City of London, London, United Kingdom Hybrid / WFH Options
MS Talent Ltd
selling to corporate and/or public sector clients. Strong expertise in Checkpoint technologies and Cybersecurity Managed Services. Experience selling a range of services such as SIEM, Managed Firewall, VulnerabilityManagement, and Threat Hunting. Excellent presentation, communication, and organisational skills. Proven ability to work collaboratively with pre-sales, technical, and support teams. Desirable Skills & Experience Familiarity with Microsoft More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
CRI 2.0. Exposure to regulatory environments including NIS2 and GDPR. Relevant certifications (e.g., CISSP, CISM, CISA, MSc in Cyber Security). Consulting Skills: Strong client-facing communication and stakeholder management skills. Experience leading or contributing to the delivery of large transformation programmes. Project and team management (Agile or Waterfall). Analytical and lateral problem-solving mindset. Bonus if … you have: Security clearance or the ability to obtain it. Hands-on experience across GRC, cyber threat management, or vulnerability management. If you’re ready to work on some of the most pressing and complex cyber challenges facing organisations today and want to do it in an environment that values innovation, curiosity, and diversity, we’d love to More ❯
CRI 2.0. Exposure to regulatory environments including NIS2 and GDPR. Relevant certifications (e.g., CISSP, CISM, CISA, MSc in Cyber Security). Consulting Skills: Strong client-facing communication and stakeholder management skills. Experience leading or contributing to the delivery of large transformation programmes. Project and team management (Agile or Waterfall). Analytical and lateral problem-solving mindset. Bonus if … you have: Security clearance or the ability to obtain it. Hands-on experience across GRC, cyber threat management, or vulnerability management. If you’re ready to work on some of the most pressing and complex cyber challenges facing organisations today and want to do it in an environment that values innovation, curiosity, and diversity, we’d love to More ❯
and implementing cloud-based architectures (AWS, Azure or GCP) Ability to implement monitoring solutions (e.g. Prometheus, Grafana) Experience implementing security best practices in DevOps Processes (e.g. Infrastructure as code, vulnerabilitymanagement and compliance) Aptitude to work in Agile environments Strong communication skills Nice to have: Immediate availability Flexibility to travel onsite if needed If you're interested in More ❯
advisor and advocate for security across the development lifecycle, influencing architecture, design and implementation decisions. Embed secure development practices into day-to-day workflows across engineering teams. Own the vulnerabilitymanagement lifecycle: from discovery and triage to remediation tracking and coordinated disclosure. Build Secure Products by Design Conduct threat models, security architecture reviews and risk assessments for new More ❯
and mentoring. Improve and optimize processes, managing information collection and creating recommendations. Develop and implement secure cloud service solutions, leveraging cloud computing, data analytics, and enterprise architecture. Utilize delivery management, agile methodologies, and Azure DevOps to ensure project success. Maintain awareness of security standards, principles, tools, and emerging technologies. Automate security baselines and configuration management using IaC tools … testing (Practitioner) Research and innovation in security (Working) Systems design and integration (Practitioner) Understanding security implications of transformation (Working) Experience: Integrating security practices into DevOps, including automated testing and vulnerability management. Experience with CI/CD, IaC, and security automation tools. Implementing Zero Trust models, identity verification, MFA, and adaptive access controls. Knowledge of standards and regulations like GDPR … Experience as a DevOps professional. Working towards or obtaining certifications like CISSP, CISM, or CRISC within a year. Eligibility for SC Security Clearance. Current knowledge of ISO 27001, Risk Management, GDPR, and security issues related to AI/Gen AI. More ❯
Alto CSPM is a MUST!. Drive design decision in threat modelling working with STRIDE and MITRE ATT&CK. Strong understanding of cloud security principles, including IAM, Network Security, Vulnerabilitymanagement and threat detection. Experience with container security and Kubernetes would be a advantage. A full brief on the client and job is available, please send CV and More ❯
In-depth knowledge and hands-on experience with SAST, DAST and API security testing Solid understanding of AWS and security configurations. Experience in securing Containerised environments Strong knowledge of vulnerabilitymanagement tools and methodologies. Experience implementing automated deployments DevSecOps Engineer More ❯
CSF, OWASP SAMM), and compliance frameworks (SOC 2, ISO 27001, GDPR). Secure SDLC & DevSecOps - Build and maintain guardrails for static/dynamic analysis, container and IaC scanning, SBOM management, and supply-chain security; automate enforcement through CI/CD pipelines. Cloud & Infrastructure Security - Design and implement robust controls for AWS (primary) and Azure/GCP (secondary): IAM, network … segmentation, KMS, secrets management, WAF, EDR, and zero-trust patterns. Identity & Access Management (IAM) - Own enterprise IAM strategy, including RBAC, least-privilege provisioning, SSO, federation (OIDC/SAML), and privileged-access workflows. Monitoring, Detection & Response - Define audit logging, metrics, and telemetry requirements; integrate with SIEM/SOAR to deliver actionable alerts and playbooks for engineering-led incident response. … environments Strong awareness of compliance standards and the requirements on software teams, especially for ISO27001 and SOC2. FedRAMP experience advantageous. Demonstrated experience performing threat modelling, penetration test scoping, and vulnerability management. Deep understanding of IAM concepts, encryption/key-management, and secure network design. Excellent communication skills with ability to translate technical risk to non-technical stakeholders. Preferred More ❯
ArgoCD). Hands-on experience with cloud platforms preferably AWS and containerization (Docker, Kubernetes). Solid understanding of software development lifecycle (SDLC) and best practices for software delivery. Leadership & Management: Proven experience leading technical teams , mentoring engineers, and driving high-impact projects. Ability to navigate into complex organizational processes and structure. Strong ability to define roadmaps, set priorities, and … execute on vision. Comfortable working with both technical and non-technical stakeholders to drive alignment. Security & Compliance: Understanding of secure software supply chains , vulnerabilitymanagement, and artifact signing. Experience implementing security best practices in CI/CD pipelines (e.g., SAST, DAST, SBOM). Bonus Skills: Experience with Infrastructure as Code (IaC) tools like Terraform, Pulumi, or AWS CDK. More ❯
ArgoCD). Hands-on experience with cloud platforms preferably AWS and containerization (Docker, Kubernetes). Solid understanding of software development lifecycle (SDLC) and best practices for software delivery. Leadership & Management: Proven experience leading technical teams , mentoring engineers, and driving high-impact projects. Ability to navigate into complex organizational processes and structure. Strong ability to define roadmaps, set priorities, and … execute on vision. Comfortable working with both technical and non-technical stakeholders to drive alignment. Security & Compliance: Understanding of secure software supply chains , vulnerabilitymanagement, and artifact signing. Experience implementing security best practices in CI/CD pipelines (e.g., SAST, DAST, SBOM). Bonus Skills: Experience with Infrastructure as Code (IaC) tools like Terraform, Pulumi, or AWS CDK. More ❯
information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+. Experience with risk management methodologies, techniques and clearly understand and articulate … risk. Identify risks associated with business processes, operations and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key and certificate management. Excellent communication and stakeholder management … Information Security Manager ( CISM ) or Certified in Risk and Information Systems Control ( CRISC ) or similar. Experience in assessing Technology Assets for adherence to security requirements. An understanding of service management and delivery Deliverables: Responsibilities but not limited to: Assess that Cybersecurity is embedded throughout the development lifecycle of Technology Assets. Use Deloitte's Secure System Development Lifecyle ( SSDLC ) to More ❯
identity management. Certifications such as AZ-500, SC-300, CISSP, CEH, Security+. Hands-on experience with Microsoft Entra ID, Conditional Access, Defender, Intune. Knowledge of web application firewalls and vulnerability management. Understanding of Zero Trust principles and Privileged Access Management tools. Desirable Experience with ISO 27001, scripting/automation, insider threat detection, or security in regulated sectors. To More ❯
of writing and reviewing code, with a strong interest in security, you will facilitate and manage security testing workflows in the SDLC with code and runtime security scanners and vulnerability testing tools, whilst enabling cloud security governance (AWS, GCP) with security monitoring, cloud security posture management, and vulnerability management. This role sits in the Security Architecture and More ❯