We are seeking a Threat Analyst to join our rapidly growing InformationSecurity team. This is a unique opportunity for an aspiring and motivated professional to be at the forefront of our cyber defence strategy, protecting our brand from existing and emerging threats. You will combine the expertise … be an innovative collaborator with strong technical and communication skills, and an appetite for complex problem solving. Seize the opportunity to join a dynamic security team, reporting to the Head of Cyber Defence, and lead the development of advanced CTI and threat hunting strategies, seamlessly integrating into our security … improvements. What you'll be doing In this role, your key responsibilities will include but not be limited to: Working closely with the wider informationsecurity team, including our MSP SOC, to improve the overall security posture of the organisation. Implementing and utilising our cyber threat intelligence More ❯
The IT Security Lead will report to the Senior IT Director to ensure secure and compliant IT Systems are implemented and maintained throughout the organisation. Client Details Our client is a large and global organisation within the healthcare industry, known for its commitment to innovation and excellence. They have … a significant presence in Newcastle Upon Tyne and a new office in Uxbridge. Description Develop and implement IT security strategies and infrastructure. Lead implementation of Security tools Lead threats and vulnerabilities assessment, analysis and management Monitor and analyse the organisation's security posture on an ongoing basis. … Lead and coordinate IT security incident response efforts, continue improving the incident management process. Ensure compliance with all relevant informationsecurity and healthcare industry regulations. Conduct and facilitate IT security audits and risk assessments. Provide training and guidance on IT security best practices. Develop and More ❯
The IT Security Lead will report to the Senior IT Director to ensure secure and compliant IT Systems are implemented and maintained throughout the organisation. Client Details Our client is a large and global organisation within the healthcare industry, known for its commitment to innovation and excellence. They have … a significant presence in Newcastle Upon Tyne and a new office in Uxbridge. Description Develop and implement IT security strategies and infrastructure. Lead implementation of Security tools Lead threats and vulnerabilities assessment, analysis and management Monitor and analyse the organisation's security posture on an ongoing basis. … Lead and coordinate IT security incident response efforts, continue improving the incident management process. Ensure compliance with all relevant informationsecurity and healthcare industry regulations. Conduct and facilitate IT security audits and risk assessments. Provide training and guidance on IT security best practices. Develop and More ❯
procurement, and implementation. Implementation of standard Mace software solutions. Office infrastructure setup and office moves. Whole IT strategy delivery for a project or programme. Informationsecurity projects including implementation of an InformationSecurity Management System (ISMS) and certification to ISO27001. Disaster recovery and business continuity planning. … right thing Create opportunity - For our people to excel The Business Analyst will lead in analyzing and resolving client business problems by critically assessing information gathered through various elicitation techniques, driving business process improvements, and articulating the rationale for change. Through interviews and workshops, the Business Analyst will define … to advise and guide others. Proficiency in Microsoft Office, Visio, MS Project. Experience in the construction sector is a plus. You'll also have: Security clearance for UK projects and security-restricted work. Work and residency permits for the UK. Mace is an inclusive employer and welcomes diverse More ❯
Third Party Risk Manager (TPRM) Hybrid - London £55k - £65k Are you an informationsecurity professional passionate about Third Party Risk? Experienced leading on … TPRM processes and eager for continuous development? This is the role for you. A global FS firm is looking for someone to join their infosec team to take the lead on implementing third party security frameworks, ensuring any informationsecurity risks are identified and managed. Role and … security environment. Proven experience ensuring effective risk assessments undertaking formal due diligence during the 3rd Party supplier on-boarding process. working knowledge of infosec standards such as ISO27001 Excellent communication and interpersonal skills If this looks interesting to you, please apply or email Georgia at g.cummings@ltharper.com More ❯
Third Party Risk Manager (TPRM) Hybrid - London £55k - £65k Are you an informationsecurity professional passionate about Third Party Risk? Experienced leading on … TPRM processes and eager for continuous development? This is the role for you. A global FS firm is looking for someone to join their infosec team to take the lead on implementing third party security frameworks, ensuring any informationsecurity risks are identified and managed. Role and … security environment. Proven experience ensuring effective risk assessments undertaking formal due diligence during the 3rd Party supplier on-boarding process. working knowledge of infosec standards such as ISO27001 Excellent communication and interpersonal skills If this looks interesting to you, please apply or email Georgia at g.cummings@ltharper.com More ❯
I'm looking for a Head of Cyber Security to join a dynamic PE-backed business, and lead enterprise efforts across IT Security, Cyber Security and Information Security. Reporting directly into their CIO, you will lead a team of 4 and will drive the overall security strategy of the business forward - ensuring that security controls, policies and technologies effectively protect the organisation's assets, infrastructure and data. They are using the MS Security Stack including Defender, Sentinel and Entra ID, and are very ahead-of-the-curve in their respective sector. The ideal … loves being technically in the detail. This role will involve collaborating with the Senior Leadership Team, and providing expert guidance on threat mitigation and security best practices, and ultimately driving the organisation's security programme forward. Whilst they are based in London, they are open to considering candidates More ❯
procurement, and implementation. Implementation of standard Mace software solutions. Office infrastructure setup and office moves. Whole IT strategy delivery for a project or programme. Informationsecurity projects including implementation of an InformationSecurity Management System (ISMS) and certification to ISO27001 Disaster recovery and business continuity planning. … Create opportunity - For our people to excel The Business Analyst will lead in the analysis and resolution of client business problems by critically assessing information gathered through a range of elicitation techniques, driving implementation of significant business process improvement initiatives, and effectively articulating the rationale for change. Through the … Proficient in Microsoft Office packages such as Excel, Visio, and MS Project. Experience of project delivery within construction sector beneficial. You'll also have: Security clearance to work on projects in the UK and on security restricted commissions. Work and residency permit to be able to work in More ❯
Security Incident Response Manager (Cyber Threat) - Global financial services company - Full time permanent role - Salary up to £100,000 plus bonus. Hybrid working (twice a week in the London office) A large global financial services firm is looking for an Incident Response Manager within its cyber threat division. This … is a fantastic opportunity to join a large cyber and informationsecurity team that lead the way in technology and tooling in a 24/7 global environment. Duties will include: - Managing a team of Cyber Threat Analysts that deliver services to global users - Being responsible for continuous … teams on emerging threats - Develop new forensic capabilities - Act as an escalation point (on-call escalation point once a month for weekends) - Deliver on informationsecurity projects - Ensuring services provided meet the business requirements To be considered suitable for this Incident Response Manager role you will need the More ❯
London, Broad Street, United Kingdom Hybrid / WFH Options
Ashdown Group
Security Incident Response Manager (Cyber Threat) - Global financial services company - Full time permanent role - Salary up to £100,000 plus bonus. Hybrid working (twice a week in the London office) A large global financial services firm is looking for an Incident Response Manager within its cyber threat division. This … is a fantastic opportunity to join a large cyber and informationsecurity team that lead the way in technology and tooling in a 24/7 global environment. Duties will include: - Managing a team of Cyber Threat Analysts that deliver services to global users - Being responsible for continuous … teams on emerging threats - Develop new forensic capabilities - Act as an escalation point (on-call escalation point once a month for weekends) - Deliver on informationsecurity projects - Ensuring services provided meet the business requirements To be considered suitable for this Incident Response Manager role you will need the More ❯
negotiation, and resolution. Engage with internal stakeholders to facilitate Aladdin client onsite/virtual assessments and coordinate demonstration of controls and artifacts. Examples include: information/cyber security, user access and provisioning, cloud governance, and SDLC framework. Refine and optimize the Aladdin technology risk framework to scale as … the Aladdin client community expands - work closely with key client partners (e.g. various technology teams, informationsecurity). Lead all aspects of key Aladdin related technology exercises to ensure accurate execution and key client communications. Drive tangible change to the Aladdin risk landscape by leading audit-related projects. … Work directly with Aladdin Engineering team and the BlackRock InformationSecurity team to execute strategic technology initiatives to strengthen the Aladdin platform. About you The successful candidate will be a highly motivated professional interested in shaping the future of financial technology with a proven track record of interfacing More ❯
The Risk Management function is critical to Enstar. The function is structured into various risk towers, including cyber risk. The Cyber Security Risk Analyst is responsible for undertaking and supporting processes to identify, assess, treat and monitor/report on the underlying risk profile. This will involve liaising with … team testing) as well as tracking any findings through to remediation. The role will also support various Management Committee activities as it pertains to InformationSecurity, Data Protection and Artificial Intelligence. What you will be doing: Key Accountabilities: Conduct regular risk assessments, identifying, evaluating, and managing risks to … is exposed. Utilizes risk profiles (risk assessments, metrics, incidents/Root cause analysis, wavers and other relevant performance data) to develop dynamic cybersecurity risk information within Enstars ERM program providing a fully integrated, prioritized, enterprise-wide view of risks needed to drive strategic and business decisions. Monitor the cyber More ❯
About the team: Join our innovative and growing Security Operations (SecOps) Team, where we are dedicated to protecting our organization from evolving threats. We are looking for a skilled and passionate Senior Security Engineer to focus on Threat Detection and Response in a dynamic, hybrid cloud environment. This … is a unique opportunity to lead and enhance our capabilities in detecting, investigating, and responding to security threats. Our Security Operations Team collaborates closely with cross-functional teams across the InformationSecurity organization and external partners. We lead key initiatives, including security monitoring, incident response … vulnerability management, and threat intelligence, all aimed at strengthening our security posture and ensuring resilience against emerging threats. About the role & what you'll do: As a Senior Security Engineer specializing in Threat Detection and Response, you will be at the forefront of our security efforts, leading More ❯
a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of their Cyber Security team while they help revolutionise the UK energy industry. As a UK Critical National Infrastructure provider, InformationSecurity is an integral part … business. Within this role, you will be responsible for the OT vulnerabilities across the organisation’s estate. You will triage, assess, and prioritise identified security vulnerabilities, ensuring mitigating controls are identified and implemented where necessary. You will support security assessments and third parties’ cyber exercises that identify security vulnerabilities, while tracking remediation, risks, and exceptions. We are looking for an individual that has: Must have 2 years’ cyber security experience within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus More ❯
a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of their Cyber Security team while they help revolutionise the UK energy industry. As a UK Critical National Infrastructure provider, InformationSecurity is an integral part … business. Within this role, you will be responsible for the OT vulnerabilities across the organisation’s estate. You will triage, assess, and prioritise identified security vulnerabilities, ensuring mitigating controls are identified and implemented where necessary. You will support security assessments and third parties’ cyber exercises that identify security vulnerabilities, while tracking remediation, risks, and exceptions. We are looking for an individual that has: Must have 2 years’ cyber security experience within an OT environment with strong OT/ICS knowledge about products, architectures and workflows. Experience or knowledge of vulnerability management tools such as Qualys, Nessus More ❯
small team managing the day-to-day technology infrastructure to ensure that the Bank can operate efficiently. Cybersecurity Strategy and Planning Evaluate and proritize security initiatives for the branch in London in collaboration with GT (Group Technology) - Group IT Security. Stay up-to-date with the latest cybersecurity threats … with relevant regulatory standards (eg ISO 27001) as part of critical vendor performance assessment ensuring operational resilience is maintained. In collaboration with GT, manage security systems, including firewalls, intrusion detection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incident response plans and coordinate responses … to security incidents and breaches Raise awareness of cybersecurity issues among bank London employees; conduct annual training/workshops to educate staff on security best practices aligned with GT. Other Duties Maintain professional and technical knowledge (Conduct Rule 2) e.g. by attending educational workshops; read professional publications; benchmarking More ❯
short of challenges. About the role At V7, we empower our customers with cutting-edge AI solutions to transform their operations. As a Senior Security Engineer , you will play a pivotal role in safeguarding our systems, networks, and data while ensuring compliance with industry-leading security certifications such … as SOC 2, HIPAA, and ISO 27001. Your expertise will directly contribute to maintaining trust with our customers and securing their critical information assets. This role sits within the Platform Engineering Team and requires a strong technical background, hands-on experience with security tools, and a collaborative mindset … tackling complex challenges in a fast-paced SaaS environment, this position is for you. What you will do: Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks More ❯
challenges, think differently, and want to make a significant impact, join us at Zopa and make it count. Follow us on The team The InformationSecurity team consists of 16 members across Security Operations, Identity and Access Management, Security Engineering, and Product Security sub-teams. … The role The Associate Security Operations Analyst is a key role reporting to the Security Operations Manager. You will review and respond to security event tickets in Jira, analyze events, assess impacts, and determine responses. This role involves both reactive and proactive security activities, including risk … evaluation and incident response, such as scoping, detection, containment, eradication, and improvement planning. You will monitor security tools like SIEM (e.g., Splunk) for unusual activity. As you gain experience, you'll design and implement detection rules to enhance early threat detection. Creating incident reports and maintaining security documentation More ❯
you will be responsible for developing, documenting, and refining IT procedures following ISO27001:2022 standards. We ask that you have a substantial understanding of informationsecurity protocols and excellent technical writing skills to meet project deadlines. You will be located in our London HQ, on a hybrid work … document IT procedures that comply with ISO27001 standards. Ensure all procedures are clear and easily understood by IT end-users. Collaborate with IT and security teams to gather necessary information and insights. Review/Update Existing Procedures Conduct in-depth reviews of existing IT procedures to ensure compliance … update procedures accordingly. Ensure all documentation is up-to-date and reflects current best practices and regulatory requirements. Ensure Compliance Work with the ITRS Security Manager to ensure all IT procedures align with ISO27001:2022 standards. Review audit findings and assessments to verify compliance. Provide recommendations for continuous improvement More ❯
On behalf of DWP, we are looking for a Head of Security Design for a 12 month (Inside IR35) contract. Hybrid working with 2 days per week required in London, Manchester, Leeds or Newcastle. The Department for Work and Pensions (DWP) is responsible for welfare, pensions, and child maintenance … including the most vulnerable in society. Improve the experience of our services while maximising value for money for the taxpayer. As a Head of Security Design, your main responsibilities will be: Provide leadership to ensure effective security and fraud risk expertise, advice, and support is delivered to include … business managers, Senior Risk Owners, and the Working Age Services SLT within DWP. Establish and manage the Working Age Services security posture and initiatives, ensuring the protection of information assets from internal and external threats. Develop, manage, and enhance the fraud risk management framework to minimize the department More ❯
At Ripple, we're building a world where value moves like information does today. It's big, it's bold, and we're already doing it. Through our crypto solutions for financial institutions, businesses, governments, and developers, we are improving the global financial system and creating greater economic fairness … This role is key to ensuring our global operations are seamless, secure, and scalable. You will collaborate with multi-functional teams, including Engineering and InformationSecurity, to architect a robust network supporting Ripple's innovative platform. WHAT YOU'LL DO: Lead design, implementation, and refinement of Ripple's … Provide technical leadership and innovative solutions for complex challenges. Engineer and refine network monitoring systems to ensure optimal performance and reliability. Collaborate with the InformationSecurity team to fortify the network against threats and ensure compliance. Spearhead initiatives to enhance network efficiency, reduce downtime, and support scalability. Provide More ❯
user provisioning, hands on end-point management including asset management, management of upgrades and device hardening. IT support work with leaders across IT in informationsecurity, operational resilience, engineering and IT operations to support the implementation of the IT strategies and policies. Key areas of responsibility: Provide first … Support and administer enterprise tools such as Microsoft Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and data loss prevention solutions, working in collaboration with informationsecurity teams. Configure and maintain network … infrastructure including Wi-Fi access points, VPNs, and firewalls in accordance with security policies. Assist with the administration and optimisation of document management systems and provide guidance to users on best practices. Document IT processes and maintain an up-to-date asset register, contributing to IT policy updates and More ❯
user provisioning, hands on end-point management including asset management, management of upgrades and device hardening. IT support work with leaders across IT in informationsecurity, operational resilience, engineering and IT operations to support the implementation of the IT strategies and policies. Key areas of responsibility: Provide first … Support and administer enterprise tools such as Microsoft Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and data loss prevention solutions, working in collaboration with informationsecurity teams. Configure and maintain network … infrastructure including Wi-Fi access points, VPNs, and firewalls in accordance with security policies. Assist with the administration and optimisation of document management systems and provide guidance to users on best practices. Document IT processes and maintain an up-to-date asset register, contributing to IT policy updates and More ❯
Job Title: Technical Assurance Manager - Cyber Security (15738) Location: Luton/Hybrid Company Overview: When it comes to innovation and achievement there are few organisations with a better track record. Join us and you'll be able to play a big part in the success of our highly successful … we employ over 10,000 people. Role Overview: The Technical Assurance Manager is part of the Digital Safety Assurance team, overseeing easyJet's cyber security posture. This role acts as the 2nd line of defence, providing oversight of Cyber Security Controls in line with Digital Safety policy, security standards, and compliance requirements. Key Responsibilities: Overseeing, educating and assessing the implementation of Digital Safety policies and security standards. Safeguarding company data throughout all processes and systems. Validating threat models produced as part of the project design process. Conducting security assessments and raising identified cyber risks into More ❯
both business and technical focused. You will have ideas of how to drive the business forward, and be skilled in the commercial aspects of security testing, above all you will know what clients are looking for when they buy security testing and how to deliver it. Management and … STAR-FS, CHECK. Proven experience of successfully managing and delivering testing engagements on time and to budget. Proven experience working within the UK cyber security industry Demonstrable understanding and practical application of informationsecurity principles Strong technical background in computing, networks, and programming. Proven experience of producing … and verbal) Experience leading, coaching and mentoring highly technical teams A genuine interest and desire to work with large multi-national clients in the informationsecurity field. Advantageous: CCT-App or CSTL-App. Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List More ❯