Job Title: CyberArk Engineer Location: Warwick / Reading The Role: We are seeking a highly skilled CyberArk Engineer with hands-on experience in deploying, integrating, troubleshooting, and managing CyberArk Privilege cloud solutions. The candidate should have a deep understanding of cybersecurity principles, privileged access management, and hands-on experience with CyberArk's suite of tools. Key Responsibilities: Research, validate … . Strong understanding of integrating CyberArk with other security tools and infrastructure. Experience with cloud platforms (AWS, Azure, GCP) and their integration with CyberArk. Knowledge of DevOps and CI / CD pipelines for secrets management. Understanding of cybersecurity frameworks (NIST, ISO27001). Benefits: Competitive salary, benefits package, training, and development opportunities, including: Contributory pension More ❯
Exeter, Devon, United Kingdom Hybrid / WFH Options
Met Office
The following content displays a map of the jobs location - Exeter Lead Application Operations Engineer - Microsoft SharePoint Job Reference metoffice / TP / 349 / 797 Permanent Working Hours: 37 Location (City / Town): Exeter Closing Date: 20 / 07 / 2025 Profession: Region / Division: UK Region Careers website category: Technology Job … to use. Define and communicate best practice Evaluate the effectiveness of SharePoint and Teams training, providing recommendations and assistance in delivering agreed training in collaboration with any other teams / parties. Ability to explain technical concepts in simple and clear terms. Collaborate with colleagues on how applications are performing and changes that need to be put in place. Build … essential criteria in the supporting statement questionnaire .We recommend candidates use the CARL method (Context, Action, Result and Learning) for presenting evidence of experience and skills. Closing date 20 / 07 / 2025 at 23:59 with first stage interviews commencing from 28 / 07 / 2025. You will hear from us once the closing date More ❯
is responsible for ensuring that security is built into every part of the development lifecycle, specifically ensuring that security tooling (native and non-native) is properly embedded into CI / CD CI / CD pipelines. The role holder will be part of the transformation programmes including tech debt replacement and migration, embedding security to ensure seamless integration of … new systems / features and workflows. The Lead DevSecOps role will be responsible for ensuring that the replacement systems are security compliant, adhering to standards such as Secure by Design and GovAssure, utilising a shift left mentality to fix problems before production. This is as part of highly complex legacy replacements involving approximately 90,000 users. Essential skills and … experience: Strong hands-on expertise in DevSecOps practices, particularly security automation in CI / CD and infrastructure-as-code pipelines. Deep understanding of modern DevOps tooling (e.g., GitHub Actions / CircleCI, Terraform, Kubernetes, Docker) with secure configurations. Experience implementing security controls in cloud-native environments (e.g., AWS or Azure) including IAM, network policies, and container security. Proven track More ❯
across the organisation. Build, maintain and indirectly manage a community of IT auditors across our global business. Skills & experience - Senior IT Auditor Experience in the area of IT controls / IT risk management / IT audit - either in implementation, operation or assessment role - from a Big 4 background or large multinational experience . Experienced … in audit (external and internal) and familiar with Internal Audit standards. Technology Risk / Technology Audit / Technology Controls Certifications: CISA, ITIL, COBIT (CISSP, CISM, CRISC, Prince2 ISO27001 desirable) Able to make a high impact on management, to manage stakeholders and to communicate clearly. Display a passion for working in teams and help drive personal development. IT process … knowledge e.g. as defined in standards like ITIL, Cobit, ISO, or British Standards Possess IT knowledge on IT networks, operating systems, databases, and applications, ideally including the Microsoft stack, Cloud technologies and SAP. Well-versed in assessing business and technology risks and controls, be able to articulate the risks, and recommend business-focused solutions. Able to prioritise, multi More ❯
across the organisation. Build, maintain and indirectly manage a community of IT auditors across our global business. Skills & experience - Senior Technology Auditor Experience in the area of IT controls / IT risk management / IT audit - either in implementation, operation or assessment role - from a Big 4 background or large multinational experience . Experienced … in audit (external and internal) and familiar with Internal Audit standards. Technology Risk / Technology Audit / Technology Controls Certifications: CISA, ITIL, COBIT (CISSP, CISM, CRISC, Prince2 ISO27001 desirable) Able to make a high impact on management, to manage stakeholders and to communicate clearly. Display a passion for working in teams and help drive personal development. IT process … knowledge e.g. as defined in standards like ITIL, Cobit, ISO, or British Standards Possess IT knowledge on IT networks, operating systems, databases, and applications, ideally including the Microsoft stack, Cloud technologies and SAP. Well-versed in assessing business and technology risks and controls, be able to articulate the risks, and recommend business-focused solutions. Able to prioritise, multi More ❯
across the organisation. Build, maintain and indirectly manage a community of IT auditors across our global business. Skills & experience - Senior IT Auditor Experience in the area of IT controls / IT risk management / IT audit - either in implementation, operation or assessment role - from a Big 4 background or large multinational experience . Experienced … in audit (external and internal) and familiar with Internal Audit standards. Technology Risk / Technology Audit / Technology Controls Certifications: CISA, ITIL, COBIT (CISSP, CISM, CRISC, Prince2 ISO27001 desirable) Able to make a high impact on management, to manage stakeholders and to communicate clearly. Display a passion for working in teams and help drive personal development. IT process … knowledge e.g. as defined in standards like ITIL, Cobit, ISO, or British Standards Possess IT knowledge on IT networks, operating systems, databases, and applications, ideally including the Microsoft stack, Cloud technologies and SAP. Well-versed in assessing business and technology risks and controls, be able to articulate the risks, and recommend business-focused solutions. Able to prioritise, multi More ❯
companies vulnerability management involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership including UK CISO on company vulnerability management KPIs / KRIs Preparation of vulnerability management process and procedure documentation Provide consulting services to the vulnerability management team to assist in their security design to identify potential risks Review the … Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO27001, ISF or other security-related practices Previous Banking / Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data management Please apply within for further details - Matt Holmes More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
companies vulnerability management involving processes, reporting, enhancements, compliance and interacting with business stakeholders. Operationalize weekly vulnerability status reports for senior leadership including UK CISO on company vulnerability management KPIs / KRIs Preparation of vulnerability management process and procedure documentation Provide consulting services to the vulnerability management team to assist in their security design to identify potential risks Review the … Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO27001, ISF or other security-related practices Previous Banking / Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data management Please apply within for further details - Matt Holmes More ❯
and regulatory compliance (e.g. GDPR, ISO27001). Experience in cloud cost control and optimisation. Excellent communication and stakeholder engagement skills. Desirable: Knowledge of hybrid / multi-cloud environments and advanced cloud networking. Familiarity with Zero Trust security principles and cloud-based AI / ML services. Details: Salary: £90,000 per annum Location: Hybrid More ❯
high-growth SaaS environment. Strong software engineering background with hands-on knowledge of modern web technologies, cloud infrastructure (AWS, Azure, or GCP), and best practices in DevOps and CI / CD. Deep understanding of scalable architecture, security, and system design. Track record of hiring and leading high-performing technical teams in a fast-paced environment. Commercial acumen and the … the ability to influence both technical and non-technical stakeholders. Company Rapidly growing SaaS organisation with offices in London On site required Outside IR35 Salary & Benefits The salary range / rates of pay is dependent upon your experience, qualifications or training . Robert Half Ltd acts as an employment business for temporary positions and an employment agency for permanent … dependent upon your experience, qualifications and training. If you wish to apply, please read our Privacy Notice describing how we may process, disclose and store your personal data: gb / en / privacy-notice. More ❯
processes for secure model development, training, and deployment of AI products. Ensure that AI model behaviour in the firm's AI products is continuously monitored for any anomalies and / or potential security breaches. Conduct regular risk assessments and vulnerability analyses to identify potential security weaknesses in AI products and their environment. Define, develop, and maintain security policies, procedures … and stakeholder engagement skills, with the ability to bridge technical, and business perspectives. Confident in discussing complex AI models with product teams. Strong knowledge of secure development lifecycle and / or product security. You will stand out if you bring Bachelor's degree in Computer Science, Data Ethics, or a related field. Experience working in or with professional services … or legal sector organisations. Certifications in AI ethics, data privacy (e.g., CIPP / E, CIPM), or risk management (e.g., CRISC). Experience with AI auditing, algorithmic impact assessments, or model governance platforms. Knowledge of legal technology tools and platforms (e.g., legal research AI, contract analytics, generative AI). Ability to lead cross-functional initiatives in a complex, multinational environment. More ❯
Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory, design, and technical delivery. What you'll do Provide expert guidance across SASE / SSE, PAM, detection, and data centre security technologies Lead customer engagements, providing advisory services, architecture guidance, roadmap planning, and solution governance Define and document high-level solution designs, technical … architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE / SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and … IDaaS Strong background in core security technologies such as firewalls, IDS / IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across Azure, AWS, or Google Cloud Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security More ❯
Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory, design, and technical delivery. What you'll do Provide expert guidance across SASE / SSE, PAM, detection, and data centre security technologies Lead customer engagements, providing advisory services, architecture guidance, roadmap planning, and solution governance Define and document high-level solution designs, technical … architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE / SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and … IDaaS Strong background in core security technologies such as firewalls, IDS / IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across Azure, AWS, or Google Cloud Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security More ❯
Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory, design, and technical delivery. What you'll do Provide expert guidance across SASE / SSE, PAM, detection, and data centre security technologies Lead customer engagements, providing advisory services, architecture guidance, roadmap planning, and solution governance Define and document high-level solution designs, technical … architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE / SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and … IDaaS Strong background in core security technologies such as firewalls, IDS / IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across Azure, AWS, or Google Cloud Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security More ❯
Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory, design, and technical delivery. What you'll do Provide expert guidance across SASE / SSE, PAM, detection, and data centre security technologies Lead customer engagements, providing advisory services, architecture guidance, roadmap planning, and solution governance Define and document high-level solution designs, technical … architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE / SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and … IDaaS Strong background in core security technologies such as firewalls, IDS / IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across Azure, AWS, or Google Cloud Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security More ❯
Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory, design, and technical delivery. What you'll do Provide expert guidance across SASE / SSE, PAM, detection, and data centre security technologies Lead customer engagements, providing advisory services, architecture guidance, roadmap planning, and solution governance Define and document high-level solution designs, technical … architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE / SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and … IDaaS Strong background in core security technologies such as firewalls, IDS / IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across Azure, AWS, or Google Cloud Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
AI Security Architect 6 Month contract initially Based: Remote / Reading - Max 2 days p / w onsite Rate: £500 - £550 p / d (via Umbrella company) We have a great opportunity with a world leading organisation where you will be provided with all of the support and development to succeed. A progressive organisation where you can … really make a difference. We a great opportunity for an AI Security Architect Key Responsibilities: * Develop and implement comprehensive AI / ML security strategies, policies, standards and guidelines to protect organizational assets and ensure the secure operation of AI and ML systems. * Develop and own robust enterprise security architecture for AI / ML systems, CI / CD … and data pipelines. * Participate in enterprise-wide architecture initiatives for AI / ML. Understand the workflow and pipeline architectures of ML and deep learning workloads. * Conduct security risk assessments and threat modelling for AI / ML and other business projects performed thorough design reviews and security assessments of architectures and designs, identifying vulnerabilities, threats, and risks, and providing More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
embed processes for secure model development, training, and deployment of AI products. Ensure that AI model behaviour in the firms AI products is continuously monitored for any anomalies and / or potential security breaches. Conduct regular risk assessments and vulnerability analyses to identify potential security weaknesses in AI products and their environment. Define, develop, and maintain security policies, procedures … and stakeholder engagement skills, with the ability to bridge technical, and business perspectives. Confident in discussing complex AI models with product teams. Strong knowledge of secure development lifecycle and / or product security. You will stand out if you bring Bachelors degree in Computer Science, Data Ethics, or a related field. Experience working in or with professional services or … legal sector organisations. Certifications in AI ethics, data privacy (e.g., CIPP / E, CIPM), or risk management (e.g., CRISC). Experience with AI auditing, algorithmic impact assessments, or model governance platforms. Knowledge of legal technology tools and platforms (e.g., legal research AI, contract analytics, generative AI). Ability to lead cross-functional initiatives in a complex, multinational environment. What More ❯
ll Be Working On: ️ Managing and enforcing information security policies, procedures, and standards to safeguard organizational data ️ Conducting risk assessments and ensuring compliance with relevant security frameworks (e.g., ISO27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems … re Looking For: ️ Proven experience as an Information Assurance Specialist or in a similar role focused on data protection and compliance ️ Strong understanding of information assurance frameworks (e.g., ISO27001, NIST SP 800-53, COBIT) ️ Experience with security assessments, audits, and vulnerability management ️ Knowledge of regulatory standards such as GDPR, HIPAA, and PCI-DSS ️ Certifications such … as CISSP, CISM, or ISO27001 Lead Implementer are highly desirable More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Big Red Recruitment
Own cloud operations across Azure and drive platform performance and cost optimisation Oversee security engineering, audits, pen testing, and compliance Lead change and incident management and support services (24 / 7) Manage end-user tech, corporate apps (e.g. ServiceNow, Salesforce), and software licensing Collaborate with exec leadership weekly to drive strategy and improvement We're looking for someone who … Proven experience in IT operational leadership roles Strong knowledge of Azure, DevOps / cloud engineering, and platform reliability Experience driving observability and monitoring strategies across large-scale services Good working knowledge of cybersecurity practices, frameworks (NIST, ISO27001, Cyber Essentials), and audit processes Vendor, contract, and license management experience across software and infrastructure suppliers Skilled More ❯
Kettering, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
WEETABIX LIMITED
Experience with the following products and technologies: Microsoft Sentinel or similar SIEM and SOAR tools, KQL, Next-gen email defense platforms Knowledge of security frameworks such as NIST, ISO27001 Your Bowl of Perks (Benefits) Competitive salary & Annual Flexible benefits We offer a competitive salary and a comprehensive benefits package designed to support your wellbeing, career … whether its for family, rest or simply time for you. As well as your holiday entitlement, You can purchase up to 5 days additional annual leave Access to 24 / 7 counselling service (via Grocery Aid partnership) Flexible Working Policies Enhanced Maternity / Paternity / Adoption Leave Additional Time Off for Fertility Treatment and Neonatal Care Working … Parents Support Group Fully stocked kitchens filled with our delicious products for you to enjoy To learn more about life at Weetabix, visit our careers page https: // weetabixfoodcompany.co.uk / careers / Please note: We benchmark roles based on your skills and experience, so we do not advertise fixed salary ranges. Unfortunately, we are unable More ❯
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Experis - ManpowerGroup
Job Title: Security Consultant - Secure by Design / Security Assurance Location: Hybrid - Remote & Onsite (Corsham, Wiltshire) Contract Length: 9 Months Clearance Required: DV Rate: up to £700pd outside IR35 Start Date: 1st July Responsibilities: Provide expert security consultancy across the project lifecycle, with a focus on secure-by-design practices. Lead or support security risk assessments, threat modelling, and … and NCSC guidance. Experience producing or reviewing technical security documentation Ability to influence stakeholders and work collaboratively across multi-disciplinary teams. Security-related qualifications (e.g., CISSP, CISM, CCP, ISO27001 Lead Auditor). Experience with cloud security Background in supporting complex ICT systems or programmes within secure environments. People Source Consulting Ltd is acting as an More ❯
to thrive in a fast-paced environment and independently manage priorities and challenges to balance delivery across multiple initiatives, stakeholders etc. • Understanding and practical experience of applying IT management / governance frameworks (e.g. COBIT, IT-CMF) • Knowledge of the legal and regulatory environment within which easyJet operates as well as specific relevant regulations and standards such as NIS, GDPR … PCI DSS etc. • Knowledge of topic-specific framework & methodologies in areas such as Risk Management (ISO 31000) IT management (e.g. COBIT) Information Security (NIST, ISF, ISO27001), Service Delivery (e.g. ITIL) etc. What we can offer you Business Area Primary Location More ❯
Creating business risk models and associated material, in support of operational cyber security and business planning activity across a range of different domains or sectors against recognised standards (e.g. ISO27001, NCSC CAF, NIS Directive, UK GovAssure) Identify mitigations for cyber risk in a given business or operational scenario and threat environment Lead and deliver cyber security audits, risk reviews and … driven with eye for the detail Eligibility to obtain UK security clearance (requires 5 years continuous UK address history) Desirable qualification(s) for the Cyber Security Risk Consultant: ISO27001 Lead Auditor or Implementer ISACA Certified Information Systems Auditor (CISA) Certified Information Systems Security Professional (CISSP) Principle or above in UKCSC Specialism ‘Governance & Risk Management’ or More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
IAM SailPoint Analyst - Urgent Contract Day Rate: £450 - £550 Via Umbrella Engagement Location: Gloucestershire (Hybrid 1-2 Days P / W - Can be flexible) We are seeking a highly motivated IAM SailPoint Analyst to join our Information Security team. This role is crucial for administering, maintaining, and supporting our Identity and Access Management (IAM) systems and processes, ensuring users … Strong understanding of IAM concepts (authentication, authorization, provisioning, SSO, MFA, PAM). Familiarity with directories (Active Directory, LDAP). Knowledge of industry security frameworks and compliance (e.g., NIST, ISO27001). Reasonable Adjustments: Respect and equality are core values to us. We are proud of the diverse and inclusive community we have built, and we welcome More ❯