you will collaborate closely with internal teams to safeguard critical business operations by design and default. You will be responsible for security automation, CI / CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI / … compliance with ISO27001:2022, SOC1 Type2, and SOC2 Type2 standards. Provide support for security audits, policy implementation, and KPI / KRI monitoring . Qualifications & Requirements Technical Skills: Cloud & Security Expertise: Hands-on experience with AWS (or other cloud-based solutions) . Strong understanding of … secured Software Development Lifecycle (SDLC) and CI / CD platforms . Familiarity with OWASP, CIS frameworks, and security best practices . Infrastructure & Scripting Knowledge: Proficiency in Microsoft platforms (Office 365, IIS, .NET, SQL Server, Windows Server, Active Directory). Strong scripting skills in PowerShell (highly beneficial). Experience with More ❯
over experience for this role. While we don't expect you to have expertise in every area, some experience in cyber threat intelligence and / or threat hunting, along with familiarity with Microsoft's security products, is essential. You will have some of the following skills and experience: Experience … in Cyber Threat Intelligence Experience in Threat Hunting Experience with the Microsoft Sentinel SIEM / SOAR platform Proficient in writing KQL Strong understanding of threat intelligence principles and practices. Strong understanding of security risk management Understanding of threat modelling Knowledge of ISO27001 and other … Employee Referral Bonus - Know someone amazing? Get rewarded for bringing them on board! Wellbeing Support - Access to Mental Health First Aiders, plus 24 / 7 online GP services and an Employee Assistance Programme for you and your family. A Great Place to Work - We have a lovely Central London More ❯
reusable artifacts Minimum Requirements: 3+ Years experience in IT security, compliance and risk management, privacy & controls, and security reference architectures for all-in and / or hybrid deployments Hands-on technical expertise in building security capabilities in code and deploying infrastructure in code such as WAF, Firewall, Anti-DDOS … and SIEM 3+ Years hands-on technical expertise in security architecture, technology automation, implementation, integration, and / or deployment Experience running big scale security engagements with customers and ability to travel to client locations to deliver professional services as needed Bachelor or Master degree in computer science or similar … Python, Node.js, Javascript, Bash, Ruby, Perl, etc. as well with Chef, Puppet, Salt, or Ansible in production environments at scale Technical expertise (design and / or implementation) in Cloud Computing technologies Experience in leading customer facing engagements such as risk assessment and management audits and experience building enterprise security More ❯
Policy Development and Compliance: Establish and enforce security policies, procedures, and best practices. Ensure continued compliance with industry standards, regulations, and certifications (e.g., ISO27001, GDPR, SOC 2). Incident Response and Management: Maintain and where needed develop incident response plans. Lead investigations and response efforts … and Infrastructure Oversight: Oversee the design, implementation, and maintenance of security tools and technologies in Microsoft Windows network and Azure environment (e.g., firewalls, IDS / IPS, endpoint security). Collaborate with IT teams to secure networks, systems, and applications. Training and Awareness: Provide input to and improve security training More ❯
Policy Development and Compliance: Establish and enforce security policies, procedures, and best practices. Ensure continued compliance with industry standards, regulations, and certifications (e.g., ISO27001, GDPR, SOC 2). Incident Response and Management: Maintain and where needed develop incident response plans. Lead investigations and response efforts … and Infrastructure Oversight: Oversee the design, implementation, and maintenance of security tools and technologies in Microsoft Windows network and Azure environment (e.g., firewalls, IDS / IPS, endpoint security). Collaborate with IT teams to secure networks, systems, and applications. Training and Awareness: Provide input to and improve security training More ❯
risk management, and investment planning. Create business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO27001, and industry-specific standards. Facilitate threat and risk workshops tailored to client environments. Showcase innovation through demos of emerging technologies like … Broad understanding of cyber domains (cloud, identity, operations, compliance) Hands-on experience with major cloud platforms and security technologies Familiarity with frameworks (NIST, ISO, COBIT) and regulatory compliance (DORA, NIS2) Solution architecture experience and vendor-neutral evaluation approaches Qualifications Degree in a relevant field or equivalent practical experience More ❯
with IT security systems, governance, incident management, and best practices. Deep knowledge of security and infrastructure principles and tools. Familiarity with standards like ISO27001, NIST, GDPR. Strong analytical, problem-solving, and communication skills. Leadership experience supporting security professionals. Additional Information This job description is not More ❯
managing and addressing complex audits and compliance issues. Support organizational compliance by ensuring security controls align with regulatory and industry standards (e.g., NIST, ISO27001, DORA). Provide evidentiary support for Audit and Compliance teams. Oversee the remediation process for findings originating from internal and external More ❯
managing and addressing complex audits and compliance issues. Support organizational compliance by ensuring security controls align with regulatory and industry standards (e.g., NIST, ISO27001, DORA). Provide evidentiary support for Audit and Compliance teams. Oversee the remediation process for findings originating from internal and external More ❯
managing and addressing complex audits and compliance issues. Support organizational compliance by ensuring security controls align with regulatory and industry standards (e.g., NIST, ISO27001, DORA). Provide evidentiary support for Audit and Compliance teams. Oversee the remediation process for findings originating from internal and external More ❯
security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of experience in GRC, risk management, or compliance. A bachelor's degree in computer science More ❯
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Focus on SAP
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
Partially provide IT support and Endpoint Security for office hardware and software, including laptops, desktops, and other devices. Support IT-related aspects of ISO27001 audits and other regulatory requirements. (7) Configure and maintain office VOIP telephony systems. (8) Excellent communication skills and ability. Qualifications: Bachelor … efficiently. Strong communication skills with the ability to interact effectively with stakeholders at all levels. Requirements: Good experience of managing Information Security compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP / HCIP for security or higher certification will be preferred. More ❯
Partially provide IT support and Endpoint Security for office hardware and software, including laptops, desktops, and other devices. Support IT-related aspects of ISO27001 audits and other regulatory requirements. (7) Configure and maintain office VOIP telephony systems. (8) Excellent communication skills and ability. Qualifications: Bachelor … efficiently. Strong communication skills with the ability to interact effectively with stakeholders at all levels. Requirements: Good experience of managing Information Security compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP / HCIP for security or higher certification will be preferred. More ❯
Partially provide IT support and Endpoint Security for office hardware and software, including laptops, desktops, and other devices. Support IT-related aspects of ISO27001 audits and other regulatory requirements. (7) Configure and maintain office VOIP telephony systems. (8) Excellent communication skills and ability. Qualifications: Bachelor … efficiently. Strong communication skills with the ability to interact effectively with stakeholders at all levels. Requirements: Good experience of managing Information Security compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP / HCIP for security or higher certification will be preferred. More ❯
testing and testing applications hosted on platforms like AWS, Azure, or Google Cloud. Understanding of DevSecOps practices and experience integrating security testing into CI / CD pipelines. Experience: Minimum of 5-7 years of experience in information security, with at least 3 years focusing on penetration testing, vulnerability assessment … Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
IAM, vulnerability management, and SIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT / version control, SDLC pipelines and implementing compliance frameworks (NIST2, SOC2, ISO27001). Benefits: 25 days annual leave in addition … to Bank holidays. Hybrid working pattern; 3 days a week in the office, 2 days remote. Discretionary commission / bonus scheme. Company pension scheme. Life and medical insurance, and eyecare scheme. Employee Assistance Program. Cycle to work scheme. Family-friendly policies. Recruit and Reward scheme. Access to perk-box … to ensuring equal opportunities, fairness of treatment, dignity and respect, and the elimination of all forms of discrimination in the workplace for all employees / contractors and job applicants. More ❯
team to ensure we can maximise our first time fix rate, providing quick and relevant support for our employees and customers on common issues / questions Provide 2nd and 3rd line support, leading on the investigation and resolution of incidents, maintaining good communication with users throughout Work with the … appropriate resolutions on service impacting CAFM issues escalated to them Person Specification Proven experience of delivering application support (including troubleshooting and resolving technical issues / problems), configuration and administration to agreed service levels Experience in the technical aspects of application / CAFM management, ideally within a facilities management … working within an IT service management framework; specifically incident, request, problem and change management Experience of working with applications across a variety of architecture / platforms, including on-premise and cloud hosted / SaaS Good understanding of current and emerging technology and standards in the industry Excellent communication More ❯
principles and the unique challenges posed by AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI / ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for … Communicate security risks and recommendations effectively to both technical and non-technical audiences. What experience you'll bring: 7+ Years experience in a Cyber / Information Security Role. Hold a current and relevant Security Certifications (e.g., CISSP, CISM). Extensive knowledge of security best practices, frameworks, and standards (e.g. … ISO27001). Proven experience as a Security Architect, with a strong focus on AI security. Deep understanding of AI / ML concepts, including model development, data pipelines, and deployment. Strong understanding of ethical AI principles and practices. Experience with AI security tools and technologies. More ❯
tools (GuardDuty, CloudTrail, Config, WAF). Proficiency in CloudFormation, Terraform, and scripting languages like Python or Bash. Knowledge of compliance standards (SOC 2, ISO27001, GDPR, PCI-DSS) and experience ensuring compliance in AWS environments. Experience with security incident response, monitoring, and post-incident remediation. Ability More ❯
expertise. Ability to optimize operational costs while maintaining service quality. Regulatory & Compliance Expertise Knowledge of security industry regulations, standards, and best practices, including: ISO27001 (Information Security) GDPR (for data privacy in surveillance) CPNI (Centre for the Protection of National Infrastructure) guidelines Local and international security More ❯
and standardised tools that support long-term business needs. Cybersecurity Oversight: Develop and implement a cybersecurity strategy aligned with industry best practices (e.g., ISO27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full … work and global operations. IT Support & Service Delivery: Establish a scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding / offboarding processes. Collaboration Tools & Intranet: Lead the implementation and management of internal collaboration tools, including the development of an intranet or SharePoint environment to More ❯
and standardised tools that support long-term business needs. Cybersecurity Oversight: Develop and implement a cybersecurity strategy aligned with industry best practices (e.g., ISO27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full … work and global operations. IT Support & Service Delivery: Establish a scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding / offboarding processes. Collaboration Tools & Intranet: Lead the implementation and management of internal collaboration tools, including the development of an intranet or SharePoint environment to More ❯