london, south east england, United Kingdom Hybrid / WFH Options
Maxwell Bond
across the company, including training and best practices Work closely with engineering to embed security into the SDLC and product roadmap Manage incident response, vulnerabilitymanagement, and third-party risk processes Act as a key stakeholder in board-level and customer-facing security discussions 👤 What We’re Looking More ❯
for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g. … controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerabilitymanagement activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information … AWS preferred) and common security risks associated with SaaS platforms. Hands-on knowledge of security tooling, including endpoint protection, SIEMs, DLP, identity and access management (IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. This is a unique opportunity to be the foundational Information Security leader More ❯
for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g. … controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetration testing and vulnerabilitymanagement activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information … AWS preferred) and common security risks associated with SaaS platforms. Hands-on knowledge of security tooling, including endpoint protection, SIEMs, DLP, identity and access management (IAM), and SSO. A clear understanding of data privacy laws, particularly GDPR. This is a unique opportunity to be the foundational Information Security leader More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security projects effectively. Responsibilities Security Strategy: Define and execute cloud security strategy, partnering with platform and Site Reliability Engineering (SRE More ❯
of complex, multi-site security projects globally. Deep knowledge of security frameworks (NIST, ISO 27001, CIS, CSA CCM). Strong understanding of GRC processes , vulnerabilitymanagement, incident response, and SOC. Familiarity with DevSecOps , secure SDLC, disaster recovery, and BCP. Excellent stakeholder management and communication skills. Experience navigating More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Eames Consulting
of complex, multi-site security projects globally. Deep knowledge of security frameworks (NIST, ISO 27001, CIS, CSA CCM). Strong understanding of GRC processes , vulnerabilitymanagement, incident response, and SOC. Familiarity with DevSecOps , secure SDLC, disaster recovery, and BCP. Excellent stakeholder management and communication skills. Experience navigating More ❯
Significant experience with standard incident response processes Expertise in a broad range of information technologies, such as public cloud infrastructure (AWS, GCP), authentication systems, vulnerabilitymanagement solutions, network infrastructure, etc. Experience in dissecting attacker methodologies and techniques Comprehensive understanding of product and infrastructure logs from a security perspective More ❯
more of the following areas: Incident Response Email Security Data Protection/Governance Cybersecurity threat detection, monitoring, and reporting Cyber Intelligence and Threat Hunting VulnerabilityManagement Experience in Google Security Operations. Experience analyzing attack vectors, current threats, and security remediation strategies. Strong understanding of networking (including the OSI More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Ltd
Conduct secure code reviews and threat modelling Improve security in AWS (Security Hub, Shield, IAM) Integrate AppSec practices into CI/CD pipelines Run vulnerabilitymanagement and bug bounty programs Build security dashboards, frameworks, and reusable libraries Promote secure coding and AppSec best practices across teams What You … Bring Deep knowledge of AWS security tools & IAM Experience with Okta , service mesh, observability tooling Hands-on with SAST/DAST , secure development and vulnerability testing Familiar with ISO 27001, NIST, CIS Benchmarks, OWASP Top 10 Comfortable with Python, JavaScript or similar scripting Strong communicator technical and non-technical More ❯
backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise … scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to More ❯
backup, and business continuity processes • Collaborating with internal teams and external vendors on system upgrades, maintenance, and incident resolution • Contributing to security posture improvements, vulnerabilitymanagement, and compliance efforts Experience • 5+ years’ experience in infrastructure or systems engineering, preferably within trading, hedge funds, or financial services • Deep expertise … scripting and automation skills, particularly with PowerShell • Hands-on experience with cloud platforms (Azure or AWS) and hybrid IT environments • Solid understanding of endpoint management, system hardening, and patching • Familiarity with security best practices in regulated or high-trust environments • A proactive, self-starting attitude with the ability to More ❯
tools and doing deep technical research Skilled at working across departments and with both business and tech leaders Familiar with ITIL practices like change management Able to juggle complex projects and bring them to the finish line A strong communicator who’s good with both written and verbal updates … teams in multiple time zones Tech Stack You’ll Be Using Microsoft Azure, Windows Server, VDI Active Directory, Intune, Exchange, Office 365 Patching/vulnerabilitymanagement, certs General networking knowledge (on-prem & cloud) ServiceNow, JIRA, Confluence Familiarity with frameworks like TOGAF or ArchiMate is helpful More ❯
tools and doing deep technical research Skilled at working across departments and with both business and tech leaders Familiar with ITIL practices like change management Able to juggle complex projects and bring them to the finish line A strong communicator who’s good with both written and verbal updates … teams in multiple time zones Tech Stack You’ll Be Using Microsoft Azure, Windows Server, VDI Active Directory, Intune, Exchange, Office 365 Patching/vulnerabilitymanagement, certs General networking knowledge (on-prem & cloud) ServiceNow, JIRA, Confluence Familiarity with frameworks like TOGAF or ArchiMate is helpful More ❯
solving, and root-cause analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerabilitymanagement and assessment. Intrusion detection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy More ❯
record in DevOps or engineering roles, with expertise in cloud platforms (e.g., AWS) and Infrastructure as Code (e.g., Terraform) Knowledge of incident response processes, vulnerabilitymanagement, and incident triage Experience implementing security controls and maintaining security tools Familiarity with agile methodologies in fast-paced environments Calm, evidence-based More ❯
stakeholders. Excellent communication skills with the ability to translate technical concepts for non-technical audiences. Familiarity with SOC, incident response, DR/BCP , and vulnerability management. More ❯
stakeholders. Excellent communication skills with the ability to translate technical concepts for non-technical audiences. Familiarity with SOC, incident response, DR/BCP , and vulnerability management. More ❯
The Offensive Security Manager is responsible for the provision of penetration & red team testing services to the business, including leading teams, creating processes, and management of technologies & 3rd parties that make up the service. The role reports to the Director of Offensive Security. The position does not need to … be filled by a hands-on penetration/red tester, as organizational, leadership, relationship and supplier management skills are the key focuses of the role but will need to have a good understanding of security vulnerabilities and testing methodology to be able to understand the subject matter of the … service and manage quality. The role will work closely alongside the rest of the Cyber Team (e.g. VulnerabilityManagement), the wider Information & Cyber Security function (e.g. Project Assurance) and leaders in operational IT teams to ensure accurate detection, and the prioritized, timely and appropriate resolution of security vulnerabilities. More ❯
security certifications (ISO 27001, SOC 2) and drive initiatives for future certifications (e.g., ISO 22301, DORA). Direct regular security audits, risk assessments, and vulnerability analyses, ensuring that findings are addressed effectively and efficiently. Lead security incident response efforts, including complex investigations and remediation, and develop robust incident response … in the regulatory landscape. Establish and maintain security awareness training programs, promoting a strong security culture across the organization. Oversee the design, implementation, and management of security systems and technologies, ensuring their effectiveness and integration. Collaborate with Engineering, Product, and other departments to integrate security into the software development … etc.), application security, and DevSecOps practices is a significant plus. Proven experience in developing and implementing security strategies and programs. Extensive experience with risk management, security audits, and vulnerability management. Excellent leadership, communication, and interpersonal skills, with the ability to influence and collaborate across all levels of the More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in … Experience with CI/CD tools and practices, ensuring secure and automated deployment processes. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to manage multiple security ... More ❯
diverse teams, we want to hear from you! Key Skills: Strong understanding of cloud and application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Azure, Kubernetes, Service Mesh, API gateways, and API security (authentication and authorization). Proficiency in More ❯
You will be managing a team ensuring all security protocols and procedures are followed meticulously. You will provide strategic recommendation reports to senior management. VulnerabilityManagement: Manage and update a list of vulnerabilities across the estate, with a critical focus to safeguard data integrity and mitigate risks. Experience More ❯