london, south east england, United Kingdom Hybrid / WFH Options
Explore Group
Cyber Security Analyst – Fintech | Hybrid (London) | £55K–£70K + Bonus Join a fast-growing fintech company in central London as a Cyber Security Analyst . We're looking for someone to help protect our systems and data while shaping our overall security posture. What You’ll Do … to embed security in our pipeline Raise security awareness across the company What You Bring: Experience in a security analyst or InfoSec role Hands-on with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+ More ❯
part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and Threat Modelling, encompassing governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration and partnership with … Engineering, InformationSecurity, Program Management, and Development teams are essential. The candidate will conduct technical architecture reviews to pinpoint security opportunities, identify exploitable threats, and propose mitigation strategies. Your Impact •Conduct thorough threat modeling exercises utilizing established methodologies and frameworks •Maintain a rigorous standard of excellence in … seeking an ideal candidate with 8+ years of experience in a range of technologies and processes including: •Proficiency in GCP - essential •Strong knowledge of security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITRE ATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity More ❯
part of a smart cross-functional team delivering digital business transformation solutions to our clients. This position entails an individual contributor role focused on Security Architecture and Threat Modelling, encompassing governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration and partnership with … Engineering, InformationSecurity, Program Management, and Development teams are essential. The candidate will conduct technical architecture reviews to pinpoint security opportunities, identify exploitable threats, and propose mitigation strategies. Your Impact •Conduct thorough threat modeling exercises utilizing established methodologies and frameworks •Maintain a rigorous standard of excellence in … seeking an ideal candidate with 8+ years of experience in a range of technologies and processes including: •Proficiency in GCP - essential •Strong knowledge of security architecture principles, frameworks, and best practices •Experience working with threat modeling methodologies such as MITRE ATT&CK, STRIDE, PASTA etc. •Overall experience in Cybersecurity More ❯
establishing a dedicated OT Cybersecurity hub to address and manage risks within our OT environments. We are seeking an experienced and dynamic OT Cyber Security Senior Manager to lead our risk and vulnerability management processes. In this role, you will be responsible for designing and implementing robust risk and … vulnerability management processes, ensuring alignment with key stakeholders, and conducting thorough risk and threat analyses to maintain the security of our OT assets. In this role you will Lead the OT risk management lifecycle, including risk identification, assessment, mitigation, and acceptance for OT-related security risks, in alignment … with internal standards as well as industry best practice for OT (IEC62443) Collaborate with business unit leads to understand security risks within their environments and their relation to compliance requirements. Provide direction for addressing current and emerging risks, driving resource allocation, training, strategic planning, metrics, and monitoring activities. Conduct More ❯
Do you enjoy leading, guiding, and influencing customers and team members to build secure cloud workloads? At AWS, we're hiring highly technical Security, Risk and Compliance specialists to collaborate with our customers and partners on key customer engagements. You will apply your deep technical expertise to solve complex … role has up to 100% travel associated. This role will be expected to work from customer sites throughout Korea. Key job responsibilities Our Associate Security Consultants will deliver architecture guidance, proof-of-concept projects, and customer/partner workshops. AWS consultants collaborate with customers and partners to address the … security, risk, and compliance needs of their AWS migrations. This role will specialize in all aspects of informationsecurity management as well as business and regulatory compliance using cloud services in large-scale computing environments. Responsibilities include: - Expertise - Collaborate with AWS field sales, training and support teams More ❯
new technical and consulting capabilities to ensure a distinctive voice in the UK Cyber Market. You will also lead the newly developed Cyber/InformationSecurity Consulting Practice and be accountable for its P&L. You will be a specialist in security in large projects as Technical … sectors, Banking and Financial Services, Manufacturing, Service Industries, and HMG regulatory accreditation. Key Responsibilities and Deliverables Include: Strategic Roadmap implementation of IS/IT security restructure programmes, projects of both a GRC and technical nature alongside frameworks such as ISO27001/2:2005/13, DORA, NIS 2, PCI … DSS, GDPR-DPO, NIST CSF SP800-53, PSD-2, FCA/PRA, and MS Azure. Ownership of Strategic, Operational, and Tactical IT Security and Risk Management, technical and legislative mandates ranging from planning, design, build, and budgetary mandates. Programme/Project management of large and corporate security transformation More ❯
focussed Control Assurance Manager. The successful candidate will be part of a team responsible for overseeing the design, implementation and assessment of the organisations Information and Cyber Security (ICS) Control framework. You will play a key role in testing and evaluating the effectiveness of controls, ensuring operational efficiency … outlining control weaknesses and areas for enhancement. Monitoring and Reporting: Monitor the performance of internal controls and prepare regular assurance reports for the Chief InformationSecurity Officer (CISO), ensuring transparency around control effectiveness and risk management. Compliance and Audit Support: Supporting the ICS Assurance team with internal and More ❯
Position : Senior Data Engineer Salary: £55,000 - £65,000 Location : Hybrid - Bristol, Manchester, or London Security Requirement : SC Clearance to start and be willing/able to obtain DV Clearance We are seeking Data Engineers, with a keen interest/experience in AI/ML and strong proficiency in … Python Scripting. To join our Consultancy client working on meaningful projects in the Defence and Security sector. Required Experience: End-to-End Data Development : Strong experience with data pipelines, ETL processes, and workflow orchestration, demonstrating best practices across tech stacks. Strong Python Skills Diverse Data Handling : Familiarity with batch … expertise with modular, reusable, and efficient code in various languages. Development Lifecycle : Understanding of SDLC, CI/CD pipelines, and version control. Data Governance & Security : Knowledge of data security, governance, metadata management, and master data principles. Key Responsibilities: As a Senior Data Engineer, you'll bridge the gap More ❯
by providing them with cutting-edge ideas, best-in-class products and solutions, and unparalleled access to capital and liquidity. The Team: The Chief InformationSecurity Office (CISO) is responsible for looking after the cyber security of all of Citi's technical assets. It has several new … and exciting programmes utilising cutting edge cloud and container technologies, with a view to ensuring that our cyber security is best in class and offers reassurance to our wider business lines and clients alike. The job: This role sits within the Container Security team, which is responsible for … ensuring, maintaining, and improving the security of our container technologies within the firm. You will be responsible for engineering automated security solutions that both secure and harden internal platforms as well as reduce friction for developers in their daily development lifecycle. You will be improving the container SDLC More ❯
channels. Act as an IT project manager ensuring that products or solutions being considered meet business requirements and align to IT Architectural principles, IT Security and informationsecurity policies. Ensure the BAU support for applications are appropriate and that they are within expectations. Be responsible of documentation More ❯
channels. Act as an IT project manager ensuring that products or solutions being considered meet business requirements and align to IT Architectural principles, IT Security and informationsecurity policies. Ensure the BAU support for applications are appropriate and that they are within expectations. Be responsible of documentation More ❯
establishing a dedicated OT Cybersecurity hub to address and manage risks within our OT environments. We are seeking an experienced and dynamic OT Cyber Security Senior Manager to lead our risk and vulnerability management processes. In this role, you will be responsible for designing and implementing robust risk and … vulnerability management processes, ensuring alignment with key stakeholders, and conducting thorough risk and threat analyses to maintain the security of our OT assets. In this role you will Lead the OT risk management lifecycle, including risk identification, assessment, mitigation, and acceptance for OT-related security risks, in alignment … with internal standards as well as industry best practice for OT (IEC62443) Collaborate with business unit leads to understand security risks within their environments and their relation to compliance requirements. Provide direction for addressing current and emerging risks, driving resource allocation, training, strategic planning, metrics, and monitoring activities. Conduct More ❯
ahead, we’re looking for a Security Operations Engineer who is eager to make an impact. You’ll report to the Head of InfoSec and take ownership of Security Operations, helping to shape and strengthen our overall security landscape. You’ll play a key role in shaping … our growing security function and contributing to the maturity of our security programme, building resilient systems, influencing engineering practices, and driving meaningful change in a supportive environment. What You’ll Do Monitor, triage, and respond to security alerts and incidents—investigating and coordinating effective containment, resolution, and … recovery Proactively identify and assess vulnerabilities, recommending and applying improvements to strengthen our defences Design, implement, and maintain security controls across cloud, network, and application environments Continuously improve how we work by developing and refining playbooks, automating processes, and reducing manual effort Collaborate closely with Engineering and IT teams More ❯
This is a global benchmark that recognises employers who create an outstanding employee experience. Overview of the role We are looking for an IT Security Analyst to join our team. You will play a vital role in ensuring the security and compliance of our IT infrastructure. You will … take responsibility for monitoring and responding to alerts and incidents on the EDR platform and helpdesk. You will work closely with our IT Security Manager, internal departments and IT partners to ensure our systems are secure and compliant with industry standards. We are a growing business with new security tools recently implemented. This is a great opportunity to help shape cyber security within the organisation. This is a remote role, with some travel to our services when required. There is also a requirement to be on call on an ad-hoc basis e.g. when dealing with an More ❯
products, services, protocols, and standards in support of all infrastructure procurement and development efforts. Assist with the planning and deployment of infrastructure and cloud security measures. Develop, implement, and maintain policies, procedures, and associated training plans for cloud administration. Ensure services conform to the agreed compliance requirements set forth … processes, using stakeholder feedback, taking account of technological improvements and new design patterns with cloud technologies. Key Working Relationships Internal: Economists/Business Analysts Information Technology/Infrastructure Architects CIO/Head of IT Marketing & Business Development External: As Required Skills, Knowledge & Expertise Required: 6+ years of experience in … You will have a natural ability to build rapport with stakeholders at all levels to influence decisions. Proven experience in IT infrastructure, Cloud and Security systems planning and development following best practices and information security. Significant experience with Microsoft Azure, Intune, PIM and storage accounts. Experience in evaluation More ❯
Manage deep-dive investigations into technology processes Conduct regular risk assessments and provide recommendations Prepare and present reports to senior leadership on IT and security risk posture and attack surface Develop and implement innovative IT risk monitoring solutions Partner with first and second line of defence stakeholders, including risk … managers and security leads to effectively address ICT and security risks Leverage data analytics to revolutionize compliance assurance Drive continuous improvement in our Assurance Program Stay up to date with emerging threats, regulations and their impact on IT assurance BASIC QUALIFICATIONS Experience in compliance, audit or risk management … s degree or equivalent Proven experience in developing and executing compliance or audit testing frameworks 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk Analytical mindset with a talent for problem-solving Excellence in stakeholder management and communication More ❯
Manage deep-dive investigations into technology processes. Conduct regular risk assessments and provide recommendations. Prepare and present reports to senior leadership on IT and security risk posture and attack surface. Develop and implement innovative IT risk monitoring solutions. Partner with first and second line of defence stakeholders, including risk … managers and security leads to effectively address ICT and security risks. Leverage data analytics to revolutionize compliance assurance. Drive continuous improvement in our Assurance Program. Stay up to date with emerging threats, regulations and their impact on IT assurance. BASIC QUALIFICATIONS Experience in compliance, audit or risk management. … s degree or equivalent. Proven experience in developing and executing compliance or audit testing frameworks. 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk. Analytical mindset with a talent for problem-solving. Excellence in stakeholder management and communication. More ❯
Global Security Operating Centre Manager (GSOC) Global Security Operating Centre Manager (GSOC) - Canary Wharf/East London/Hybrid circa 90,000 DOE plus bonus, great benefits, discretionary bonus etc. Global client (18Billion) has a great opportunity for a Global Security Operating Centre Coordination (SOC) Manager to … be responsible for the successful implementation, running and development of a predominately outsourced Security Operations Centre (SOC) across the Groups organisation with a view to global management . The ideal candidate for this role will have a 80/20 mix of SOC management/Service Delivery experience As … a SOC Manager you will be able to demonstrate a knowledge of the current cyber threats and security measures available, this requires a combination of strong business awareness and good technical IT knowledge or experience. You will have at least 5 years of IT experience with significant exposure to More ❯
Global Security Operating Centre Manager (GSOC) Global Security Operating Centre Manager (GSOC) - Canary Wharf/East London/Hybrid circa £90,000 DOE plus bonus, great benefits, discretionary bonus etc. Global client (18Billion) has a great opportunity for a Global Security Operating Centre Coordination (SOC) Manager to … be responsible for the successful implementation, running and development of a predominately outsourced Security Operations Centre (SOC) across the Groups organisation with a view to global management . The ideal candidate for this role will have a 80/20 mix of SOC management/Service Delivery experience As … a SOC Manager you will be able to demonstrate a knowledge of the current cyber threats and security measures available, this requires a combination of strong business awareness and good technical IT knowledge or experience. You will have at least 5 years of IT experience with significant exposure to More ❯
City of London, London, Canary Wharf, United Kingdom
Fusion People Ltd
Global Security Operating Centre Manager (GSOC) Global Security Operating Centre Manager (GSOC) - Canary Wharf/East London/Hybrid circa £90,000 DOE plus bonus, great benefits, discretionary bonus etc. Global client (18Billion) has a great opportunity for a Global Security Operating Centre Coordination (SOC) Manager to … be responsible for the successful implementation, running and development of a predominately outsourced Security Operations Centre (SOC) across the Groups organisation with a view to global management . The ideal candidate for this role will have a 80/20 mix of SOC management/Service Delivery experience As … a SOC Manager you will be able to demonstrate a knowledge of the current cyber threats and security measures available, this requires a combination of strong business awareness and good technical IT knowledge or experience. You will have at least 5 years of IT experience with significant exposure to More ❯
Employment Type: Permanent
Salary: £90000 - £100000/annum hybrid, great benefits
closely with cross-functional teams, including product management, operations, legal, and finance, to ensure alignment and effective execution of pricing strategies. Present complex financial information and pricing strategies to senior leadership, effectively communicating key findings and recommendations. Stay abreast of industry trends, regulations, and best practices in the payments … and valuation; in-depth understanding of the payments value chain (merchants, brands, acquirers, networks, issuers). Limited global travel but required as needed. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks come with an inherent risk to the organization. Therefore, every person working … for or on behalf of Mastercard must: Abide by Mastercard's security policies and practices. Ensure the confidentiality and integrity of the accessed information. Report any suspected informationsecurity violation or breach. Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
Deployment: Install, configure, and optimize server systems as per technical requirements. Capacity Planning: Monitor and plan for hardware or resource constraints; recommend necessary upgrades. Security Management: Apply security best practices including firewalls, patching, access controls, and intrusion prevention. Vendor Collaboration: Liaise with external service providers to execute changes … in compute and storage environments. Experience with both Windows and Linux server administration. Scripting and automation skills (Python, Terraform, Ansible, etc.). Understanding of informationsecurity, compliance, and risk management. Experience Experience with enterprise hardware (servers, storage, network devices). Knowledge of virtualization (VMware, Hyper-V). Familiarity More ❯
Deployment: Install, configure, and optimize server systems as per technical requirements. Capacity Planning: Monitor and plan for hardware or resource constraints; recommend necessary upgrades. Security Management: Apply security best practices including firewalls, patching, access controls, and intrusion prevention. Vendor Collaboration: Liaise with external service providers to execute changes … in compute and storage environments. Experience with both Windows and Linux server administration. Scripting and automation skills (Python, Terraform, Ansible, etc.). Understanding of informationsecurity, compliance, and risk management. Experience Experience with enterprise hardware (servers, storage, network devices). Knowledge of virtualization (VMware, Hyper-V). Familiarity More ❯
locations. Manage all NGC owned servers, switches, firewalls and routers. Maintain appropriate licenses and subscriptions for computer hardware and software. IT Governance Manage system security, performance monitoring and alerting, ensure appropriate backups are in place and retained for all systems. Ensure a disaster recovery arrangement is maintained, as required … team and operations are in place to ensure compliance during business continuity events. Work with Compliance Director in the development, adoption and enforcement of InformationSecurity policies, procedures and standards. Work with the Network and Security Architect to ensure appropriate security, patching, maintain secure Internet connectivity … mid tier storage hardware & appliance is essential, more specifical experience with IBM Storage V37xx & V50xx series will be beneficial. Infrastructure applications, Networking, VMware, Firewall, Security and/or Enterprise-level SANs. Experience with Cloud Services & Provisioning (Experience of Oracle Cloud would be preferential) Ability to lead cross functional project More ❯
and optimization of infrastructure and services. Contribute to IT governance across technology, services, processes, and cybersecurity. Manage and maintain IT risks, ensuring compliance with security and regulatory requirements. Ensure InformationSecurity and Compliance are considered in technology selection, installation, and configuration. Knowledge & Experience Detailed understanding of the More ❯