Basingstoke, Hampshire, South East, United Kingdom
Hiring People
Amethyst delivers a range of specialist cybersecurity professional services. We help businesses to understand the value of their information assets, assess the associated security risks and develop the technical and procedural controls to manage them. We work across all sectors, including the public sector where much of our work has a focus on the management of compliance and security … Word and PowerPoint functions to present accurate and robust information to support the business Previous working experience in sales or business support administration. Desirable Skills & Experience: Basic understanding of cybersecurity terminology and concepts to enable effective support of the business context. Behavioural Competencies Strong written, verbal and interpersonal communication skills with experience of drafting business correspondence Ability to build More ❯
ensure technical feasibility and alignment with best practices. Ensure integration with market data feeds and execution systems using FIX protocol . Contribute to architectural discussions and design reviews. Uphold cybersecurity standards in coordination with security consultants. Leverage AWS infrastructure for deploying, monitoring, and scaling platform components. Use Python scripts for automation, prototyping, and light data analysis when needed. Track KPIs … in a technical Product Manager role, ideally in fintech, crypto, or capital markets. Strong technical background - able to engage deeply with engineers on system design and infrastructure. Familiarity with cybersecurity principles , identity/access management, and secure APIs. Experience with AWS services (e.g., EC2, RDS, S3, Lambda, IAM, CloudWatch). Proficiency in Python scripting for basic automation or data parsing … and private networking concepts , including firewalls, VPNs, VPCs, subnets, and routing in cloud and hybrid environments. Knowledge of crypto markets, blockchain infrastructure, and DeFi protocols. Certifications in AWS or cybersecurity are a plus. Here is why you should join our dynamic team: Opportunity to work at one of the world's leading algorithmic trading firms Engaging projects offering accelerated responsibilities More ❯
Manager to join the CISO function on a contract basis. This is a broad IT delivery role within the Chief Information Security Office (CISO), but does not require deep cybersecurity expertise . The successful candidate will manage a variety of technology-related projects, working closely with internal teams in London and coordinating alignment with the Head Office in Tokyo . … and multi-lingual environments. Strong documentation and reporting skills. Fluency in Japanese (both written and spoken) is essential due to regular collaboration with Tokyo-based teams. Desirable: Exposure to cybersecurity projects or teams is helpful but not essential. Experience coordinating with international offices or global teams. Knowledge of project delivery frameworks (e.g. Agile, Waterfall, hybrid). This is a fantastic More ❯
Manager to join the CISO function on a contract basis. This is a broad IT delivery role within the Chief Information Security Office (CISO), but does not require deep cybersecurity expertise . The successful candidate will manage a variety of technology-related projects, working closely with internal teams in London and coordinating alignment with the Head Office in Tokyo . … and multi-lingual environments. Strong documentation and reporting skills. Fluency in Japanese (both written and spoken) is essential due to regular collaboration with Tokyo-based teams. Desirable: Exposure to cybersecurity projects or teams is helpful but not essential. Experience coordinating with international offices or global teams. Knowledge of project delivery frameworks (e.g. Agile, Waterfall, hybrid). This is a fantastic More ❯
Leicester, Leicestershire, East Midlands, United Kingdom
Baltic Apprenticeships
including Active Directory, to ensure good housekeeping practices. Contribute to a variety of assignments and mini-projects, helping to drive key initiatives to completion. Stay up-to-date with cybersecurity alerts to ensure the integrity of our systems. Assist with IT auditing and inventory management as required. Create and update technical documentation to ensure processes are clear and current. … Skills and Experience you will learn: Desktops/Laptops: Hardware imaging using the MDT platform, Windows 11 Operating Systems, docking stations, monitor connectivity, and cybersecurity elements such as BitLocker and Endpoint Security. Software: Office 365, Microsoft Office Suite, Defender for Endpoint anti-virus software, Teams, and more. Systems: Active Directory, Service Desk Plus ticketing system, meeting room conference call More ❯
and Jenkins. Implementing Infrastructure-as-Code (IaC) practices using Terraform for automated provisioning and management. Embedding integrated quality and security gates within CI/CD pipelines. Implementing and automating cybersecurity monitoring and controls. Managing package repositories and security solutions with JFrog SaaS Artifactory and GitHub Advanced Security. Ensuring team ownership, accountability, and proactive management of Cloud infrastructure. You will regularly … Organisations S3 (Storage Tiers, Lifecycles) CloudFront distribution Experience with proactive management and team ownership of cloud infrastructure Beneficial Experience: AWS certifications Familiarity with SIEM solutions and Security Incident Management Cybersecurity awareness or certification Data engineering familiarity (EMR, ETL) Coaching or mentoring experience Key Behaviours: Excellent problem-solving skills Flexibility to experiment and adapt quickly based on results Strong team collaboration More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Sophos Group
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. … any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos' data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered Sophos More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NCC Group
our mission, to make the world safer and more secure. Take a look at our website here to learn more about why we’re one of the leading global CyberSecurity and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity: You will be acting as senior member of the Operational Threat Intelligence team, reporting to the … as a mentor to members of the team, providing guidance and mentorship to junior members of the team. Qualifications and Skills: Bachelor’s Degree (or equivalent) in Computer Science, CyberSecurity, or other suitable subject that is applicable to the role. Have an analytical mindset with a keen attention to detail. Ability to work effectively under pressure and prioritize tasks More ❯
our mission, to make the world safer and more secure. Take a look at our website here to learn more about why we’re one of the leading global CyberSecurity and Risk Mitigation business... https://www.nccgroup.com/uk/The Opportunity: You will be acting as senior member of the Operational Threat Intelligence team, reporting to the … as a mentor to members of the team, providing guidance and mentorship to junior members of the team. Qualifications and Skills: Bachelor’s Degree (or equivalent) in Computer Science, CyberSecurity, or other suitable subject that is applicable to the role. Have an analytical mindset with a keen attention to detail. Ability to work effectively under pressure and prioritize tasks More ❯
across hardware, software, and network environments. Proven experience managing IT resources, budgets, projects, and vendor relationships. In-depth working knowledge of Information Governance, data protection regulations (e.g., GDPR), and cybersecurity principles. The role is available 37 hours per week, Monday Friday, 8.30am 4.30pm (Friday 4pm finish), on a salary of £55,690 - £62,682 per annum. The role is … developing and managing robust data sets. Proven experience managing IT resources, budgets, projects, and vendor relationships. In-depth working knowledge of Information Governance, data protection regulations (e.g., GDPR), and cybersecurity principles Desirable Knowledge of healthcare information systems Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such it More ❯
ll use: Professional Skills Customer Orientation Complex Problem Solving Strategic Thinking Creative Thinking Effective Communication Tech Industry & SAP General Skills Agile Methodology Process Improvement Software as a Service (SaaS) CyberSecurity Key Performance Indicators (KPIs) SAP Cloud Suite Portfolio RISE and GROW with SAP Role Specific Skills Relationship Building Partner Relationship Management Account Governance Customer Value Journey Alignment Industry Knowledge … Locations: . Requisition ID: 430959 Posted Date: Jul 4, 2025 Employment Type: Regular Full Time Expected Travel: 0 - 10% Location: Middlesex, GB, TW148HD Job Segment: Cloud, Account Manager, ERP, CyberSecurity, Project Manager, Technology, Sales, SecurityMore ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
protocols. Proficient in Microsoft Office and common IT platforms for analysis and reporting. Experience working in regulated utility or critical infrastructure environments. (e.g. water, power, rail). Exposure to cybersecurity principles in industrial environments, including OT security standards. Familiarity with a broad range of OT technologies, integration practices, and industrial automation tools. Ability to prioritise workload and manage reactive support … DNP3, Modbus, and other industrial standards. Experience with scripting or automation tools (e.g. Python, SQL, PowerShell) to enhance system support and reporting. Certifications or training in OT networks, SCADA cybersecurity, or related disciplines. Experience developing support documentation and user training materials to enhance team capability. What's in it for you? Competitive salary up to £56,000 per annum, depending More ❯
is loaded Sr. Cloud Engineer (Remote, GBR) Apply locations United Kingdom - Remote time type Full time posted on Posted Yesterday job requisition id R23452 As a global leader in cybersecurity, CrowdStrike protects the people, processes and technologies that drive modern organizations. Since 2011, our mission hasn't changed - we're here to stop breaches, and we've redefined modern security … limitless passion, a relentless focus on innovation and a fanatical commitment to our customers, our community and each other. Ready to join a mission that matters? The future of cybersecurity starts with you. Engineer - OWL We're building the next-generation infrastructure and security platform for CrowdStrike. The OverWatch Labs (OWL) team builds the platform and tools for our analysts … successful open source libraries and projects. Contributions to the open source community (GitHub, Stack Overflow, blogging). Existing exposure to Go, AWS, Cassandra, Kafka, Elasticsearch Prior experience in the cybersecurity or intelligence fields. Bring your experience in distributed technologies and algorithms, your great API and systems design sensibilities, and your passion for writing code that performs at extreme scale. You More ❯
Founded in 2017, Obsidian Security was created to close a critical gap: securing the SaaS applications where modern business happens-platforms like Microsoft 365, Salesforce, and hundreds more. Backed by top investors including Greylock, Norwest Venture Partners, and IVP, we More ❯
Sophos is a global leader and innovator of advanced security solutions for defeating cyberattacks. The company acquired Secureworks in February 2025, bringing together two pioneers that have redefined the cybersecurity industry with their innovative, native AI-optimized services, technologies and products. Sophos is now the largest pure-play Managed Detection and Response (MDR) provider, supporting more than 28,000 organizations. … any time, please follow the steps set out in the Privacy Policy describing your individual rights. For more information on Sophos' data protection practices, please consult our Privacy Policy Cybersecurity as a Service Delivered Sophos More ❯
Joiner-Mover-Leaver) lifecycle automationCoordinate global IAM programmes and initiatives across Americas, EMEA, and APAC regions.Regulatory Alignment & Risk ManagementEnsure IAM controls meet global compliance requirements in particular US.: FFIEC Cybersecurity Guidelines, GLBA, SOX, NYDFS Part 500Lead periodic access reviews, privilege management initiatives, and control remediation efforts across jurisdictions.Provide oversight for IAM risk assessments, audits, and regulator inquiries.Stakeholder ManagementEngage senior stakeholders … e.g., adaptive access, AI-driven anomaly detection).Team ManagementLead a globally distributed team of IAM engineers, analysts, project managers, and third-party vendors.Promote knowledge-sharing, consistent delivery standards, and cybersecurity culture across regions. SKILLS Must have At least 10 years as a Program/Project Manager within the financial services, including 5+ years in IAM related function.Strong knowledge of IAM More ❯
support, workplace technology, and the coordination of infrastructure-related activities. This role combines technical expertise with oversight responsibilities in a centrally managed IT environment, where core services - such as cybersecurity, networking, and systems architecture - are governed by Group IT. The position operates within a high-demand trading floor environment, where technology plays a mission-critical role. It requires strong operational … and systems architecture. Ensure compliance with global policies on patching, endpoint protection, and data management. Coordination with Central IT and External Providers Interface with Group IT teams responsible for cybersecurity, networking, and infrastructure. Coordinate on-site interventions with external system engineers and technology vendors (e.g., mobile providers, AV specialists). Act as the local lead for IT-related activities during … operations. Proficiency in Windows OS, Microsoft 365, endpoint management tools, and networking fundamentals. Experience with remote support tools, asset management systems and mobile device management (MDM). Familiarity with cybersecurity best practices and endpoint compliance. Ability to manage external service providers and collaborate in a matrixed IT environment. Proactive, service-oriented mindset with strong communication and prioritization skills. How to More ❯
Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
Prolific is not just another player in the AI space-we are the architects of the human data infrastructure that's reshaping the landscape of AI development. In a world where foundational AI technologies are increasingly commoditized, it's the More ❯
The driving force behind our Machine Learning and Data Science infrastructure at Mimecast Embrace the incredible opportunities that lie within Mimecast, where innovation and impact converge. The cybersecurity industry is experiencing exponential growth, and by joining us, you'll be at the forefront of this ever-evolving landscape. The field is rapidly changing, as threat actors employ AI to scale … amongst the most senior roles in the team, directly reporting to the Director of Data Science. Join us on this exhilarating journey, where you'll shape the future of cybersecurity by developing large-scale data products for ML models that push the boundaries of innovation and make an indelible impact in protecting our digital world." - Hiring Manager Responsibilities Design and … plans and other related benefits. Our salary ranges are determined by role, level, and location. These factors and individual capabilities will also determine the individual pay offered. DEI Statement Cybersecurity is a community effort. That's why we're committed to building an inclusive, diverse community that celebrates and welcomes everyone - unless they're a cybercriminal, of course. We're More ❯
while working closely with the Data Insights team to deliver integrated, forward-thinking solutions. Oversee the design, implementation, and optimisation of IT infrastructure to meet evolving business needs. Champion cybersecurity and ISO27001 compliance in collaboration with our compliance team. Lead the development and implementation of our AI strategy to support efficiency and innovation. Manage budgets, suppliers, and resources to drive … a related discipline (Master's preferred). Proven senior leadership experience in IT, ideally within the FM sector. Strong understanding of CAFM systems (Maximo experience preferred). Expertise in cybersecurity, governance, and compliance (including ISO27001). A collaborative, solutions-focused approach to leading high-performing, cross-functional teams. Experience in vendor and budget management. Confident presentation skills to support client More ❯
telecom (e.g., Kubernetes, OpenStack) Wireless or wireline technologies (e.g., 5G, LTE, Fiber Optics) Network function virtualization (NFV) or software-defined networking (SDN) Real-time embedded systems experience in telecom Cybersecurity best practices knowledge in telecommunications networks AI/ML applications experience in network automation Microservices architecture and development experience Scrum master experience facilitating skilled development teams SDN/SD-WAN … as part of their tasks. Technology Solutions We're into seeing where technology can take us, so if you have ever imagined what the future of supply chain management, cybersecurity, the cloud and Internet of Things will look like, we want you to be part of the team that makes it happen. We are honoured to be recognized 5G TELUS More ❯
function or in an audit/governance role Knowledge of IT risk management and IT governance, risk, and compliance (GRC) would be an advantage but not essential. Understanding of cybersecurity risks and controls would be an advantage but not essential. Understanding of GDPR requirements would be an advantage but not essential. Experienced Microsoft Office user (Word, Excel and PowerPoint) Qualifications … ITIL trained would be an advantage but not essential. IT risk management or cybersecurity certification would be an advantage, otherwise a desire to work towards achieving formal qualification. Skills Excellent oral and written communication skills, with high attention to detail Ability to produce high quality, detailed outputs. Good analytical skills Highly organised and able to implement and manage robust governance More ❯
function or in an audit/governance role Knowledge of IT risk management and IT governance, risk, and compliance (GRC) would be an advantage but not essential. Understanding of cybersecurity risks and controls would be an advantage but not essential. Understanding of GDPR requirements would be an advantage but not essential. Experienced Microsoft Office user (Word, Excel and PowerPoint) Qualifications … ITIL trained would be an advantage but not essential. IT risk management or cybersecurity certification would be an advantage, otherwise a desire to work towards achieving formal qualification. Skills Excellent oral and written communication skills, with high attention to detail Ability to produce high quality, detailed outputs. Good analytical skills Highly organised and able to implement and manage robust governance More ❯
function or in an audit/governance role Knowledge of IT risk management and IT governance, risk, and compliance (GRC) would be an advantage but not essential. Understanding of cybersecurity risks and controls would be an advantage but not essential. Understanding of GDPR requirements would be an advantage but not essential. Experienced Microsoft Office user (Word, Excel and PowerPoint) Qualifications … ITIL trained would be an advantage but not essential. IT risk management or cybersecurity certification would be an advantage, otherwise a desire to work towards achieving formal qualification. Skills Excellent oral and written communication skills, with high attention to detail Ability to produce high quality, detailed outputs. Good analytical skills Highly organised and able to implement and manage robust governance More ❯