Technology is a custom software product development and IT consulting company with extensive expertise in various industries, including fintech, e-commerce, logistics, insurance, biotech, cybersecurity, and more. Our world-class team of over 650 experts develop web, mobile, AI/ML, and enterprise solutions for world-renowned companies, including Fortune More ❯
UK now boasts a team of 300 employees, with ambitions to rapidly grow in the coming years. Our services span, business and digital transformation, cybersecurity, operational improvement, risk advisory, and IT advisory. We exist to provide end-to-end expert advice to clients across industries, with a particular focus on More ❯
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber … and strategy to client stakeholders including technical staff, executive leadership, third-party stakeholders, underwriters, and legal counsel Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks Triage active high-stakes security events, including reviewing and applying security controls to detect … pay band, subject to availability and interest. Background or strong interest in investigating cyber-related incidents Demonstrated experience in using analytical skills in a cybersecurity environment do triage and detect what events transpired Demonstrated experience working with and identifying various malware strains Demonstrated ability to make decisions on remediation More ❯
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber … and strategy to client stakeholders including technical staff, executive leadership, third-party stakeholders, underwriters, and legal counsel Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks Triage active high-stakes security events, including reviewing and applying security controls to detect … pay band, subject to availability and interest. Background or strong interest in investigating cyber-related incidents Demonstrated experience in using analytical skills in a cybersecurity environment do triage and detect what events transpired Demonstrated experience working with and identifying various malware strains Demonstrated ability to make decisions on remediation More ❯
south west london, south east england, United Kingdom
CyberClan
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber … and strategy to client stakeholders including technical staff, executive leadership, third-party stakeholders, underwriters, and legal counsel Provide clients with immediate actionable 0-day cybersecurity advice to stop and mitigate the damage of ongoing attacks Triage active high-stakes security events, including reviewing and applying security controls to detect … pay band, subject to availability and interest. Background or strong interest in investigating cyber-related incidents Demonstrated experience in using analytical skills in a cybersecurity environment do triage and detect what events transpired Demonstrated experience working with and identifying various malware strains Demonstrated ability to make decisions on remediation More ❯
procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM landscape. Prepare responses to risk assessments and audits that identify and mitigate potential IAM risks. Participate … reports for executive management. Create IAM presentations for an executive audience. Build business cases for any new capabilities or solutions needed. Collaborate with the Cybersecurity and solution architects to create and maintain the IAM strategy and roadmap. What you will bring: Minimum of 10 years of experience in IT or … Professional certification such as Certified Identity and Access Manager (CIAM) or Certified Identity Management Professional (CIMP), CISSP, or CISM is highly desirable. Experience with cybersecurity frameworks and standards, such as NIST, ISO 27001, or similar. General understanding of operational risk and risk-related control frameworks and practices such (ISO More ❯
and architecture patterns. Perform cloud security assessments and provide remediation recommendations. Mentor junior consultants and contribute to knowledge sharing initiatives. Skills Extensive experience in CyberSecurity, with 4+ years in cloud security. Deep understanding of cloud platforms (AWS, Azure, GCP) and their native security services. Familiarity with infrastructure-as-code More ❯
and architecture patterns. Perform cloud security assessments and provide remediation recommendations. Mentor junior consultants and contribute to knowledge sharing initiatives. Skills Extensive experience in CyberSecurity, with 4+ years in cloud security. Deep understanding of cloud platforms (AWS, Azure, GCP) and their native security services. Familiarity with infrastructure-as-code More ❯
and architecture patterns. Perform cloud security assessments and provide remediation recommendations. Mentor junior consultants and contribute to knowledge sharing initiatives. Skills Extensive experience in CyberSecurity, with 4+ years in cloud security. Deep understanding of cloud platforms (AWS, Azure, GCP) and their native security services. Familiarity with infrastructure-as-code More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of the team supporting the IT & CyberSecurity Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to … as Azure/Amazon Web Services and Oracle Cloud Infra is essential. Key Skills/Experience: Essential: Bachelor’s degree, preferably in Computer Science, CyberSecurity or CyberSecurity Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS More ❯
abreast of emerging risks, regulatory changes, and industry trends to maintain compliance and resilience ✅ Ideal Candidate Profile Extensive leadership experience in information security or cybersecurity roles Broad technical knowledge spanning security architecture, operations, compliance, and cloud security Proven ability to influence and engage senior stakeholders across global teams Strong communication More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Cloud Decisions
owners in formally documenting the security requirements for information systems, applications, and services. This includes assisting with the scoping, selection and documentation of appropriate cybersecurity and privacy controls, testing their design and implementation, following a formal authorisation process, and establishing mechanisms for ongoing monitoring and oversight of controls. Compliance/ More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
Cloud Decisions
owners in formally documenting the security requirements for information systems, applications, and services. This includes assisting with the scoping, selection and documentation of appropriate cybersecurity and privacy controls, testing their design and implementation, following a formal authorisation process, and establishing mechanisms for ongoing monitoring and oversight of controls. Compliance/ More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
Cloud Decisions
owners in formally documenting the security requirements for information systems, applications, and services. This includes assisting with the scoping, selection and documentation of appropriate cybersecurity and privacy controls, testing their design and implementation, following a formal authorisation process, and establishing mechanisms for ongoing monitoring and oversight of controls. Compliance/ More ❯
London, England, United Kingdom Hybrid / WFH Options
Refreshing Recruitment Ltd
government and NCSC security principles. We are seeking applications from candidates with: Security architecture experience in the EUC space. Proven experience designing and delivering cybersecurity architecture in Central Government or regulated environments. Hands on knowledge of securing developer endpoints Experience designing secure architectures for CI/CD... More ❯
teams to enhance security protocols and response plans. Create detailed reports on detected threats, incidents, and response actions. Maintain up-to-date knowledge of cybersecurity trends and updates to CrowdStrike tools. Assist in integrating CrowdStrike tools with other security solutions to optimize overall system performance and protection. Provide technical guidance More ❯
teams to enhance security protocols and response plans. Create detailed reports on detected threats, incidents, and response actions. Maintain up-to-date knowledge of cybersecurity trends and updates to CrowdStrike tools. Assist in integrating CrowdStrike tools with other security solutions to optimize overall system performance and protection. Provide technical guidance More ❯
teams to enhance security protocols and response plans. Create detailed reports on detected threats, incidents, and response actions. Maintain up-to-date knowledge of cybersecurity trends and updates to CrowdStrike tools. Assist in integrating CrowdStrike tools with other security solutions to optimize overall system performance and protection. Provide technical guidance More ❯
the Web Travel Group at: How will you make an impact? The Security Operations Specialist acts as an important part of the organization's cybersecurity posture, driving proactive monitoring, incident escalations and collaborating with stakeholders to safeguard company assets and data. Responsibilities include, but are not limited to, proactive monitoring More ❯
certification is a plus) Awareness of industry frameworks like ISO 27001, CIS, or similar, and ideally holding a CISMP certification A proactive interest in cybersecurity trends, with a willingness to engage in continuous learning and community knowledge sharing Our Culture Our mission is simple - make heroes happy. Our members More ❯
a minimum of 1 day per week. About the Role We are seeking a highly motivated and experienced Vulnerability Management Engineer to join our CyberSecurity team. As a Vulnerability Management Engineer, your primary responsibility will be to manage existing vulnerability management-specific tooling, and have an active role in More ❯
create, assess, advise and architect cyber and cloud security based services. This role will see you take a key position in developing EY's cybersecurity capabilities. You will also be expected to take a supporting role in building out EY's cybersecurity services, working with alliance partners and … access management, security architecture, data protection and privacy, and resilience services. At EY, we have large scale plans to expand our already market leading CyberSecurity practice and anticipate continued growth throughout the next five years. We need excellent people to join us and be part of our exciting growth … strategy. Your Key Responsibilities UK Financial Services CyberSecurity professionals draw upon their knowledge and experience to manage client engagement teams, act as an advisor to a variety of clients and contribute to business development activities on strategic and global priority accounts. Drawing on their industry knowledge and experience, professionals More ❯
Senior CyberSecurity Engineer – Contract Location: London (Hybrid) Employment Type: 6-Month Contract Rate: £450/day IR35 Status: Outside IR35 We’re looking for a highly experienced Senior CyberSecurity Engineer to join a leading consultancy on a contract basis. This is an exciting opportunity to work on critical … DevOps and infrastructure teams on secure design and delivery Advise clients on best practices aligned with industry standards and frameworks Requirements: Proven experience in cybersecurity engineering, ideally within consultancy or client-facing roles Strong knowledge of cloud security (AWS, Azure), network security, and SIEM tools Familiarity with NIST, ISO More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Premier Group
Senior CyberSecurity Engineer – Contract Location: London (Hybrid) Employment Type: 6-Month Contract Rate: £450/day IR35 Status: Outside IR35 We’re looking for a highly experienced Senior CyberSecurity Engineer to join a leading consultancy on a contract basis. This is an exciting opportunity to work on critical … DevOps and infrastructure teams on secure design and delivery Advise clients on best practices aligned with industry standards and frameworks Requirements: Proven experience in cybersecurity engineering, ideally within consultancy or client-facing roles Strong knowledge of cloud security (AWS, Azure), network security, and SIEM tools Familiarity with NIST, ISO More ❯
and 2 days working from home. Key Responsibilities: In this fixed term contract role, you will be part of the team supporting the IT & CyberSecurity Manager to plan and deliver our business strategy in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to … as Azure/Amazon Web Services and Oracle Cloud Infra is essential. Key Skills/Experience: Essential: Bachelor’s degree, preferably in Computer Science, CyberSecurity or CyberSecurity Professional Qualifications/Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS More ❯