security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of experience in GRC, risk management, or compliance. A bachelor's degree in computer science More ❯
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
Partially provide IT support and Endpoint Security for office hardware and software, including laptops, desktops, and other devices. Support IT-related aspects of ISO27001 audits and other regulatory requirements. (7) Configure and maintain office VOIP telephony systems. (8) Excellent communication skills and ability. Qualifications: Bachelor … efficiently. Strong communication skills with the ability to interact effectively with stakeholders at all levels. Requirements: Good experience of managing Information Security compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP / HCIP for security or higher certification will be preferred. More ❯
Partially provide IT support and Endpoint Security for office hardware and software, including laptops, desktops, and other devices. Support IT-related aspects of ISO27001 audits and other regulatory requirements. (7) Configure and maintain office VOIP telephony systems. (8) Excellent communication skills and ability. Qualifications: Bachelor … efficiently. Strong communication skills with the ability to interact effectively with stakeholders at all levels. Requirements: Good experience of managing Information Security compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP / HCIP for security or higher certification will be preferred. More ❯
testing and testing applications hosted on platforms like AWS, Azure, or Google Cloud. Understanding of DevSecOps practices and experience integrating security testing into CI / CD pipelines. Experience: Minimum of 5-7 years of experience in information security, with at least 3 years focusing on penetration testing, vulnerability assessment … Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
IAM, vulnerability management, and SIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT / version control, SDLC pipelines and implementing compliance frameworks (NIST2, SOC2, ISO27001). Benefits: 25 days annual leave in addition … to Bank holidays. Hybrid working pattern; 3 days a week in the office, 2 days remote. Discretionary commission / bonus scheme. Company pension scheme. Life and medical insurance, and eyecare scheme. Employee Assistance Program. Cycle to work scheme. Family-friendly policies. Recruit and Reward scheme. Access to perk-box … to ensuring equal opportunities, fairness of treatment, dignity and respect, and the elimination of all forms of discrimination in the workplace for all employees / contractors and job applicants. More ❯
team to ensure we can maximise our first time fix rate, providing quick and relevant support for our employees and customers on common issues / questions Provide 2nd and 3rd line support, leading on the investigation and resolution of incidents, maintaining good communication with users throughout Work with the … appropriate resolutions on service impacting CAFM issues escalated to them Person Specification Proven experience of delivering application support (including troubleshooting and resolving technical issues / problems), configuration and administration to agreed service levels Experience in the technical aspects of application / CAFM management, ideally within a facilities management … working within an IT service management framework; specifically incident, request, problem and change management Experience of working with applications across a variety of architecture / platforms, including on-premise and cloud hosted / SaaS Good understanding of current and emerging technology and standards in the industry Excellent communication More ❯
principles and the unique challenges posed by AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI / ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for … Communicate security risks and recommendations effectively to both technical and non-technical audiences. What experience you'll bring: 7+ Years experience in a Cyber / Information Security Role. Hold a current and relevant Security Certifications (e.g., CISSP, CISM). Extensive knowledge of security best practices, frameworks, and standards (e.g. … ISO27001). Proven experience as a Security Architect, with a strong focus on AI security. Deep understanding of AI / ML concepts, including model development, data pipelines, and deployment. Strong understanding of ethical AI principles and practices. Experience with AI security tools and technologies. More ❯
tools (GuardDuty, CloudTrail, Config, WAF). Proficiency in CloudFormation, Terraform, and scripting languages like Python or Bash. Knowledge of compliance standards (SOC 2, ISO27001, GDPR, PCI-DSS) and experience ensuring compliance in AWS environments. Experience with security incident response, monitoring, and post-incident remediation. Ability More ❯
expertise. Ability to optimize operational costs while maintaining service quality. Regulatory & Compliance Expertise Knowledge of security industry regulations, standards, and best practices, including: ISO27001 (Information Security) GDPR (for data privacy in surveillance) CPNI (Centre for the Protection of National Infrastructure) guidelines Local and international security More ❯
and standardised tools that support long-term business needs. Cybersecurity Oversight: Develop and implement a cybersecurity strategy aligned with industry best practices (e.g., ISO27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full … work and global operations. IT Support & Service Delivery: Establish a scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding / offboarding processes. Collaboration Tools & Intranet: Lead the implementation and management of internal collaboration tools, including the development of an intranet or SharePoint environment to More ❯
and standardised tools that support long-term business needs. Cybersecurity Oversight: Develop and implement a cybersecurity strategy aligned with industry best practices (e.g., ISO27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full … work and global operations. IT Support & Service Delivery: Establish a scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding / offboarding processes. Collaboration Tools & Intranet: Lead the implementation and management of internal collaboration tools, including the development of an intranet or SharePoint environment to More ❯
periodic reviews (musters) and conduct spot checks of classified assets Maintain company security documents, asset registers, risk registers, and reports Protectively Marked Material Management / Mustering (PPM) and secure disposal of assets Logging in / out of assets, movement / transport plans, liaising with the authority Maintain … management Advising management on the interpretation and implementation of contractual and legislative security controls. Conduct and administrate internal security audits and address observations and / or non-conformances relating to protective security following an audit Conduct and administrate supply chain security audits and address observations and / or … non-conformances relating to protective security following an audit Update and maintain the ISO27001 ISMS and other security accreditation documents Update and maintain the site risk register Identify new risks, determine mitigations and implement suitable controls and measures Arranging for appropriate security education and awareness More ❯
ideally in financial services or highly regulated environments. Proven capability in third-party risk management, client due diligence, and compliance framework s (NIST, ISO27001, DORA, etc.). Experience in managing audits and regulatory engagements across multiple jurisdictions. Excellent communication skills – able to translate complex technical … managed across a major financial institution. If you would like to discuss this role in confidence reach out to Javed Hussain 0208 142 3930 / javed.hussain@marlinselection.com More ❯
ideally in financial services or highly regulated environments. Proven capability in third-party risk management, client due diligence, and compliance framework s (NIST, ISO27001, DORA, etc.). Experience in managing audits and regulatory engagements across multiple jurisdictions. Excellent communication skills – able to translate complex technical … managed across a major financial institution. If you would like to discuss this role in confidence reach out to Javed Hussain 0208 142 3930 / javed.hussain@marlinselection.com More ❯
principles and the unique challenges posed by AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI / ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for … Communicate security risks and recommendations effectively to both technical and non-technical audiences. What experience you'll bring: 7+ Years experience in a Cyber / Information Security Role. Hold a current and relevant Security Certifications (e.g., CISSP, CISM). Extensive knowledge of security best practices, frameworks, and standards (e.g. … ISO27001). Proven experience as a Security Architect, with a strong focus on AI security. Deep understanding of AI / ML concepts, including model development, data pipelines, and deployment. Strong understanding of ethical AI principles and practices. Experience with AI security tools and technologies. More ❯
Security news, proactively raising and responding to emerging threats. Support the wider Security team in our compliance and accreditation activities (GDPR, PCI DSS, ISO27001). Create, maintain, and analyse Security Operations dashboards and reports fed into management, and stakeholders across the business. Identify key trends More ❯
processes for the business analysis centre of excellence. Supporting the development of resources and materials for the business analysis toolkit. Establishing and chairing focus / steering groups within client projects when required. Supporting smaller project tasks to ensure successful delivery. Undertaking maturity assessments related to IT processes and services. More ❯
Developing and implementing security policies, standards, and procedures: This includes creating guidelines aligned with industry best practices and regulatory requirements (e.g., NIST CSF, ISO27001, GDPR). Designing and architecting secure IT environments: This may involve network security design, cloud security architecture (AWS, Azure, GCP), and More ❯
Developing and implementing security policies, standards, and procedures: This includes creating guidelines aligned with industry best practices and regulatory requirements (e.g., NIST CSF, ISO27001, GDPR). Designing and architecting secure IT environments: This may involve network security design, cloud security architecture (AWS, Azure, GCP), and More ❯
years for senior) experience in security architecture design and implementation within a Service Provider organization. Experience with security frameworks such as NIST CSF, ISO27001, or CIS Controls. Deep understanding of security technologies , such as firewalls, intrusion detection and prevention systems, vulnerability scanners, and endpoint protection. More ❯
Ability to prioritize and manage multiple operational tasks with attention to detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or More ❯
Ability to prioritize and manage multiple operational tasks with attention to detail. Nice to Have (But Not Essential): Familiarity with security frameworks such as ISO27001, Cyber Essentials, or NIST. Exposure to tools like Microsoft Defender, Qualys, Tenable, or CrowdStrike. Certifications such as CompTIA Security+, Microsoft SC-900, SC-200, or More ❯
why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. Work / Life Balance We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why … security, compliance and risk management, including privacy, controls, etc - Proven and significant experience working with security reference architectures for all-in cloud deployments and / or hybrid scenarios - Understanding architectural implications of meeting industry standards such as ISO27001, UK Official Amazon is an equal … or adjustment during the application and hiring process, including support for the interview or onboarding process, please visit for more information. If the country / region you're applying in isn't listed, please contact your Recruiting Partner. Based on your recent activity, you may be interested in: Posted More ❯