london, south east england, United Kingdom Hybrid / WFH Options
Totum Partners
Job Responsibilities This role will be the bridge between the EUC/Modern Workplace/Architecture team and Information Security team. This role is responsible for identifying, assessing, and mitigating vulnerabilities across the infrastructure, applications, and cloud environments. You’ll play a key role in strengthening the securityposture and ensuring compliance with security policies and industry best practices. Perform regular vulnerability assessments across endpoints, servers, applications, and cloud resources. Analyse scan results, validate findings, and prioritize based on risk, exploitability, and asset criticality. Collaborate with IT, DevOps, and application teams to remediate or mitigate … identified vulnerabilities. Track remediation efforts and verify effectiveness through re-scans and reporting. Support audits, compliance checks, and security assessments as needed. Implement and support endpoint protection, patching, and backup solutions. Skills Required 2 years+ of experience focussing on Vulnerability Management, with a background in cyber security or More ❯
Senior Software Engineer on Palantir's Identity team, you will design, develop, and maintain core authentication and authorisation services. Your work will enhance the security and usability of identity governance workflows and access management for Palantirians and our customers globally. Your approach will emphasise secure-by-design principles, embedding … security considerations into every phase of the software development lifecycle. By adopting shift-left security practices, you will proactively address security concerns early in the development process, ensuring that our systems are resilient against emerging threats. The Identity team is composed of engineers dedicated to reducing risk … productivity. Your contributions will directly enhance the resilience of Palantir's critical infrastructure, empowering a global network of customers and employees while maintaining strong security controls with minimal impact on productivity. You will also play a key role in mentoring teammates and leading projects, driving both individual and team More ❯
Overview of the Team The Cyber Advisory team provides cyber security assurance, advice and guidance to clients on all aspects to help them build and maintain a robust security environment. We identify cyber risks and work closely with clients to understand their unique set of digital opportunities and … challenges, providing tailored and strategic advice and guidance. We support our clients in assessing, building and managing their cyber security capabilities, from ensuring compliance with industry regulations, and mitigating potential risks to moving them towards a more mature security posture. Within the national cyber security team you … will be responsible for delivering cyber security assurance and advisory work to a range of clients nationally and internationally. Our broad range of clients, including those in FTSE 350, will allow you to gain experience across a range of sectors including: Financial Services, Banking, Insurance and Investment Corporates/ More ❯
Job Title: Technical Assurance Manager - Cyber Security (15738) Location: Luton/Hybrid Company Overview: When it comes to innovation and achievement there are few organisations with a better track record. Join us and you'll be able to play a big part in the success of our highly successful … we employ over 10,000 people. Role Overview: The Technical Assurance Manager is part of the Digital Safety Assurance team, overseeing easyJet's cyber security posture. This role acts as the 2nd line of defence, providing oversight of Cyber Security Controls in line with Digital Safety policy, security standards, and compliance requirements. Key Responsibilities: Overseeing, educating and assessing the implementation of Digital Safety policies and security standards. Safeguarding company data throughout all processes and systems. Validating threat models produced as part of the project design process. Conducting security assessments and raising identified cyber risks into More ❯
Job Description UK CITIZENSHIP REQUIRED FOR THIS POSITION: Yes RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: UK-Security Check (SC) TRAVEL: Yes, 10% of the Time Define Possible at Northrop Grumman UK At Northrop Grumman UK, our mission is to solve the most complex challenges by shaping … energy, or critical infrastructure. Key Responsibilities: Product Development: ICS Infrastructure Design: Lead the design and deployment of infrastructure solutions for PMS, ensuring high availability, security, and performance across both surface ships and submarines. IT/OT Integration: Develop and implement solutions that facilitate IT/OT convergence, integrating operational … technology systems with IT infrastructure to enable efficient and secure data exchange between control systems and enterprise development networks. Networking & Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. More ❯
Job Description UK CITIZENSHIP REQUIRED FOR THIS POSITION: Yes RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: UK-Security Check (SC) TRAVEL: Yes, 10% of the Time Define Possible at Northrop Grumman UK At Northrop Grumman UK, our mission is to solve the most complex challenges by shaping … energy, or critical infrastructure. Key Responsibilities: Product Development: ICS Infrastructure Design: Lead the design and deployment of infrastructure solutions for PMS, ensuring high availability, security, and performance across both surface ships and submarines. IT/OT Integration: Develop and implement solutions that facilitate IT/OT convergence, integrating operational … technology systems with IT infrastructure to enable efficient and secure data exchange between control systems and enterprise development networks. Networking & Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. More ❯
london (new malden), south east england, united kingdom
Northrop Grumman
Job Description UK CITIZENSHIP REQUIRED FOR THIS POSITION: Yes RELOCATION ASSISTANCE: Relocation assistance may be available CLEARANCE TYPE: UK-Security Check (SC) TRAVEL: Yes, 10% of the Time Define Possible at Northrop Grumman UK At Northrop Grumman UK, our mission is to solve the most complex challenges by shaping … energy, or critical infrastructure. Key Responsibilities: Product Development: ICS Infrastructure Design: Lead the design and deployment of infrastructure solutions for PMS, ensuring high availability, security, and performance across both surface ships and submarines. IT/OT Integration: Develop and implement solutions that facilitate IT/OT convergence, integrating operational … technology systems with IT infrastructure to enable efficient and secure data exchange between control systems and enterprise development networks. Networking & Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet/IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. More ❯
Cyber Security Analyst – Fintech | Hybrid (London) | £55K–£70K + Bonus Join a fast-growing fintech company in central London as a Cyber Security Analyst . We're looking for someone to help protect our systems and data while shaping our overall security posture. What You’ll Do … Monitor threats and respond to incidents Run vulnerability scans and support remediation Help with compliance (ISO27001, SOC 2, FCA) Collaborate with DevOps to embed security in our pipeline Raise security awareness across the company What You Bring: Experience in a security analyst or InfoSec role Hands-on … with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+, CEH, or CISSP are a plus Perks: Hybrid work (2–3 days in-office) Learning budget + paid certs Bonus, pension, private health, and more 🚀 Ready to protect More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Explore Group
Cyber Security Analyst – Fintech | Hybrid (London) | £55K–£70K + Bonus Join a fast-growing fintech company in central London as a Cyber Security Analyst . We're looking for someone to help protect our systems and data while shaping our overall security posture. What You’ll Do … Monitor threats and respond to incidents Run vulnerability scans and support remediation Help with compliance (ISO27001, SOC 2, FCA) Collaborate with DevOps to embed security in our pipeline Raise security awareness across the company What You Bring: Experience in a security analyst or InfoSec role Hands-on … with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+, CEH, or CISSP are a plus Perks: Hybrid work (2–3 days in-office) Learning budget + paid certs Bonus, pension, private health, and more 🚀 Ready to protect More ❯
We're partnering with a leading global financial services firm to appoint a Governance, Risk, and Compliance (GRC) Lead into their high-performing Information Security function. This is an exciting opportunity to join a fast-paced, globally recognised institution with a mature cyber programme and significant investment in its … security posture. As a trusted search partner, we’re looking for an experienced and strategic GRC professional who can bring deep subject matter expertise across third-party risk, regulatory compliance, audit readiness, and awareness training. You’ll play a pivotal role in helping the firm navigate the evolving threat … Venminder, CyberGRX, Upguard) Microsoft O365 suite Why Apply? This is a high-impact role offering direct visibility with senior stakeholders, the chance to shape securityposture across a global organisation, and real opportunities for career progression. You’ll be supported by a collaborative team culture, continuous learning, and More ❯
We're partnering with a leading global financial services firm to appoint a Governance, Risk, and Compliance (GRC) Lead into their high-performing Information Security function. This is an exciting opportunity to join a fast-paced, globally recognised institution with a mature cyber programme and significant investment in its … security posture. As a trusted search partner, we’re looking for an experienced and strategic GRC professional who can bring deep subject matter expertise across third-party risk, regulatory compliance, audit readiness, and awareness training. You’ll play a pivotal role in helping the firm navigate the evolving threat … Venminder, CyberGRX, Upguard) Microsoft O365 suite Why Apply? This is a high-impact role offering direct visibility with senior stakeholders, the chance to shape securityposture across a global organisation, and real opportunities for career progression. You’ll be supported by a collaborative team culture, continuous learning, and More ❯
responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s securityposture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on a … daily basis will include: Designing all IAM frameworks aligning to industry best practices User access management – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross … team collaboration – technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management More ❯
responsible for leading and growing the IAM ops function (3 people) and will be responsible for streamlining access controls and improving the organisation’s securityposture from an IAM perspective. The role offers the chance to work in a fast moving, heavily regulated environment Key responsibilities on a … daily basis will include: Designing all IAM frameworks aligning to industry best practices User access management – overseeing user provision Security compliance to regulatory requirements – ISO27001, GDPR, SOX Role based access control assessment (RBAC) oversight Stakeholder engagement at all levels Reporting and documentation – user access policies and audit logs Cross … team collaboration – technology, security and group risk. Incident Response: Ability to quickly and effectively respond to access-related security incidents, including breaches, unauthorized access, or policy violations. Training and user awareness In order to be suitable you will need the following background: Experience in a similar IAM management More ❯
IR35) About the Role: 83zero is excited to be partnered with a leading financial institution, looking for a Cisco Firewall Specialist to strengthen their security operations during a major upgrade phase. This role will focus on the design, deployment, and support of Cisco security technologies-especially within Cisco … ACI and Cisco ASA environments. The successful candidate will play a key role in supporting infrastructure upgrades and network security enhancements across the business. Key Responsibilities: Lead the implementation and support of Cisco ACI and Cisco ASA solutions across enterprise-scale environments Conduct configuration, troubleshooting, and maintenance of firewalls … and network security tools Work closely with cross-functional teams to deliver robust and secure infrastructure upgrades Support specific project workstreams, including: ACI Upgrade (4.3 to 6.0) MSO > NDO Migration UCS Network Director (UCSD Contribute to risk assessments and continuous improvement of securityposture Hybrid working model More ❯
CyberSecurity Consultant to work remotely. As a cybersecurity consultant, your key responsibilities revolve around helping organizations protect their digital assets and improve their overall security posture. Key responsibilities: Conducting comprehensive security assessments: This involves evaluating an organization's IT infrastructure, networks, systems, and applications to identify potential weaknesses … attacks to uncover exploitable flaws. Developing threat analysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and implementing security policies, standards, and procedures: This includes creating guidelines aligned with industry best practices and regulatory requirements … e.g., NIST CSF, ISO 27001, GDPR). Designing and architecting secure IT environments: This may involve network security design, cloud security architecture (AWS, Azure, GCP), and implementing security technologies. Developing and assisting in the implementation of incident response plans: Creating documented procedures for handling security breaches More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Global TechForce
CyberSecurity Consultant to work remotely. As a cybersecurity consultant, your key responsibilities revolve around helping organizations protect their digital assets and improve their overall security posture. Key responsibilities: Conducting comprehensive security assessments: This involves evaluating an organization's IT infrastructure, networks, systems, and applications to identify potential weaknesses … attacks to uncover exploitable flaws. Developing threat analysis schedules and staying updated on emerging threats: Keeping abreast of the latest attack vectors, malware, and security trends is crucial. Developing and implementing security policies, standards, and procedures: This includes creating guidelines aligned with industry best practices and regulatory requirements … e.g., NIST CSF, ISO 27001, GDPR). Designing and architecting secure IT environments: This may involve network security design, cloud security architecture (AWS, Azure, GCP), and implementing security technologies. Developing and assisting in the implementation of incident response plans: Creating documented procedures for handling security breaches More ❯
We are currently supporting Nesta with their search for an Information Security Officer to join their IT function. In this crucial role, you'll be instrumental in ensuring they are compliant with their information security accreditations and our data, systems, and networks are protected from evolving cyber threats. … of lives for the better. The role is hybrid and will require 2 days a week on site in London. As the Group Information Security Analyst/Officer, you will: Lead and maintain security accreditations: Successfully manage Cyber Essentials, Cyber Essentials Plus, and ISO 27001 certifications. Deliver comprehensive … Continuity Planning (BCP) and Disaster Recovery Plans. Incident management: Act as the technology team's point of contact for legal matters related to information security incidents and actively triage and manage security incidents and breaches. Risk assessment: Identify, assess, and mitigate information and cybersecurity risks, compliance issues, and More ❯
Cyber Architecture & Engineering (Cyber A&E) is one of five functions that make up GCS. Cyber A&E designs, architects, deploys, and continually enhances security measures for the protection of State Street's information related to its assets and customers. This PAM Governance Analyst will sit in the PAM … for CyberArk, Hashicorp and other products. Prepare manual compliance reports as necessary until full automation is in place Propose and champion modifications to the security standards. Assist members of the IT community with questions about policy and standards. Design and implement new processes and procedures as needed to enhance … securityposture and controls. Preferred Qualifications: Candidates with the following knowledge areas, though not required, are preferred: Operating Systems: Windows, Unix, Linux Databases: Oracle, Sybase, SQL Server, Databricks, Postgres Code and Scripting Languages: SQL, PowerShell, Linux shell scripting, Python and an understanding of operating systems Windows and Linux More ❯
us, this means experience of designing and operating enterprise-scale landing zones within AWS. It also means you need an understanding of the key security risks that are present when operating workloads within AWS and how to design a best practice landing zone to mitigate these risks. We are … developing roadmaps. Leading Well Architected reviews, ensuring cloud solutions meet best practice standards. Leading cost optimisation initiatives and developing policies for cost management. Leading security strategies, implementing continuous securityposture management. Leading identity management strategy, integrating user directories and secure SSO. Leading client network strategy, managing RAM More ❯
The team you'll be working with: Security Consultant (GRC) NTT DATA is one of the world's largest global security service providers, partnering with some of the most recognized security technology brands. We're looking for passionate, curious, and motivated individuals to join our team. What … directs, oversees, designs, implements or operates within the set of multi-disciplinary structures, policies, procedures, processes and controls implemented to manage cyber and information security at an enterprise level. Supporting an organisation's immediate and future regulatory, legal, risk, environmental and operational requirements and ensuring compliance with those requirements. … Policy and Procedure Management: directs, develops or maintains organisational cyber and information security policies, standards and processes, using recognised standards (e.g. the ISO/IEC 27000 family, NIST CSF) where appropriate. Applies recognised cyber and information security standards and controls within an organisation, programme, project or operation. Applies More ❯
consultancy specialising in cloud-native, Kubernetes, and open source solutions. Our expertise lies in helping organisations adopt and secure complex cloud infrastructures by implementing security measures that are "secure-by-design" and "secure-by-default." This engineering excellence has driven ControlPlane deeper into cybersecurity providing services like threat modelling … penetration testing, and supply chain security to ensure robust protection against cyberattacks in containerised and cloud-native environments. We are acclaimed for our contributions to securing highly regulated industries, such as finance, healthcare, and national infrastructure. We help businesses improve their securityposture through services like DevSecOps … ecosystem, offering specialised training and community engagement. Our clients range from multinational banks to tech giants and public clouds, where we assist with both security and operational needs. In addition to consulting, we are active in the open source community, supporting projects like Flux CD and providing securityMore ❯
s Digital Forensics and Incident Response engagements, as well as Proactive Service engagements, and will report directly to the Manager for Unit 42 Security Consulting Project Management Office (PMO). Your Impact Manage multiple projects effectively by defining schedules and goals based on Statements of Work (SOWs) and communicating … Asana, and Clarizen preferred Previous direct client/customer consulting experience preferred Additional Information The Team Unit 42 Consulting is Palo Alto Network's security advisory team. Our vision is to create a more secure digital world by providing the highest quality incident response, risk management, and digital forensic … quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients’ securityposture Our Commitment We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish More ❯
s Digital Forensics and Incident Response engagements, as well as Proactive Service engagements, and will report directly to the Manager for Unit 42 Security Consulting Project Management Office (PMO). Your Impact Manage multiple projects effectively by defining schedules and goals based on Statements of Work (SOWs) and communicating … Asana, and Clarizen preferred Previous direct client/customer consulting experience preferred Additional Information The Team Unit 42 Consulting is Palo Alto Network's security advisory team. Our vision is to create a more secure digital world by providing the highest quality incident response, risk management, and digital forensic … quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients’ securityposture Our Commitment We’re problem solvers that take risks and challenge cybersecurity’s status quo. It’s simple: we can’t accomplish More ❯
Job Title : Information Security Lead Location : London Contract Type: Permanent Role We are seeking a highly motivated and skilled Security Lead to join our client that is in the manufacturing industry in London. The ideal candidate will have experience in information security within the energy, mining, chemicals … or process manufacturing sectors and will apply that expertise to enhance the organisations security posture. Key Responsibilities: Design and implement a robust cybersecurity framework to safeguard critical operational systems, production data, and intellectual property . Manage Microsoft Office 365 security and compliance administration panels to enhance data protection … regulatory compliance, and security monitoring. Stay updated on the latest security threats, trends, and regulatory changes, and ensure the organization’s security measures evolve accordingly. Required Qualifications: Bachelor’s or master’s degree in Information Security, Cybersecurity, IT, or a related field. Fluent in Turkish Proven More ❯
Job Title : Information Security Lead Location : London Contract Type: Permanent Role We are seeking a highly motivated and skilled Security Lead to join our client that is in the manufacturing industry in London. The ideal candidate will have experience in information security within the energy, mining, chemicals … or process manufacturing sectors and will apply that expertise to enhance the organisations security posture. Key Responsibilities: Design and implement a robust cybersecurity framework to safeguard critical operational systems, production data, and intellectual property . Manage Microsoft Office 365 security and compliance administration panels to enhance data protection … regulatory compliance, and security monitoring. Stay updated on the latest security threats, trends, and regulatory changes, and ensure the organization’s security measures evolve accordingly. Required Qualifications: Bachelor’s or master’s degree in Information Security, Cybersecurity, IT, or a related field. Fluent in Turkish Proven More ❯