travel into London around once or twice a month depending on where you live (expenses-paid). Responsibilities: * Implement and manage security controls for Microsoft and Azure infrastructure. * Lead vulnerabilitymanagement and incident response. * Enhance security monitoring and IAM with Microsoft tools. * Drive security architecture and ensure endpoint security. * Support M&A security assessments and maintain compliance. Requirements More ❯
protocols (TCP/IP) and security practices (IPSec, SSL-VPN, NAT, GRE). Hands-on experience with cloud infrastructure operations and troubleshooting customer tech stacks. Familiarity with SIEM tools, vulnerabilitymanagement, malware analysis, and firewall configurations. Ability to communicate complex technical solutions to a wide range of audiences, both technical and non-technical. Skilled in Python, JSON, YAML More ❯
Asset data and mature a ServiceNow-Splunk integration for enhanced security monitoring and incident response. • Configure and enhance ServiceNow SIR and SecOps modules to support CSOC incident response and VulnerabilityManagement capability. • Develop and maintain documentation for all configurations and customisations. • Collaborate with operational, business and security teams and stakeholders to translate requirements into technical solutions. • Design and … technical services and supporting infrastructure using CSDM best practices • Create and manage service portfolio definitions aligned with business outcomes Technical Skills • ServiceNow Platform & Applications • Service Mapping and Application Service Management • Service Graph Connectors and CI Class Manager • Top-down and bottom-up service mapping approaches • CSDM framework implementation and governance • Business Application portfolio management • Dynamic CI Group configuration … and documentation abilities • Experience working with programme/project delivery focused environment • Experience working with Scrum and Kanban Agile • Strong focus on security best practices • Team collaboration and stakeholder management skills • Understanding of business service modelling and service portfolio management • Ability to translate business requirements into CSDM data structures • Desirable skills; SIR and SecOps More ❯
security posture of our commercial business units in alignment with the ISO-27001 security framework. The ideal candidate will have practical experience in various information security responsibilities, such as vulnerabilitymanagement, infrastructure hardening, security investigation, and security governance. This role requires an inquisitive personality with problem-solving capabilities to guide and support our commercial business unit's security … posture in enabling our customer's needs. Responsibilities Review and analyse outputs from Qualys, or equivalent, vulnerability and compliance scans. Actively monitor and respond to alerts from our SIEM (Security Information and Event Management) platform. Monitor and react to activity from Antivirus and EDR (Endpoint Detection and Response) tools. Define and document security requirements for new development efforts. More ❯
in collaboration with developers, DevSecOps engineers, ensuring that security is seamlessly integrated into our CI/CD pipelines and all layers of infrastructure. Additionally, you will supervise security tool management and ensure cyber resiliency for consumer applications. A deep understanding of Google Cloud Security, Application Security, API security, and customer security systems is crucial. Key Responsibilities: Design and Implement … engaged and actively adopting industry-standard security designs Enforce Security Best Practices: Build and enforce security best practices across Google Cloud Platform (GCP) environments, ensuring robust identity and access management (IAM), network security, and encryption, in compliance with industry standards. Integrate Application Security: Drive the integration of application security practices, including secure coding and vulnerabilitymanagement, throughout … tools and processes to secure application development. Deep understanding of application security, including secure coding practices, OWASP Top 10, and API security standards. Knowledge of Customer Identity and Access Management (CIAM) solutions and API security frameworks. Knowledge of one or more programming languages with the ability to review and implement secure code. Strong understanding of security automation, orchestration, and More ❯
and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerabilitymanagement tools. Strong grasp of Active Directory, Azure AD, and identity access governance. Familiarity with secure infrastructure platforms: SQL Server, Oracle, HA clustering. More ❯
and infrastructure design. Technical Toolkit: Strong command of Azure Log Analytics, KQL, and Azure-based security tools. Scripting: Python, PowerShell, Shell. Experience with IDS/IPS, firewalls, SIEMs, and vulnerabilitymanagement tools. Strong grasp of Active Directory, Azure AD, and identity access governance. Familiarity with secure infrastructure platforms: SQL Server, Oracle, HA clustering. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
SNG (Sovereign Network Group)
SIEM and other security tools Conduct triage of security incidents and escalate as appropriate Collaborate with the SOC and internal teams to respond to and resolve security events Drive vulnerability remediation across infrastructure and cloud environments Participate in incident response activities, forensic investigations, and risk mitigation Participate in an on-call rota for out-of-hours cyber incident response … re Looking For Experience in a Cyber Security Analyst role or similar Solid understanding of cyber security principles and industry best practices Experience with SIEM tools, log analysis, and vulnerabilitymanagement Understanding of cloud, network, and endpoint security concepts Strong analytical skills and attention to detail Excellent communication and documentation skills Your Benefits We have some great benefits More ❯
department where innovation meets impact. Our team includes the Chief Data Office, Chief Software Office, Chief Technology Office, Emerging Technology, Shared Technology Services, Technology, Risk and the Executive Program Management Office (EPMO).Driven by our investment in cutting-edge technologies like AI and cloud solutions, were home to a diverse range of roles and backgrounds united by a shared … risk, financial crimes, or technology risk in enterprise environments. Ability to introduce AI/ML solutions to enhance productivity and compliance monitoring within employee engagement systems. History of leading vulnerabilitymanagement, issue remediation, and exception handling within a governance framework. Strong documentation and policy development skills, capable of aligning business unit security practices with corporate standards. Passion for More ❯
leaders to engineers. Collaborate with IT and other business units to ensure security is integrated into all aspects of technology and operations Develop the infrastructure and platform to automate vulnerabilitymanagement and security reporting. This is a hybrid position. Expectation of days in office will be confirmed by your Hiring Manager. Basic Qualifications 5+ years of relevant work More ❯
Hunting and Threat Intelligence (MITRE ATT&CK) Penetration Testing Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) VulnerabilityManagement (Qualys, Nessus, Nexpose) Anti-Malware/EDR Software (Carbon Black, Microsoft Defender ATP, FireEye, CrowdStrike) Programming (Python, or other languages) What you can expect from us We More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
CI/CD pipelines, and infrastructure as code (Terraform) Security integration experience across the DevSecOps lifecycle, including: SAST, DAST, SCA, and IAST tools (e.g., Checkmarx, Veracode, OWASP ZAP) Secrets management tools like HashiCorp Vault Vulnerabilitymanagement solutions such as Prisma Cloud Testing frameworks like Selenium Familiarity with JIRA, Confluence, and GitLab/Jenkins-based CI/CD More ❯
driven to uplift and challenge those around them. You will provide high quality central services to the Improbable group and our network of venture businesses through the leadership and management of the IT Support, Tech Ops, and Technical Security functions. Your role will be to ensure that all company services are deployed, managed, and supported at the highest levels … and maintenance of security infrastructure, systems, and applications. Maintain security controls aligned with recognised international standards, and conduct internal and external audits. Own our service catalogue, internal processes, incident management and security controls. Manage IT budgets and ensure cost-effective allocation of technology resources and overseeing procurement. Ensure our suppliers and vendors are appropriately assessed against our security controls … such as ISO 27001:22 (preferred), NIST CSF or SOC2), including internal and external auditing. Have a track record of motivating and organising technical teams. Understand Networks, Security, Firewall, VulnerabilityManagement, SIEM and EDR technologies. This role would benefit from exposure to the following: Jira, Confluence, Google Workspace, Google Cloud Platform, Azure, Slack, and ITIL framework. More ❯
driven to uplift and challenge those around them. You will provide high quality central services to the Improbable group and our network of venture businesses through the leadership and management of the IT Support, Tech Ops, and Technical Security functions. Your role will be to ensure that all company services are deployed, managed, and supported at the highest levels … and maintenance of security infrastructure, systems, and applications. Maintain security controls aligned with recognised international standards, and conduct internal and external audits. Own our service catalogue, internal processes, incident management and security controls. Manage IT budgets and ensure cost-effective allocation of technology resources and overseeing procurement. Ensure our suppliers and vendors are appropriately assessed against our security controls … such as ISO 27001:22 (preferred), NIST CSF or SOC2), including internal and external auditing. Have a track record of motivating and organising technical teams. Understand Networks, Security, Firewall, VulnerabilityManagement, SIEM and EDR technologies. This role would benefit from exposure to the following: Jira, Confluence, Google Workspace, Google Cloud Platform, Azure, Slack, and ITIL framework. Improbable Candidate More ❯
team. Improve SOC services, including security monitoring, incident detection, analysis, and response. Establish and document processes and workflows. Oversee the development of security tools and technologies like NDR, EDR, VulnerabilityManagement, SIEM, and SOAR. Collaborate with business owners to identify and reduce cyber threats and vulnerabilities. We're looking for someone who is: Experienced in information security, especially … cyber security concepts, technologies, and best practices. Effective in managing and communicating with diverse stakeholders, including executives. Experienced with security tools such as SIEM, IDS/IPS, EDR, and vulnerability management. Familiar with working in cloud environments. Exposure to threat modeling. (You don't need to match all the bullet points to be considered for this role.) Ready to More ❯
you can expect to: Lead incident response for breaches, malware attacks, root cause analysis, and recovery Monitor threat feeds and correlate intelligence with tooling to identify emerging risks Oversee vulnerabilitymanagement and assess remediation effectiveness Collaborate with IT, DevOps, and GRC to align security efforts with business goals Manage and refine configurations for our security tools, and recommend … threats, ensuring zero-day vulnerabilities are discovered and actioned quickly Own the planning and execution of our annual penetration testing activity To be successful, you'll have: Experience using vulnerability scanning tools and remediating software/hardware issues A solid understanding of both automated and manual penetration testing Hands-on experience identifying, testing, and mitigating system vulnerabilities A strong More ❯
West London, London, United Kingdom Hybrid / WFH Options
Ashdown Group
Duties will include: - Working with the wider business on ISO27001 and Cyber Essentials - Network and data security monitoring - Responding to tickets and working with teams on access, malware and vulnerability - Deploy SIEM - Support ongoing improvements to internal defence - Oversee policies and procedures - Support data protection initiatives - Security projects - Develop disaster recovery plans - Establish and improve vulnerabilitymanagementMore ❯
s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting frameworks, and Technology integration assessment. Cyber Vulnerability Investigations Identity & Access: IAM architecture reviews, p rivileged access solutions, authentication technology assessment, and Zero Trust implementation planning OT Security OT Risk Assessment/Assurance and OT VulnerabilityManagement Key Strengths Detail-oriented with a strong focus on quality Well-organised and committed to developing customer service skills Enthusiastic about working in a team environment while developing individual capabilities 25 days of Annual leave + an option to purchase more through our Flexible Benefits Flex benefits system - exciting opportunity to choose your own benefits Pension - matching More ❯
Key Requirements: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Familiarity with Agile methodologies like SCRUM, along with proven … project management skills to oversee multiple security projects simultaneously. Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: Pension company contribution = 3% Incentive scheme up to 10% of annual salary , based on company performance. Your wellbeing is More ❯
Requirements: Essential: 5+ years of experience in application security, with at least 3+ years in software development. Strong understanding of application security concepts, including secure coding practices, threat modeling, vulnerabilitymanagement, and access control mechanisms. Experience with AWS, Kubernetes, Service Mesh, and API Security (including authentication and authorization). Proficiency in programming languages such as Python, Java, JavaScript … GoLang, and Rust. Familiarity with Agile methodologies like SCRUM, along with proven project management skills to oversee multiple security projects simultaneously. Desired: Independent, proactive, and detail-oriented, with a commitment to maintaining high security standards. Strong communication and interpersonal skills, facilitating effective collaboration with both technical and non-technical teams. What we offer: Pension company contribution = 3% Incentive scheme More ❯
solutions Support ongoing improvements to internal security defenses Oversee security policies and procedures Assist with data protection initiatives Participate in security projects Develop disaster recovery plans Establish and improve vulnerabilitymanagement processes Requirements Experience in a Cyber Analyst or Cyber Engineer role Knowledge of SIEM and EDR tools Experience with network audits and penetration testing Infrastructure support experience More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MS Talent Ltd
selling to corporate and/or public sector clients. Strong expertise in Checkpoint technologies and Cybersecurity Managed Services. Experience selling a range of services such as SIEM, Managed Firewall, VulnerabilityManagement, and Threat Hunting. Excellent presentation, communication, and organisational skills. Proven ability to work collaboratively with pre-sales, technical, and support teams. Desirable Skills & Experience Familiarity with Microsoft More ❯
and implementing cloud-based architectures (AWS, Azure or GCP) Ability to implement monitoring solutions (e.g. Prometheus, Grafana) Experience implementing security best practices in DevOps Processes (e.g. Infrastructure as code, vulnerabilitymanagement and compliance) Aptitude to work in Agile environments Strong communication skills Nice to have: Immediate availability Flexibility to travel onsite if needed If you're interested in More ❯
advisor and advocate for security across the development lifecycle, influencing architecture, design and implementation decisions. Embed secure development practices into day-to-day workflows across engineering teams. Own the vulnerabilitymanagement lifecycle: from discovery and triage to remediation tracking and coordinated disclosure. Build Secure Products by Design Conduct threat models, security architecture reviews and risk assessments for new More ❯