. Solid understanding of security frameworks and standards: NIST, CIS Controls, ISO 27001 , and compliance mandates relevant to banking. Familiarity with secure coding practices and DevSecOps pipelines. Experience with incidentresponse, security monitoring, and digital forensics. More ❯
Event Management (SIEM), including tools such as Splunk, Defender, and Tenable Threat Modelling System solutions, as well as with IDS/IPS and vulnerability scanners. Experience in SOC operations, incidentresponse, and forensic analysis. Ability to perform triage of security events to determine their scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security More ❯
security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current and emerging security threats. Assist and lead in IncidentResponse investigations and mitigation. Evaluate, test and recommend security enhancements. Support CE+ accreditation Identify security risks and exposures, determine the cause of security violations and suggest procedures to More ❯
security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current and emerging security threats. Assist and lead in IncidentResponse investigations and mitigation. Evaluate, test and recommend security enhancements. Support CE+ accreditation Identify security risks and exposures, determine the cause of security violations and suggest procedures to More ❯
security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current and emerging security threats. Assist and lead in IncidentResponse investigations and mitigation. Evaluate, test and recommend security enhancements. Support CE+ accreditation Identify security risks and exposures, determine the cause of security violations and suggest procedures to More ❯
london (city of london), south east england, united kingdom
Slaughter and May
security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current and emerging security threats. Assist and lead in IncidentResponse investigations and mitigation. Evaluate, test and recommend security enhancements. Support CE+ accreditation Identify security risks and exposures, determine the cause of security violations and suggest procedures to More ❯
organization's risk exposure. Develops detailed reports with findings, impact analysis, and actionable remediation re commendations. Simulates real-world attacks to test the effectiveness of existing security controls and incident response. Keeps up to date with the latest vulnerabilities, exploit techniques and penetration testing tools in general and more specific to an airline industry, transportation sector. Your responsibilities: Performing More ❯
impacts of IT operational and control activity impacting the risk register as well as related stakeholders including Compliance, Internal Audit and SOX (carriers) Taking the lead on IT Risk Incident responses Developing a working understanding of new IT-related risks or controls Keep the risk register (Decision Focus) current for IT-related risks, controls and accountability The IT Risk More ❯
high-pressure environment with geographically dispersed teams across different time-zones. The Role To detect and investigate all cyber security related incidents across WTW and escalate cases to relevant IncidentResponse teams Manage a geographically dispersed team supporting SOC based detection services on a 24/7/365 basis around the globe. Ensure shift coverage is adequate … playbooks and operating procedures within the SOC are adequate and effectively identify, triage and investigate cyber threats and attacks in a timely manner Integrate the detection services with the response teams and threat teams to ensure an efficient incident life cycle is maintained Implement KPI and SLA's and monitor adherence to targets Maintain a membership list and … call out details of the Cyber Security Incident Group ensuing incidents are raised to the correct resolver groups when appropriate Implement regular Table Top Exercises to test SOC processes and procedures Conduct Quality Assurance reviews of SOC services and incidents ensuring lessons learned and improvements are implemented The Requirements Experience in SOC Management for Enterprise Organisations (Essential) Strong experience More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management HSM configuration/installation/support Incident management Change management ITIL Ensure the integrity and availability of cryptographic and key management services to business functions and applications ? Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills More ❯
aligned with business goals and regulatory requirements. Oversee long-term digital infrastructure planning to support growth, scalability, and operational efficiency. Lead on cybersecurity and risk management, ensuring proactive monitoring, incidentresponse, and data protection. Champion the adoption of AI, automation, and emerging technologies to drive innovation and reduce manual processes. Business Continuity & Risk Own and maintain the IT More ❯
actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications (CISSP, CISM, CISA, CRISC) desirable. This More ❯
actionable reporting. Skills & experience sought: Strong background in IT Security, Cyber Assurance, or IT Audit. Hands-on knowledge across areas such as governance, IAM, threat management, vulnerability management, and incident response. Good understanding of security frameworks (e.g. ISO27001, NIST, PCI-DSS, SOX). Experience engaging with senior stakeholders within complex environments. Relevant certifications (CISSP, CISM, CISA, CRISC) desirable. This More ❯
compliance with and company adherence to relevant regulations and control frameworks e.g. NCSC CAF, ONR SyAPs, ISO27001. Proven knowledge of adversary TTPs and frameworks like MITRE ATT&CK. Strong incidentresponse, investigation, analysis, logging and reporting skills. Excellent communication and stakeholder management skills with the ability to translate complex technical threats and attack paths to non-technical audiences. … Nice to have: GIAC Certified Incident Handler (GCIH) Certification or similar. Immediate availability. Hays Specialist Recruitment Limited acts as an employment agency for permanent recruitment and employment business for the supply of temporary workers. By applying for this job you accept the T&C's, Privacy Policy and Disclaimers which can be found at hays.co.uk More ❯
significant investment into its SOC-as-a-Service offering, positioning itself at the forefront of managed security solutions and enabling clients to benefit from cutting-edge threat detection and response capabilities. Key Responsibilities: Serve as a vCISO for clients, providing strategic guidance on security posture and compliance Lead the development and implementation of security policies, procedures, and controls Manage … ISO27001 compliance, including internal and external audits Conduct risk assessments and oversee incidentresponse planning Collaborate with technical teams to ensure security is embedded across services Advise on regulatory requirements and emerging threats Candidate Profile: Extensive experience in information security within an MSP or MSSP CISSP certified Strong working knowledge of GRC frameworks, including ISO27001 Demonstrated experience in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Context Recruitment Limited
significant investment into its SOC-as-a-Service offering, positioning itself at the forefront of managed security solutions and enabling clients to benefit from cutting-edge threat detection and response capabilities. Key Responsibilities: Serve as a vCISO for clients, providing strategic guidance on security posture and compliance Lead the development and implementation of security policies, procedures, and controls Manage … ISO27001 compliance, including internal and external audits Conduct risk assessments and oversee incidentresponse planning Collaborate with technical teams to ensure security is embedded across services Advise on regulatory requirements and emerging threats Candidate Profile: Extensive experience in information security within an MSP or MSSP CISSP certified Strong working knowledge of GRC frameworks, including ISO27001 Demonstrated experience in More ❯
and London market. The successful candidate will be a conscientious and hardworking claims professional with experience in cyber and technology claims.You will work closely with the claims departments internal IncidentResponse Team to guide clients and triage incidents with the appropriate external response partners to deliver high quality response to cyber incidents. You will be responsible … loss to settlement across Spanish or German jurisdictions Foster good relationships with policyholders, brokers, underwriters and capacity providers, and drive excellent customer service Actively work with a panel of response vendors during claims incidents Ensure that there is prompt and accurate reserving, identifying and pursuing relevant third party recoveries and seeking to reduce claims leakage The ability to prioritise More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
progression A large West London based company is looking for an experienced Cyber Analyst/Engineer to join its IT function. Duties will include: - BAU cyber vulnerability management and incidentresponse - Cyber security projects and working with the wider group/external vendors to deliver security requirements - Focus on delivering Cyber Essentials Plus and ISO27001 - Network and data More ❯
experience of working with Microsoft Sentinel, Defender and Purview • Excellent understanding of security frameworks (NIST and Cyber Essentials) • Ability to lead and manage third party providers • Strong understanding of incidentresponse processes and methodologies including leading and managing incidents • Lead on root cause analysis, providing relevant documentation including recommendations • indemonstrable experience of implementing a robust and trustworthy security More ❯
experience of working with Microsoft Sentinel, Defender and Purview • Excellent understanding of security frameworks (NIST and Cyber Essentials) • Ability to lead and manage third party providers • Strong understanding of incidentresponse processes and methodologies including leading and managing incidents • Lead on root cause analysis, providing relevant documentation including recommendations • indemonstrable experience of implementing a robust and trustworthy security More ❯
experience of working with Microsoft Sentinel, Defender and Purview • Excellent understanding of security frameworks (NIST and Cyber Essentials) • Ability to lead and manage third party providers • Strong understanding of incidentresponse processes and methodologies including leading and managing incidents • Lead on root cause analysis, providing relevant documentation including recommendations • indemonstrable experience of implementing a robust and trustworthy security More ❯
london (city of london), south east england, united kingdom
InterQuest Group
experience of working with Microsoft Sentinel, Defender and Purview • Excellent understanding of security frameworks (NIST and Cyber Essentials) • Ability to lead and manage third party providers • Strong understanding of incidentresponse processes and methodologies including leading and managing incidents • Lead on root cause analysis, providing relevant documentation including recommendations • indemonstrable experience of implementing a robust and trustworthy security More ❯
into actionable engineering guidelines and reusable controls. Ensure AI systems avoid prohibited practices and meet obligations around: Transparency and user awareness Data minimisation and lawful processing Continuous monitoring and incidentresponse Cross-Functional Collaboration & Governance Partner with legal, compliance, and architecture teams to align AI development with enterprise risk and governance frameworks. Contribute to internal working groups on More ❯
into actionable engineering guidelines and reusable controls. Ensure AI systems avoid prohibited practices and meet obligations around: Transparency and user awareness Data minimisation and lawful processing Continuous monitoring and incidentresponse Cross-Functional Collaboration & Governance Partner with legal, compliance, and architecture teams to align AI development with enterprise risk and governance frameworks. Contribute to internal working groups on More ❯
Commercial awareness with a track record of delivering profitable portfolio growth. Confident communicator with strong broker relationships and market presence. Familiarity with cyber risk scoring tools, pricing models, and incidentresponse frameworks. Professional qualifications such as ACII, or relevant technical certifications (e.g. CISSP) are an advantage. Experience working in a Lloyd’s, MGA cyber underwriting environment. Exposure to More ❯