. They have experienced impressive growth over the last few years and as a More ❯