Nice to have experience in digital marketing solutions (mobile, web analytics, optimization, email); combined with SaaS product environment Familiarity with e-commerce specific terms and configuration is preferred Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks come with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
a structured, value-led engagement model, you'll help unlock scalable growth in B2B card acceptance - powering supplier enablement, ecosystem collaboration, and real-world impact across global markets. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. Similar More ❯
Mastercard's Commercial Acceptance strategy, you'll define and scale solutions that unlock supplier value, power acquirer growth, and shape the future of B2B commerce around the world. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks come with inherent risks. Every person working for or on behalf of Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach; Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
open-source solutions, and embracing enterprise agile methodology. We encourage professional development to ensure you bring innovative ideas to our products while satisfying your own intellectual curiosity. Our Global InformationSecurity team's mission is to ensure the development, implementation, and management of a comprehensive program that effectively protects the confidentiality, integrity, and availability of Point72 information assets. Our team is comprised of security professionals with expertise in a diverse portfolio of security disciplines. What you'll do Collaborate with the DevOps team to design, implement, and manage a robust DevSecOps framework for our software development pipeline, integrating security tools and processes into our CI/CD workflows to enhance the developer experience … Champion a security-first mindset within the development team, promoting secure coding practices and providing guidance on secure development methodologies Create security focused DevSecOps policies and standards and provide training and awareness to the development team Develop Key Risk Indicators (KRIs) to track security posture across business lines, measure progress and identify outliers Implement and manage securityMore ❯
This is a key role for someone with the technical skills, automation mindset, and proactive attitude to take the capability to the next level. Reporting to the Head of Security Engineering within the InformationSecurity function , the ideal candidate will have strong scripting and automation skills, experience in hybrid environments (on-prem and cloud), and the initiative … configurations, and best practices, aligned to frameworks such as ISO 27001, NIST, and CIS. Integrate vulnerability scanning and remediation into CI/CD pipelines and development workflows to ensure security at speed. Automate data collection, triage, reporting, and ticketing processes using scripting languages such as Python, Bash, PowerShell, or Go. Collaborate with IT, DevOps, and engineering teams to remediate … Scope and coordinate penetration testing activities; track remediation and risk acceptance outcomes. Monitor, measure, and report on vulnerability management performance, including KPIs, SLAs, and risk metrics. Develop and document informationsecurity processes and policies related to vulnerability detection, triage, remediation, and escalation. Coordinate and lead regular remediation meetings with engineering, DevOps, and infrastructure teams to track progress and More ❯
Croydon, England, United Kingdom; Manchester, England, United Kingdom Janes empowers military, government, and defence leaders to act with confidence in an increasingly complex world. Our trusted defence, security, and geopolitical information delivered through seamless digital platforms and system integrations-turns overwhelming data into clear, actionable intelligence and insight. By filling critical information gaps, Janes helps customers analyse … threats, accelerate decisions, and stay ahead of emerging challenges. Job purpose: We are seeking an experienced Security Compliance Specialist with expertise in implementing and maintaining security monitoring and compliance programmes. The must have a strong background working with development teams and cloud-based service providers. You will be working as part of a team based in either Croydon … practice The ideal skills and experience for this role are: 6+ years experience in InformationSecurity Risk and Compliance Knowledge of security and compliance standards across InfoSec (e.g. ISO 27001, Cyber Essentials, NIST, CMMC) Expertise in Azure, Microsoft 365 & AWS Security Compliance Experience of Supply Chain compliance 27 days of annual leave Healthy half (0.5 day More ❯
UiPath, we're enabling the fully automated enterprise-but innovation must be secure to be transformative. That's where you come in. We're looking for a Field Chief InformationSecurity Officer (Field CISO) to serve as a strategic security advisor to our customers and partners, guiding them through the complex landscape of compliance, governance, and secure … development of Automations and Agentic AI. You'll work at the intersection of customer success, product innovation, and cybersecurity thought leadership-translating strategic security insights into real-world impact. What you'll do Act as the primary security advisor for clients, assessing their needs, and providing strategic recommendations. Conduct security risk assessments and design tailored strategies that … align with business goals and regulatory requirements. Educate clients on how to leverage UiPath's platform for secure SDLC and best-in-class security outcomes. Deliver executive-level thought leadership, representing UiPath in industry forums, events, and customer engagements. Collaborate with internal teams (Product, Sales, Legal, Engineering) to align customer needs with product and roadmap decisions. Create and scale More ❯
Career Opportunities: InformationSecurity Consultant 1 (10764) Requisition ID 10764 -Posted - Years of Experience (2) - Technology - Where (1) Spike Reply is a Company within the Reply Group focusing oncybersecurity and protection of digital assets.Its mission is tosafeguard the Confidentiality, Integrity and Availability of Data and Systems that empower its Clientsto innovate and generate growth for a global, sustainable … digital world. Together with its Partners, the Company providesvendor-agnostic consulting servicesthat help Enterprises achieve group-wide aligned, security-oriented solutions and culture. Role overview: We're looking for a hands-on Cloud Security Consultant who lives and breathes AWS. Your core role is to be the engineer that can dissect designs, model attack paths, and give hands … on examples to teams of what good looks like. On any given engagement you might threat model, assess pipelines, learn a DSL from a security vendor so that you can complete a proof of concept, or build toolkit to help your team. We don't expect you to know it all. Responsibilities: Threat modelling & architecture reviews - break down new More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group
Cyber Security Manager Croydon, South London Hybrid working - 2 days per week in the office Cyber Security Manager needed for a leading organisation based in Croydon, who are looking to employ an experienced Cyber Security Manager with an in-depth knowledge of Cybersecurity frameworks, tools, and technologies, ISO27001 adoption, Incident management and Change management. This role involves … the development and implementation of security strategies, policies, and procedures to protect against cybersecurity threats, as well as actively monitoring and responding to security incidents. Salary expectation: * Salary: £70,000 per annum * 25 day's annual holiday * Pension Plan * Flexible working * Hybrid working - Office 2 days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls * Threat Detection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches * Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. Responsible for writing incident reports, gathering input across the technical and More ❯
South Croydon, Surrey, England, United Kingdom Hybrid / WFH Options
Gold Group Ltd
Cyber Security Manager Croydon, South London Hybrid working - 2 days per week in the office Cyber Security Manager needed for a leading organisation based in Croydon, who are looking to employ an experienced Cyber Security Manager with an in-depth knowledge of Cybersecurity frameworks, tools, and technologies, ISO27001 adoption, Incident management and Change management. This role involves … the development and implementation of security strategies, policies, and procedures to protect against cybersecurity threats, as well as actively monitoring and responding to security incidents. Salary expectation: * Salary: £70,000 per annum* 25 day's annual holiday* Pension Plan* Flexible working* Hybrid working - Office 2 days per week Some of the main duties of the Cyber Security Manager will include: * Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls* Threat Detection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches* Incident Management : Lead incident response activities, coordinating with IT teams to mitigate risks and minimise damage. Responsible for writing incident reports, gathering input across the technical and More ❯
Our team of hundreds of skilled experts keep Formula 1 moving. We’re on the lookout for a Security Engineer. Reporting to the Cyber Security Manager, the main purpose of this role is to support the development and management of security technologies across F1’s growing technology landscape. Main Duties & Responsibilities: Assess and maintain high standards of … security maturity across Formula 1’s cloud infrastructure Focus on new and existing infrastructure, managing technical vulnerabilities, support continued system maintenance, and minimise technical debt Ensure visibility and reporting of Cloud infrastructure against Formula 1’s compliance and security standards (such as ISO 27001 and CIS) Main duties to be carried out include, but not limited to: Vulnerability … Management and reporting across Formula 1’s cloud environment(s), including: Development of requirements, design, and implementation of cloud security tools (E.g. compliance and host security) A key focus on threat detection and risks across cloud environments Identification, remediation, and reporting of security vulnerabilities Reporting on compliance to F1’s security standards Support in the delivery More ❯
been a better time to join EQ. Job Summary EQ is currently in the process of migrating its applications and infrastructure into the Public Cloud (AWS). The Cloud Security Architect will work with the Head of Security Engineering to support this project and drive the design and deployment of secure services into AWS. This position requires deep … knowledge and experience with AWS tools, capabilities, and resources, with a deep understanding of cloud-based infrastructure resources, monitoring tools, and advanced security controls. Roles and Responsibilities The Cloud Security Engineer will be required to undertake the following specific activities: Assist the Head of Security Engineering in the development and maintenance of a Cloud Security Architecture … and Roadmap , jointly with the Group IT Technical Architecture team. Act as the EQ Technical Design Authority for the implementation AWS security solutions. Lead the formulation and enhancement of cloud security controls across the EQ group infrastructure. Create and manage comprehensive security documentation and designs for technical and process controls. Play a key role in shaping EQ More ❯
Are you ready to shape the future of secure AI? Join a global leader in information and communication technology, recognised for their expertise in private networks, cloud, hosting, IP networking services, and pioneering work in IPv6 transit technology. With operations spanning 14 countries across the Asia Pacific region, this organisation supports over 5,000 clients and employs more than … also operate 16 advanced data centres in eight countries, providing cutting-edge solutions that power digital transformation and connectivity across the region. The team is seeking a Senior AI Security Architect to design, implement, and safeguard AI powered architectures, ensuring secure, ethical, and resilient AI deployment across complex enterprise environments. This role offers the chance to work at the … forefront of AI security, balancing innovation with robust governance and compliance standards. Looking to lead the way in securing AI innovation? Apply now! Responsibilities: Architect secure AI/ML systems and supporting infrastructure Conduct risk assessments focusing on AI-specific vulnerabilities Ensure data security and privacy compliance Drive ethical AI initiatives, focusing on fairness, transparency, and bias mitigation More ❯
Croydon, London, United Kingdom Hybrid / WFH Options
Gold Group Limited
Location: Croydon Salary: Up to £70000.00 per annum Benefits & Hybrid working Sector: IT & Telecoms Type: Permanent Contact: Simon Kiely Job Published: 1 day ago Cyber Security Manager Croydon, South London Hybrid working - 2 days per week in the office Cyber Security Manager needed for a leading organisation based in Croydon, who are looking to employ an experienced Cyber … Security Manager with an in-depth knowledge of Cybersecurity frameworks, tools, and technologies, ISO27001 adoption, Incident management and Change management. This role involves the development and implementation of security strategies, policies, and procedures to protect against cybersecurity threats, as well as actively monitoring and responding to security incidents. Salary expectation: Salary: £70,000 per annum 25 day … s annual holiday Pension Plan Flexible working Hybrid working - Office 2 days per week Some of the main duties of the Cyber Security Manager will include: Security Strategy & Implementation: Design, implement, and maintain comprehensive cybersecurity policies, procedures, and controls Threat Detection & Response: Continuously monitor the digital environment for potential vulnerabilities and security breaches Incident Management : Lead incident More ❯
A hybrid role that provides an efficient and cost-effective delivery of first and second-line support for information systems and related technology services within Octavia. To support the smooth operational running of Octavia's DT Infrastructure and Applications. Key Responsibilities Infrastructure Support Provide first and second-line support of issues regarding the DT and communications infrastructure, in accordance … team as and when required Business Continuity Ensuring backup regimes are effective and tested regularly Be aware of technical aspects of business continuity testing and implementing solution where necessary Security & Governance To uphold data protection and informationsecurity good practice, advising staff on good practice and escalating these and related issues when necessary Maintain security against … hacking, viruses, spyware etc In conjunction with suitably accredited suppliers, develop and maintain appropriate security measures against internal and external threats Ensure IT infrastructure and where applicable applications are documented to a high standard and that appropriate change management protocols are complied with Implement agreed actions recommended by audit and/or relevant regulatory and legal requirements as and More ❯
world how the adversary works. Examples of desirable skills, knowledge and experience Undergraduate with a US College Degree Program in one of the following majors or equivalent: Computer Science, Information Technology, InformationSecurity, or Computer Security or Information Systems. At least 2 years experience in tracking and analyzing cyber campaigns utilizing technical indicators such as … Experience analyzing, tracking and defending against phishing and BEC attacks Working knowledge of email authentication protocols, and experience in email header analysis You have the ability to synthesize technical information and document it in a non-technical manner including through graphical and verbal depictions You have excellent English skills, both. verbal and written You are capable and comfortable communicating … created the Athenian Project to ensure that state and local governments have the highest level of protection and reliability for free, so that their constituents have access to election information and voter registration. Since the project, we've provided services to more than 425 local government election websites in 33 states. 1.1.1.1 : We released 1.1.1.1 to help fix the More ❯
a culture of learning within the team, enhancing the professional capabilities of team members. Who We Look For - Bachelor's degree or higher, with 5+ years of experience in security assessment, IT audit, or consulting at a leading professional consulting firm or legal firm, in-house experience working in multinational company is a bonus - Strong understanding of global compliance … marketing) and experience in compliance/product workflow design; experience in the internet/gaming industry is a plus. - Expertise in global privacy regulations, including privacy principles, operational legal security frameworks, and compliance solutions. - Proficient in IT audit, informationsecurity management, and IT/technology risk management, with the ability to resolve compliance risks effectively. - Knowledge of … security control frameworks (e.g., ISO27001, ISO20000, ITIL, COBIT) and experience collaborating with informationsecurity teams to implement compliance requirements. - Strong problem-solving skills, proactive work ethic, flexible thinking, and the ability to thrive under pressure. - Able to use English and Chinese as working language to interact with stakeholders across the global Equal Employment Opportunity at Tencent As More ❯
research and make recommendations on products, services, protocols, and standards in support of all infrastructure procurement and development efforts Assist with the planning and deployment of infrastructure and cloud security measures Develop, implement, and maintain policies, procedures, and associated training plans for cloud administration Ensure services conform to the agreed compliance requirements set forth by current and planned accreditations … to continuously optimise systems and processes, using stakeholder feedback, taking account of technological improvements and new design patterns with cloud technologies Key Working Relationships Internal: Economists/Business Analysts Information Technology/Infrastructure Architects CIO/Head of IT Marketing & Business Development External: As Required Skills, Knowledge & Expertise Required: 6+ years of experience in IT Support and Operations Excellent … communication skills. You will have a natural ability to build rapport with stakeholders at all levels to influence decisions Proven experience in IT infrastructure, Cloud and Security systems planning and development following best practices and informationsecurity Significant experience with Microsoft Azure, Intune, PIM and storage accounts Experience in evaluation and decision making Working technical knowledge of More ❯
models, subscription-based services, SLAs, and regulatory compliance. Advise on data protection, privacy, and cybersecurity obligations in commercial agreements, ensuring compliance with GDPR and other regulations. Draft and negotiate informationsecurity addenda, Data Processing Addendums (DPAs), and related agreements. Apply a working knowledge of revenue recognition principles to structure transactions in alignment with ASC 606 and collaborate with … revenue outcomes. Previous SaaS, Cloud or related infrastructure experience, with a track record of negotiating complex agreements in enterprise IT or cloud computing environments preferred. Expertise in privacy and informationsecurity laws and regulations, with experience drafting and negotiating DPAs and security addenda, as well as familiarity with product and security addenda preferred. Previous experience with More ❯
Are you passionate about cloud security and eager to make a difference in a fast-growing environment? An established law company with over 280 years of experience with setting new standards and shaping the future of law, is seeking for a skilled Cloud Security Engineer to join the team! As one of the top-tier leader in the … industry, they excel in areas that are of utmost importance to clients and businesses globally. The company is searching for a skilled Cloud Security Engineer to join the team, focused on evaluating and optimizing security configurations across Azure IaaS and GCP platforms. If you would like to learn more about this opportunity, feel free to reach out and … apply today! Responsibilities: Assess and enhance security configurations across Azure IaaS and GCP environments Provide expert recommendations aligned with industry standards and emerging security threats Administer Azure security environments, focusing on IaaS, container security (e.g., AKS), and DevOps pipelines Evaluate Terraform scripts, advising on automation processes for secure infrastructure deployment Optimize Azure Defender and other monitoring More ❯
DV Cleared Security Assurance Co-ordinator - London 5 days a week onsite - market rates inside IR35 -until 27.03.2027 Top 2 Evaluation Criteria 1. Active DV Clearance and a sole UK National 2. Strong background in informationsecurity, compliance, or assurance. Essential: * Experience working in a secure or regulated environment (e.g., Defence, Government, Nuclear, Finance). * Strong background … in informationsecurity, compliance, or assurance. * Confident communicator across technical, military, and civilian stakeholders. * Proven ability in audits and physical assurance checks. * Strong judgement, initiative, and ability to operate effectively in a small, high-trust team. * MS Office suite Desirable: * Experience with or understanding of CASD (Customer Access Security Device). * Knowledge of PKI operations and secure … credentialing. * ITILv4 Foundation or Agile SAFe Foundation certifications. * Previous experience within a secure government department. * Membership in a relevant professional body (e.g., BCS, ISACA, IISP). DV Cleared Security Assurance Co-ordinator - London 5 days a week onsite - market rates inside IR35 -until 27.03.2027 Damia Group Limited acts as an employment agency for permanent recruitment and employment business for More ❯
s strategic thinking on data privacy compliance, driving the standardization of data collection and handling systems, processes and documentation across jurisdictions and activities. Together with the Group's Chief InformationSecurity Officer, assist in strategic leadership on informationsecurity matters to ensure compliance with data privacy laws and regulations and international security standards and privacy More ❯
threat actors who attempt to evade our cyber defenses. This is a hands-on technical position where you'll play an important role in increasing the maturity of our Security Operations Centre (SOC). Additionally, you'll need a strong drive and willingness to learn and grow. You'll be in a rapidly evolving environment, which will bring new … challenges and opportunities for growth regularly. You'll be empowered to develop and explore your unique passion for cyber security operations. In return, we offer an agile working environment with the latest technologies such as SASE, AI, and automation. One of our main values is empowerment, allowing people to drive significant change and make a difference. Simply Business is … a cloud-native company leading in the InsureTech market. You will report to Laura, the Security Operations Manager, and work alongside an award-winning team of 5 analysts and 3 engineers with diverse technical skills and backgrounds in cyber security. As our Lead Cyber Security Analyst, you'll: Develop and maintain the security incident response process, including More ❯
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
AWS Cloud Security Engineer – Contract (Inside IR35) Hybrid 2/3 days from the London office We are seeking an experienced Cloud Security Engineer with a strong emphasis on AWS. This is a hands on role, the successful candidate will be responsible for designing, implementing, and maintaining secure cloud infrastructure, ensuring a robust security posture and supporting … our applications. Key Responsibilities: Design and implement secure AWS cloud infrastructure, focusing on system architecture, Identity and Access Management (IAM), encryption, data protection, and network security. Collaborate with the InformationSecurity and application teams to drive cloud security initiatives and align with the broader security strategy. Enhance and secure CI/CD pipelines across multiple applications … by embedding secure coding and DevSecOps best practices. Develop automation tools and scripts to streamline security processes, monitor key security metrics, and support operational demands. Stay up to date with emerging threats, industry trends, and mitigation techniques to continually improve cloud security controls. Required Skills and Experience: Minimum 3 years in a DevSecOps capacity and 5+ years More ❯