About the company: LexisNexis Risk Solutions, part of RELX, is a portfolio of brands that span multiple industries providing customers with innovative technologies, information-based analytics, decision tools, and data services. Our brands provide market-specific solutions that help our customers solve problems, make better decisions, stay compliant, reduce … improve their operations. About the team/role: LexisNexis Risk Solutions is seeking a Software Engineer II with proven industry experience to join our InformationSecurity team and Platforms squad. The successful candidate will perform software design, typically across multiple components, and work with others to talk to … translate their requests into solutions. The position will also build infrastructure as code, software services (PaaS and SaaS), with a focus on automation of InformationSecurity applications within our cloud and on-premises environments. Main Responsibilities: Delivery of resilient designs and stacks via "Infrastructure as Code" and other More ❯
us who we are and inspire us to push boundaries, embrace our individuality, and stand up for what's right. THE GIG As our InformationSecurity, Risk & Compliance Specialist, you'll be highly motivated to support the activities of the Global InformationSecurity team. Your role … will ensure efficient third-party vendor risk management, deliver a training & awareness programme (with our managed security partners) and advise teams across Dr. Martens in a professional and personable manner. You will have strong verbal and written communication skills, with an ability to articulate risk and compliance recommendations in … to help us align our internal Policies and processes to NIST 2- CSF. You will be a team contributor, and aware of industry news, security threats and upcoming changes to standards, which may impact Dr. Martens. You will also be actively interested in information about emerging technologies for More ❯
a third of our economy - yet have been largely neglected both by traditional high street banks and modern fintech providers. Department Description The Allica Security team play a key role in protecting the bank and are responsible for all aspects of security surrounding Applications, Infrastructure and Security Operational Policy. Our mission is to provide the best-in-class security to protect the bank. We live and breathe the Allica values and deliver services intelligently using automation, intelligence, and innovation. Role Description An experienced Head of IT Security is required to join a fast-paced … IT division, to facilitate and enhance all aspects of security within the bank. The role will have responsibility for identifying potential threats, proposing and implementing mitigative activities and managing these items through to delivery. Using a rich source of Application and Network data, you will have experience of designing More ❯
You will need to login before you can apply for a job. AWS Sr Application Security Engineer, AppSec -EC2 Sector: Technology Role: Professional Contract Type: Permanent Hours: Full Time DESCRIPTION Help us protect not only the Amazon Web Services (AWS) cloud computing environment but all of our customers as … to bring great ideas to life in ways that aren't possible in traditional IT environments. With AWS you can flexibly harness compute, storage, security, and other services from across the globe as your business demands them. AWS Security is on the cutting edge of many security … hardware, all operating at massive scale. Similarly, our highly collaborative team is committed to each team member's growth as our business grows. AWS Security is looking for an Application Security Engineer to help validate that our services, applications, and websites are designed and implemented to the highest More ❯
product is, someone has to guide the sales process - and you excel at this. You haven't sold just any product, you've sold informationsecurity products. It's a tangled, messy market with confusing, overlapping messages and frequently unclear value propositions. "Market-leading, best-of-breed, next … to hear from you. You're our kind of seller. What Expel can do for you We provide an opportunity to solve real business security problems with a Sales Done Right attitude We let you tap into a market space ripe for success with our offerings We connect you … with cloud first companies who truly want to get better at informationsecurity and are eager to share their points of view. We offer you people and a company who want to deliver an outstanding solution, and to reach the right customers we need to be phenomenal at More ❯
components of a work ethic taken very seriously since the company was founded in 1959. Tradition is currently seeking to appoint a Senior IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support InformationSecurity risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service vendors to manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage … and continuously improve security tools, including vulnerability management, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetration More ❯
components of a work ethic taken very seriously since the company was founded in 1959. Tradition is currently seeking to appoint a Senior IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support InformationSecurity risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service vendors to manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage … and continuously improve security tools, including vulnerability management, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetration More ❯
Our client, a city-based commodities business is seeking a Cyber Security Specialist to join this fantastic team. The role reports into the Into the InformationSecurity Manager (ISM). Role Scope: Support the ISM in managing the confidentiality, integrity, and availability of electronic information, working … within the Operational Resilience team. Enforce policies, support procedures, ensure regulatory compliance, and collaborate with various departments on security-related initiatives. The role is ideal for someone with technical expertise in cyber incident response and analysis. Key Responsibilities: Support Cyber Security Operations, Incident Response and Investigations. Enforce security policies and ensure regulatory compliance. Analyse security data using Excel, Python, and PowerBI. Conduct IT security risk assessments and basic security analysis. Respond to security incidents and document findings. Collaborate with IT, legal, and compliance teams. Maintain security documentation in Confluence and Jira. Develop More ❯
Our client, a city-based commodities business is seeking a Cyber Security Specialist to join this fantastic team. The role reports into the Into the InformationSecurity Manager (ISM). Role Scope: Support the ISM in managing the confidentiality, integrity, and availability of electronic information, working … within the Operational Resilience team. Enforce policies, support procedures, ensure regulatory compliance, and collaborate with various departments on security-related initiatives. The role is ideal for someone with technical expertise in cyber incident response and analysis. Key Responsibilities: Support Cyber Security Operations, Incident Response and Investigations. Enforce security policies and ensure regulatory compliance. Analyse security data using Excel, Python, and PowerBI. Conduct IT security risk assessments and basic security analysis. Respond to security incidents and document findings. Collaborate with IT, legal, and compliance teams. Maintain security documentation in Confluence and Jira. Develop More ❯
A Career with Point72's Global InformationSecurity Team Our Global InformationSecurity team's mission is to ensure the development, implementation, and management of a comprehensive program that effectively protects the confidentiality, integrity, and availability of Point72 information assets. Our team is comprised of … security professionals with expertise in a diverse portfolio of security disciplines. What you'll do Design and implement secure Windows Server and Active Directory architectures at scale Architect and maintain hybrid identity solutions integrating on-premise AD with EntraID (Azure AD) and Okta Configure and manage AD delegation … following least privilege principles Implement and maintain identity protection solutions (eg: Defender for Identity, CrowdStrike Identity Protection, Quest Active Roles, etc) Develop and enforce security standards for Windows Server deployments, including bare metal, VMware and public cloud (AWS, Azure, GCP) Collaborate with Endpoint Engineering teams to secure Windows endpoints More ❯
the values and standards we set for ourselves in the CDW Way, the CDW Way Code (our code of ethics and business conduct), the Information Management System (IMS), and all other policies and procedures relevant to your role. Each coworker has a responsibility to ask questions when they are … any customer problems, feedback, service outages, and service improvement suggestions to management. Each coworker is required to comply with CDW's policies relating to InformationSecurity and Data protection, specifically to: Protect all information assets from unauthorised access, disclosure, modification, destruction & interference Treat the security of … all information assets according to their designated informationsecurity classification Ensure that they only access information assets that they are authorised to do so. Adhere to the procedure for reporting any security weakness or event Commit to, and participate in, personal development of informationMore ❯
Central London, London, United Kingdom Hybrid / WFH Options
Police Digital Services
reporting and assurance to principal stakeholders Support implementation of the PDS Cyber Services (CS) strategy, roadmaps and business plans, bids and business cases Monitor security, technological, social and scientific trends that could influence the National Policing policy Ensure that outcomes and benefits are maximised from all people, process and … Forge strong relationships with National Policing Programme personnel and key stakeholders across Policing Work closely with the DDAT and Technical Operations team to manage security decisions Provide technical and security architectural input and recommendations to the Project and wider CS services Consult on and develop informationsecurity and risk policies, standards and guidelines for National Policing Apply and implement Secure by Design Provide security advice, secure solutions and risk identification and quantification for National Policing projects and programmes Input into the overall National Policing Target Architecture providing specific informationsecurity considerations into designs More ❯
Client's Security Team Overview The client's security team is the central engine driving data and systems security at the company, supporting it and all of its family of apps. The org is responsible for inhibiting malicious actors from compromising our environment, detecting, and responding to … infrastructure to production to external services, interfacing with nearly every team in the company. Position Overview The Software Engineer should have prior experience with security policy, risk, and access management disciplines and be comfortable collaborating with cross-functional teams. This position will be responsible for identifying and enforcing solutions … to control access to internal systems. An ideal candidate is someone that has technical knowledge of the broad aspects of informationsecurity and is able to identify deficiencies in the access management space. This role specifically needs deep conceptual understanding of the IAM concepts that can be applied More ❯
public AWS offerings like S3, EC2, and CloudFront. We are innovating new ways of building massively scalable distributed systems. At Amazon Web Services (AWS), Security is our highest priority. At AWS' scale, we invent new ways to provide the highest level of assurance to our security conscious customers. … AWS Security is looking for a Security Assurance Specialist who can prioritize well, communicate early and clearly, and has a solid understanding of security and compliance within a cloud environment. The Security Assurance Specialist will be part of the team which is responsible for demonstrating the … security controls of services offered by AWS. This position will be focused on the Security Assurance function, leading on day-to-day security assurance activities, evaluating compliance and providing evidence of how they meet the requirements of our most security conscious customers. At AWS we are More ❯
Head of Cyber Security and Infrastructure We are seeking a Head of Cyber Security and Infrastructure to join our global Information Technology leadership team. The department The IT department comprises approximately 60 staff across locations including London, Paris, Piraeus, Dubai, Hong Kong, Sao Paulo, Melbourne, Perth, Singapore … systems and data are secure, available, and performant, aligned with the IT Strategy. The role requires operating at SFIA levels 6 and 7 within InformationSecurity and Technology Service Management disciplines, including: Developing and implementing an enterprise informationsecurity strategy aligned with business goals. Ensuring compliance … between business strategies and information security. Providing expertise, guidance, and systems for strategic and operational plans. Engaging with stakeholders to develop and manage services meeting security and quality standards. Planning and managing processes, tools, and techniques for monitoring technology service performance. Building strong relationships with key stakeholders and More ❯
Senior Security Consultant, ProServe (ASEAN), Security, Risk & Compliance Are you a Security, Risk, and Compliance specialist who can address the challenges of migrating systems and workloads to the Cloud? Are you skilled at helping customers and partners address their informationsecurity requirements using Cloud computing … most interesting computing workloads in the world? Your mandate will be to help our customers and our partners with their Cloud adoption journey. Our Security, Risk, and Compliance consultants will deliver architecture guidance, design and implement security controls on cloud projects, and consult with and enable customer/… partner in cloud security domains and support ProServe field engagements as the security subject matter expert. AWS consultants will collaborate with customers and partners to address the security, risk, and compliance needs of their AWS engagements. This role will specialize in all aspects of informationsecurityMore ❯
Senior Security Engineer, Detection and Response London, UK Please note this is for London, UK. You only need to apply to one location if there are multiple listed for the job. At Ripple, we're building a world where value moves like information does today. Through our crypto … system and creating greater economic fairness and opportunity for more people, in more places around the world. THE WORK: Ripple is looking for passionate InformationSecurity professionals to build a world-class InformationSecurity program. As part of the InformationSecurity team, you will … accomplish this, we are building data pipelines and detections, automating incident response, and developing leading-edge solutions to collect and analyze data in both security incidents and investigations. As a Detection and Response Engineer, you will build and grow your career in all of these areas. WHAT YOU'LL More ❯
Overview: We’re seeking a proactive and detail-oriented InformationSecurity Analyst to join a London based Banks growing security function. Reporting to the Cyber Security Manager , you will support the daily operational security activities across the business. This role is ideal for a professional … with 2–3 years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and … analyze daily security logs using SIEM tools (e.g., Splunk, Sentinel, Defender). Identify false positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help More ❯
Overview: We’re seeking a proactive and detail-oriented InformationSecurity Analyst to join a London based Banks growing security function. Reporting to the Cyber Security Manager , you will support the daily operational security activities across the business. This role is ideal for a professional … with 2–3 years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerability management support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and … analyze daily security logs using SIEM tools (e.g., Splunk, Sentinel, Defender). Identify false positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & Vulnerability Management Assist with running and analyzing vulnerability scans; help More ❯
building and delivering the next generation of cloud computing that supports public AWS offerings like S3, EC2, and CloudFront. At Amazon Web Services (AWS), Security is our highest priority. AWS Security is looking for a Security Assurance Specialist who can prioritize well, communicate early and clearly, and … has a solid understanding of security and compliance within a cloud environment. The Security Assurance Specialist will be part of the team responsible for demonstrating the security controls of services offered by AWS. This position will focus on the Security Assurance function, leading day-to-day … security assurance activities, evaluating compliance, and providing evidence of how they meet the requirements of our most security conscious customers. Key job responsibilities: Collaborate with internal teams and customers to establish baselines and agree on the security requirements and associated security controls. Manage requests for evidence More ❯
At Miro, the Security Stream is dedicated to fostering business growth and enduring customer trust by implementing advanced security measures. They develop balanced security strategies, providing assurance and empowering engineering teams with the necessary tools and guidance. This support covers secure cloud management, establishing secure development practices … and effectively detecting and mitigating security incidents. A key part of this is the Trust & InformationSecurity Team, which concentrates on maintaining the highest informationsecurity standards to safeguard the data and privacy of Miro's customers, employees, and stakeholders. This team manages business risks … ensures adherence to legal and regulatory requirements, and promotes a culture of security awareness. Additionally, they act as trusted compliance advisors to the Go-To-Market (GTM) teams, helping to enable and speed up strategic sales initiatives. About the Role We are seeking a highly knowledgeable and customer-centric More ❯
is regulated by the Bank of England. • VLL is also an integral member of the Mastercard Group and with it the benefits of financial security, economies of scale as well as access to innovative technologies and a global talent base. The Team • VLL operates a 3 Lines of Defence … processes as well as coordinate the implementation and embedding of operational risk change initiatives across the 1LOD functions. • Consolidate, review and report key risk information to appropriate governance forums, key stakeholders, and 2LOD functions. Responsibilities of the role • Provide robust risk advice and challenge to 1LOD functions by leveraging … effective 1LOD adoption of the firms risk management policies and processes. • Support risk assurance activities conducted on the 1LOD through the provision of required information and explanation. • Work with 1LOD functions to conduct ad hoc risk assessments and deep dive root cause analysis on priority risk areas or areas More ❯
every decision we make and action we take, guiding us to deliver impact how and where it matters most. Connect to your opportunity A Security Architect operates as a senior member of the team, responsible for the design of technical security solutions, maintaining documentation, developing architecture patterns and … approaches for new technologies and solutions. As a senior member of the team, the Security Architect also brings experience in managing and supporting people and helps others thrive in their careers. The Security Architect will lead technical engagements and bring together technical security SMEs such as Identity … Security Testing, and Privacy to solve business problems. As a senior member of the technical team, security architects must develop relationships with key stakeholders, understand a client's security policy framework, and design solutions that will meet our client requirements. Our projects vary greatly, and your responsibility More ❯
Cyber and InformationSecurity Analyst | Financial Services | IT | London | (Hybrid) 2 days a week in the office per week | Permanent | £58,500 pa | Our London based client is seeking a Cyber & Security Analyst to assist in protecting their IT infrastructure, networks, and data from cyber threats. This … hybrid role will cover both InformationSecurity and Cyber Security. You will assess security risks, implement proactive measures, monitor systems for security breaches and respond to cyber incidents. Essential Experience: Experience of one or more SEIM solutions, including Azure Sentinel Experience of oone or more EDR … CK framework Strong communication skills Excellent analytical and problem-solving skills Essential Qualifications: Cybersecurity relevant certification from CompTia , SANS, GIAC or ISC2 Microsoft Certified Security Operations Analyst Associate or similar qualification Location: London Hybrid : 2 days a week in the office/3 days working from home Salary More ❯
A brilliant growing client of mine in London is currently looking for an experienced ' InfoSec Lead ' to join their team. The successful candidate must have excellent communication skills and the ability to work closely with key clients, explaining technical terms to non-technical stakeholders. They also must have experience working … for a B2B SaaS Company. If you have worked a similar role in a startup environment this is a bonus. Job Title: InformationSecurity Lead Salary: Up to £75,000 Location: London (Hybrid - 2 Days Onsite a Week) Start: ASAP Responsibilities: Security Leadership: Own and lead info … security, align with business. ISO 27001 & ISMS: Maintain/evolve certification and ISMS. Risk & Compliance: Risk assessments, remediation, audits, GDPR compliance. Policies & Training: Create/manage policies, deliver security training. Security Operations: Implement controls (access, encryption, logging), lead incident response, manage pen tests/vulnerabilities. Customer/ More ❯