We are sourcing Cyber (Resiliency) Security Architects of all levels for our client who is a Global Leader within their field. These positions are for the UK division working remotely, except for the occasional client visit. Candidates must be located and authorized to work in the UK without any visa requirements . Job Role Take the lead on developing … implementing, and maintaining our security strategy within their Service Provider organization. Work closely with our leadership team to design and implement effective security solutions that not only protect our business objectives and regulatory requirements but also provide innovative solutions to stay ahead of emerging threats. Conduct risk assessments and threat modeling to identify and prioritize risks to our … business and IT assets, using your extensive experience in security architecture design. Implementation within a Service Provider environment to create a cutting-edge security architecture framework. Work to maintain policies, standards, and guidelines related to informationsecurity within our organization, collaborating with cross-functional teams to implement security controls and technologies such as encryption, authentication More ❯
Team (QRM) provides leadership, guidance, and tools to help partners and staff manage quality and risk matters. The team is comprised of an Advisory and Compliance Team, a Chief InformationSecurity Office Team, an Economic Crime Team, a Legal Team including a Commercial & Contracts Team, the Independence and Ethics Team and the Regulatory Supervisory Team, plus the Quality … for enhancing our delivery and providing additional services to organisations we work with. Role Purpose The Third Party Risk Manager is responsible for implementation of the BDO third party security framework. This includes assessing the informationsecurity risks of our 3rd parties , by evaluating the 3rd parties' security controls and ensuring supplier and supply chain informationsecurity risks to BDO and BDO client services are identified , assessed and managed. This role reports to the InformationSecurity Manager. Principal Accountabilities Leads in the execution and continuous improvement of the informationsecurity supply chain framework , which includes ensuring that security controls are implemented within the supply chain lifecycle at BDO Co More ❯
research and make recommendations on products, services, protocols, and standards in support of all infrastructure procurement and development efforts Assist with the planning and deployment of infrastructure and cloud security measures Develop, implement, and maintain policies, procedures, and associated training plans for cloud administration Ensure services conform to the agreed compliance requirements set forth by current and planned accreditations … to continuously optimise systems and processes, using stakeholder feedback, taking account of technological improvements and new design patterns with cloud technologies Key Working Relationships Internal: Economists/Business Analysts Information Technology/Infrastructure Architects CIO/Head of IT Marketing & Business Development External: As Required Skills, Knowledge & Expertise Required: 6+ years of experience in IT Support and Operations Excellent … communication skills. You will have a natural ability to build rapport with stakeholders at all levels to influence decisions Proven experience in IT infrastructure, Cloud and Security systems planning and development following best practices and informationsecurity Significant experience with Microsoft Azure, Intune, PIM and storage accounts Experience in evaluation and decision making Working technical knowledge of More ❯
The IT Security Operations Center's mission is to preserve the confidentiality, integrity, and availability of our assets by identifying operational and security risks and collaborating with business, functional, and customer stakeholders to develop plans that manage risk to acceptable levels. We are currently seeking a Sr. Cyber Incident Response Analyst to join our team. About the Role … Monitor for and investigate suspicious or malicious activity and alerts Review Change Management requests for security relevance and impact Daily review of system, application logs, and custom monitoring tools Malware and Advanced Persistent Threat (APT) analysis and remediation Incident Response and Investigations Availability for rotating on-call shifts (up to 2 - 3 times per year) About You Bachelor's … degree preferred or equivalent related field experience Professional Certifications preferred, including SANS GIAC or CISSP Microsoft, Linux, Networking or related certifications a plus. Experience in Information Technology Extensive experience in informationsecurity incident response and operations management Extensive experience of OS, application, and network security weaknesses, vulnerabilities, and remediation Experience researching, analyzing, and resolving complex problems More ❯
Go back Kingston and Richmond NHS Foundation Trust Chief Technology Officer Information: This job is now closed Job summary The Chief Technology Officer (CTO) is responsible for the development, implementation, and management of a comprehensive Digital Technology architecture and solutions across technology and data, and in areas such as enterprise architecture, innovation management, and data integrity whilst supporting wider … priorities and plans for service development.4. Present to senior groups as required to ensure DDAT issues maintain a high profile, including the presentation of highly complex, sensitive or contentious information when significant barriers to acceptance exist, potentially challenging environments.5. Promote the value and importance of effective DDAT throughout the Trust.6. Provide professional leadership for the wider digital community within … awards. Wherever you work across our organisation, we look forward to welcoming you. Job responsibilities Please see the attached supporting job description and person specification document, which contains more information about the role and requirements. Please ensure your application refers to the job description and person specification Person Specification Qualifications Masters or relevant industry experience Professional certification in relevant More ❯
execute innovative compliance testing programs. Manage deep-dive investigations into technology processes. Conduct regular risk assessments and provide recommendations. Prepare and present reports to senior leadership on IT and security risk posture and attack surface. Develop and implement innovative IT risk monitoring solutions. Partner with first and second line of defence stakeholders, including risk managers and security leads … to effectively address ICT and security risks. Leverage data analytics to revolutionize compliance assurance. Drive continuous improvement in our Assurance Program. Stay up to date with emerging threats, regulations and their impact on IT assurance. BASIC QUALIFICATIONS Experience in compliance, audit or risk management. Bachelor's degree or equivalent. Proven experience in developing and executing compliance or audit testing … frameworks. 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk. Analytical mindset with a talent for problem-solving. Excellence in stakeholder management and communication. Ability to thrive in a fast-paced, innovative environment. PREFERRED QUALIFICATIONS Master's degree or equivalent. Highly valued payments systems experience. Second line risk More ❯
to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with business objectives to integrate security and compliance seamlessly into business processes. The role includes developing the IDAM strategy, delivering a step change in how IDAM is approached, owning IDAM platforms, governance, and processes, and … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication … Act as a subject-matter expert on all IDAM disciplines, including identity lifecycle, governance, access management (SSO, MFA), and identity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement emerging IDAM technologies to enhance security, user experience, and More ❯
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … analysis support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practice in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec's technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo's to provide independent challenge More ❯
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
will be beneficial Process Automation, BPM and Digital Platforms, e.g. Pega Cloud technology (knowledge of any or all of Azure, AWS and Google would be beneficial) Experience of handling informationsecurity and privacy challenges Interest and awareness in emerging technologies Experience of vendor packages. An appreciation of Artificial Intelligence and Machine Learning Academic and prior experience A university … as possible. Join us in building a better working world. Apply now. Who we are Please note: Prior to finalizing your application, you will be asked to provide personal information across several dimensions of diversity and inclusiveness click apply for full job details More ❯
will be beneficial Process Automation, BPM and Digital Platforms, e.g. Pega Cloud technology (knowledge of any or all of Azure, AWS and Google would be beneficial) Experience of handling informationsecurity and privacy challenges Interest and awareness in emerging technologies Experience of vendor packages. The following are of particular interest: An appreciation of Artificial Intelligence and Machine Learning More ❯
Senior InformationSecurity Analyst Runa is pioneering a first-of-its-kind payment rail capable of issuing, sending and accepting digital value at scale. Banking and card payment infrastructure still struggles to serve low-volume, high-velocity payments both locally and globally. Businesses send over $20 trillion in refunds, rewards, or remittances to consumers, employees, or freelancers, every … leading companies rely on Runa to power instant, flexible global payouts to tens of millions of consumers including Sodexo, TopCashback, Perkbox, Sweatcoin, Coinbase and Globetopper. The Role The Senior InformationSecurity Analyst ensures security controls, policies, and processes are embedded across the organisation. You will enhance cybersecurity by implementing strategies, analysing breaches, and ensuring compliance. This role … is key in guiding engineering teams on application security and integrating security best practices across our technology stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetration testing, and risk analysis to identify and mitigate security weaknesses. Embed securityMore ❯
Senior InformationSecurity Engineer - UK Remote Optum is a global organization that delivers care, aided by technology to help millions of people live healthier lives. The work you do with our team will directly improve health outcomes by connecting people with the care, pharmacy benefits, data and resources they need to feel their best. Here, you will find … best and brightest. With a thriving ecosystem of investment and innovation, our business in Ireland is constantly growing to support the healthcare needs of the future. As a Senior InformationSecurity Engineer you will conduct network security investigations, cloud forensics, log analysis, host-based forensics, incident response, and case management. Candidates should be proficient at communicating verbal … and written findings to stakeholders at all levels of the enterprise regarding cyber security incidents. Primary Responsibilities of the Senior InformationSecurity Engineer: Mentor analysts, providing training and guidance through complex incidents Identify deficiencies in processes and tools, make corrective recommendations, and drive implementation of solutions and efficiencies Monitor incident throughput and ensure team consistently follows established More ❯
InformationSecurity Delivery Manager IR35 Status: Inside IR35 Rate: £700/day Contract Length: Initial 6 months Office Location: Central London Hybrid Model: 3 days per week in office, 2 days remote About the Role: We are seeking an experienced InformationSecurity Delivery Manager to lead the end-to-end delivery of critical security projects … for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while embedding security best practices. The ideal candidate will have a … like IAM (SailPoint), cloud security, SIEM, and MS Defender. Report to senior leadership and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Computappoint
InformationSecurity Delivery Manager IR35 Status: Inside IR35 Rate: £700/day Contract Length: Initial 6 months Office Location: Central London Hybrid Model: 3 days per week in office, 2 days remote About the Role: We are seeking an experienced InformationSecurity Delivery Manager to lead the end-to-end delivery of critical security projects … for a global leader in financial market infrastructure. This role focuses on driving Security Maturity and Identity & Access Management (IAM) initiatives, ensuring alignment with regulatory requirements and business objectives in a highly regulated environment. You will oversee complex, multi-workstream projects, managing budgets, stakeholders, and vendor relationships while embedding security best practices. The ideal candidate will have a … like IAM (SailPoint), cloud security, SIEM, and MS Defender. Report to senior leadership and interface with PMO, Finance, and Portfolio teams. Required Experience: 5+ years in delivering complex InfoSec projects (financial/trading sector preferred). Proven expertise in IAM, cloud security, vulnerability management, and third-party risk. Certifications: PRINCE2, MSP, PMP, or APM (CISM/CRISC/ More ❯
CACI help clients transform their businesses using data and technology so that they are ready for the challenges of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll … actively identify, exploit, and help remediate security weaknesses in web, mobile, and cloud-based applications. You'll be at the forefront of defending against cyber threats by implementing cutting-edge security tools, collaborating with development teams to integrate security into the SDLC, and playing a critical role in protecting the organisation's digital assets. The successful candidate … will play a hands-on role in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating the business impact of More ❯
Role Overview: Additional Information: Please note, this role requires working full-time onsite, five days per week. NON Negotiable We are seeking an experienced IT Security Engineer to become a vital part of a growing IT Department. This critical role will focus on protecting our information assets through robust cybersecurity measures, ensuring adherence to best practices, international … standards, and local regulations. Ideally suited to candidates who possess expert knowledge of security frameworks including NIST 800, ISO 27001, and cybersecurity guidelines from PRA, FCA, and ICO. Candidates with at least 3 years' relevant experience in finance or banking, particularly as an informationsecurity officer or involvement in regulatory technical projects, are strongly preferred. Key Responsibilities … and maintain cybersecurity policies and procedures, ensuring compliance with industry standards and local regulations. Real-time monitoring of cybersecurity incidents, including incident analysis, investigation, and mitigation. Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetration testing to ensure the integrity of securityMore ❯
Role Overview: Additional Information: Please note, this role requires working full-time onsite, five days per week. NON Negotiable We are seeking an experienced IT Security Engineer to become a vital part of a growing IT Department. This critical role will focus on protecting our information assets through robust cybersecurity measures, ensuring adherence to best practices, international … standards, and local regulations. Ideally suited to candidates who possess expert knowledge of security frameworks including NIST 800, ISO 27001, and cybersecurity guidelines from PRA, FCA, and ICO. Candidates with at least 3 years' relevant experience in finance or banking, particularly as an informationsecurity officer or involvement in regulatory technical projects, are strongly preferred. Key Responsibilities … and maintain cybersecurity policies and procedures, ensuring compliance with industry standards and local regulations. Real-time monitoring of cybersecurity incidents, including incident analysis, investigation, and mitigation. Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetration testing to ensure the integrity of securityMore ❯
London, England, United Kingdom Hybrid / WFH Options
developrec
Lead Security Control Assessor – Fully Remote - Contract £500 inside IR35 – 9 months – potentially extended The Opportunity We’re supporting our client in the search for a Lead Security Control Assessor to join their remote informationsecurity team on a long-term contract. In this role, you'll lead the evaluation and assurance of security controls … and clear communication Contribute to ongoing improvements in the assurance programme by standardising materials and defining measurable KPIs Skills & Experience Required 8+ years of experience in IT audit or informationsecurity control assessments, with 3+ years in a lead or managerial role Demonstrated experience assessing security controls in cloud environments (AWS and Azure) Strong understanding of key … CISM, CISSP, or ISO 27001 Lead Auditor Strong communication skills with the ability to translate technical findings into business language Proficient in both automated and manual testing techniques for security controls Desirable Experience Experience with tools such as SailPoint, Rapid7, Wiz.io, Microsoft Defender, RSA Archer, and ServiceNow Familiarity with automation and data analytics tools (Excel, Tableau, Alteryx, PowerBI) Agile More ❯
Senior Security Consultant (AI Specialist) Job Title: Senior Security Consultant (Architecture - AI Specialist) Overview: We are seeking a highly skilled and experienced Security Architect with a strong specialisation in Artificial Intelligence (AI) security. The ideal candidate will be responsible for designing, implementing, and maintaining robust security architectures for AI-powered applications and infrastructure. You will play … a critical role in identifying and mitigating security risks associated with AI, ensuring data privacy, and promoting ethical AI practices. This role requires a deep understanding of both traditional security principles and the unique challenges posed by AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI/ML models … data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for AI environments. Risk Assessment and Management: Conduct thorough risk assessments to identify vulnerabilities and threats specific to AI systems. Develop and implement risk mitigation strategies for AI-related security issues, including adversarial attacks, data poisoning More ❯
We need a Lead Cyber Security Analyst to join us in London. When you join Simply Business, you'll protect us from threat actors who attempt to evade our cyber defences. This is a hands-on technical position where you'll play an important role in increasing the maturity of our Security Operations Centre (SOC). Additionally, you … rapidly evolving environment, which will bring new challenges and opportunities for growth on a regular basis. You'll be empowered to develop and explore your unique passion for cyber security operations. In return we offer an extremely agile working environment with some of the latest technologies such as SASE, AI and with lots of automation. One of our main … make a difference. Simply Business is a cloud-native company which is leading the way with its offerings in the InsureTech market. You will be reporting into Laura the Security Operations Manager, and working alongside an award winning team of 5 other analysts and 3 engineers with a diverse set of technical skills and backgrounds within cyber security. Leading More ❯
and that people from any background can rise to the top, ensuring opportunities to develop and progress are available for all. Role overview We are seeking an experienced IT Security Lead to help us maintain security in our corporate digital systems, networks, infrastructure components and cloud environments. The responsibilities of this role will include protecting system boundaries, securing … highly sensitive data, and keeping our systems and networked devices hardened against attacks. Reporting to the Infrastructure Manager, the ideal candidate will have strong BAU security incident prevention, monitoring and response skills combined with security architecture and project experience, and be able to engage with external vendors and senior management. Key activities/responsibilities Monitor and analyse network … traffic, systems, and logs for signs of unusual or malicious activity. Conduct regular security assessments and audits to identify vulnerabilities, risks, and potential areas for improvement. Identify, define, document system security requirements. Implement and maintain security tools and protocols, including firewalls, intrusion detection systems, and endpoint protection. Investigate security incidents, respond to potential breaches, and document More ❯
achieve enduring results. We are over 4,000 strategists, innovators, designers, consultants, digital experts, scientists, engineers, and technologists. And we have deep expertise in consumer and manufacturing, defence and security, energy and utilities, financial services, government and public services, health and life sciences, and transport. Our teams operate globally from offices across the UK, Ireland, US, Nordics, and Netherlands. … a culture of learning and growth - you'll have budget to take courses (technical and non-technical training), plus gain certifications What you can expect Defining end-to-end security architecture and delivering solutions for projects or programs, creating Conceptual, Logical, and Implementation Architecture views. Designing secure system architectures using patterns and principles to manage business and security risks. Reviewing and enhancing clients' current security measures by applying innovative security architecture solutions. Work to agile best practices and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Live in-person whiteboarding sessions to problem solve as a More ❯
you! So, even if you feel that you're close but not an exact match, we encourage you to apply. Overview We are looking to add an experienced Senior Security Engineer to our Gallagher Technology Team. This role will be part of the global security architecture and engineering function in the UK, working closely with twin teams in … offer hybrid working, allowing you to spend two days a week in the office and three days working from home. Join a world-class team committed to driving exceptional security standards and making a real impact! How you'll make an impact Define and build InformationSecurity engineering standards, artefacts, design patterns, and technical specification documents. Provide … on Network Protocols, Remote Connectivity, Threat Prevention, Sandbox, DDoS, URL Filtering, and SSL decryption. Participate in troubleshooting design level issues. Assess, monitor, and recommend improvements to the global network security architecture to improve security posture, mitigate risks, and balance costs. Apply skills to security services and help build and protect enterprise systems, applications, data, and assets across More ❯
Senior Delivery Consultant (Security), Professional Services, UK NatSec, WWPS Job ID: AWS EMEA SARL (UK Branch) The Amazon Web Services Professional Services (ProServe) team is seeking a skilled Delivery Consultant (Security) to join our team at Amazon Web Services (AWS). In this role, you'll work closely with customers to design, implement, and manage AWS solutions that … meet their technical requirements and business objectives. You'll be a key player in driving customer success through their cloud journey, providing security expertise and best practices throughout the project lifecycle Our technical Security Consultants to help our customers build comprehensive security models, transform how they secure their sensitive workloads and develop their technical expertise. Our security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects, and conduct security workshops for customers. AWS security consultants collaborate with customers to address security and compliance challenges, and they help implement and migrate customer solutions and workloads onto AWS. Professional Services engage in a wide variety of projects More ❯