Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
TieTalent
We are searching for a Senior Software Security Architect/Senior Application Security Architect for a marketing leading and award-winning technology and data driven business. The position is offered on a remote basis. The role is hands-on and very software engineering focused - you will be responsible … Secure by Design' approach/practice to be used by all of the Architecture and Software development teams. Responsibilities: Developing, implementing, and maintaining application security architecture across the organisation. Ensuring our systems are designed with objectives like speed, scalability, robustness, zero-trust, automation and supportability at the core. Collaborating … an integral part of all development and deployment processes. Providing expert software security advice (design, coding, testing) to the Software Engineering Community, to InfoSec, DevOps and other teams. Defining and delivering secure software development of information to the software engineering teams. Escalating issues appropriately, to various teams and More ❯
Mentor and support junior pre-sales engineers in technical methodologies and best practices. Assist in responding to Requests for Proposals (RFPs) and Requests for Information (RFIs) with technical documentation and specifications. Participate in trade shows, webinars, and customer events to promote our solutions and expand our presence in the … acting as a trusted advisor throughout the sales cycle. Deep understanding all our technical capabilities across the sales cycle, including but not limited to, informationsecurity The knowledge and skill to answer technical queries for customers across the Sales Cycle, including informationsecurity, risk, architecture, and … problem-solving capabilities. Willingness to travel as needed for client meetings, events, and training sessions. Preferred Qualifications: Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field preferred; Master's degree a plus Relevant certifications (e.g., AWS Certified Solutions Architect, Microsoft Certified: Azure Solutions Architect, etc. More ❯
Mentor and support junior pre-sales engineers in technical methodologies and best practices. Assist in responding to Requests for Proposals (RFPs) and Requests for Information (RFIs) with technical documentation and specifications. Participate in trade shows, webinars, and customer events to promote our solutions and expand our presence in the … acting as a trusted advisor throughout the sales cycle. Deep understanding all our technical capabilities across the sales cycle, including but not limited to, informationsecurity The knowledge and skill to answer technical queries for customers across the Sales Cycle, including informationsecurity, risk, architecture, and … problem-solving capabilities. Willingness to travel as needed for client meetings, events, and training sessions. Preferred Qualifications: Bachelor's degree in Engineering, Computer Science, Information Technology, or a related field preferred; Master's degree a plus Relevant certifications (e.g., AWS Certified Solutions Architect, Microsoft Certified: Azure Solutions Architect, etc. More ❯
you will be responsible for developing, documenting, and refining IT procedures following ISO27001:2022 standards. We ask that you have a substantial understanding of informationsecurity protocols and excellent technical writing skills to meet project deadlines. You will be located in our London HQ, on a hybrid work … document IT procedures that comply with ISO27001 standards. Ensure all procedures are clear and easily understood by IT end-users. Collaborate with IT and security teams to gather necessary information and insights. Review/Update Existing Procedures Conduct in-depth reviews of existing IT procedures to ensure compliance … update procedures accordingly. Ensure all documentation is up-to-date and reflects current best practices and regulatory requirements. Ensure Compliance Work with the ITRS Security Manager to ensure all IT procedures align with ISO27001:2022 standards. Review audit findings and assessments to verify compliance. Provide recommendations for continuous improvement More ❯
On behalf of DWP, we are looking for a Head of Security Design for a 12 month (Inside IR35) contract. Hybrid working with 2 days per week required in London, Manchester, Leeds or Newcastle. The Department for Work and Pensions (DWP) is responsible for welfare, pensions, and child maintenance … including the most vulnerable in society. Improve the experience of our services while maximising value for money for the taxpayer. As a Head of Security Design, your main responsibilities will be: Provide leadership to ensure effective security and fraud risk expertise, advice, and support is delivered to include … business managers, Senior Risk Owners, and the Working Age Services SLT within DWP. Establish and manage the Working Age Services security posture and initiatives, ensuring the protection of information assets from internal and external threats. Develop, manage, and enhance the fraud risk management framework to minimize the department More ❯
At Ripple, we're building a world where value moves like information does today. It's big, it's bold, and we're already doing it. Through our crypto solutions for financial institutions, businesses, governments, and developers, we are improving the global financial system and creating greater economic fairness … This role is key to ensuring our global operations are seamless, secure, and scalable. You will collaborate with multi-functional teams, including Engineering and InformationSecurity, to architect a robust network supporting Ripple's innovative platform. WHAT YOU'LL DO: Lead design, implementation, and refinement of Ripple's … Provide technical leadership and innovative solutions for complex challenges. Engineer and refine network monitoring systems to ensure optimal performance and reliability. Collaborate with the InformationSecurity team to fortify the network against threats and ensure compliance. Spearhead initiatives to enhance network efficiency, reduce downtime, and support scalability. Provide More ❯
Job title: Cyber Security Analyst Location: UK (Remote with some travel to UK sites) Salary: Up to £70,000 + car allowance + package Why Apply? Join a growing organisation in the engineering sector in a newly created role that will play a key role as the company continues … to grow. You will contribute to a dynamic, fast-paced environment, protecting critical systems and data, working on a mix of BAU security operations and security-focused projects as they work towards their ISO certifications, building your technical skills while making a meaningful impact. Cyber Security Analyst …/Engineer Responsibilities: With day-to-day reporting to the Group InformationSecurity Officer (GISO), you will combine operational monitoring and incident response with hands-on project delivery. This is a role for a security professional who thrives in both technical and collaborative settings. Key duties include More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
William Hill PLC
Enterprise Security Architects play a key role in ensuring secure delivery of products and services, improving evoke's overall security. You'll act as a technical security authority, providing consultancy and guidance on projects, ensuring compliance with security regulations. The role focuses on assessing risks, developing security requirements, and collaborating with architects and engineers to deliver secure systems. What you will be doing Develop security requirements, blueprints, and patterns for new technologies across the organization Manage workloads and product delivery using Agile methods (Initiatives, Epics, User Stories, Tasks) Collaborate with Enterprise Security Architects to … solutions for Product Owner needs Assess new technologies and develop proof of concept/value implementations Work closely with architects and engineers to evaluate security needs and requirements for solutions and services. Collaborate with architects, Product Owners, and Heads of Product to approve security requirements across various domains More ❯
user provisioning, hands on end-point management including asset management, management of upgrades and device hardening. IT support work with leaders across IT in informationsecurity, operational resilience, engineering and IT operations to support the implementation of the IT strategies and policies. Key areas of responsibility: Provide first … Support and administer enterprise tools such as Microsoft Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and data loss prevention solutions, working in collaboration with informationsecurity teams. Configure and maintain network … infrastructure including Wi-Fi access points, VPNs, and firewalls in accordance with security policies. Assist with the administration and optimisation of document management systems and provide guidance to users on best practices. Document IT processes and maintain an up-to-date asset register, contributing to IT policy updates and More ❯
user provisioning, hands on end-point management including asset management, management of upgrades and device hardening. IT support work with leaders across IT in informationsecurity, operational resilience, engineering and IT operations to support the implementation of the IT strategies and policies. Key areas of responsibility: Provide first … Support and administer enterprise tools such as Microsoft Office 365, Teams, SharePoint, and Active Directory, including SSO and access controls. Maintain and monitor IT security tools including anti-virus, patch management, and data loss prevention solutions, working in collaboration with informationsecurity teams. Configure and maintain network … infrastructure including Wi-Fi access points, VPNs, and firewalls in accordance with security policies. Assist with the administration and optimisation of document management systems and provide guidance to users on best practices. Document IT processes and maintain an up-to-date asset register, contributing to IT policy updates and More ❯
Job Title: Technical Assurance Manager - Cyber Security (15738) Location: Luton/Hybrid Company Overview: When it comes to innovation and achievement there are few organisations with a better track record. Join us and you'll be able to play a big part in the success of our highly successful … we employ over 10,000 people. Role Overview: The Technical Assurance Manager is part of the Digital Safety Assurance team, overseeing easyJet's cyber security posture. This role acts as the 2nd line of defence, providing oversight of Cyber Security Controls in line with Digital Safety policy, security standards, and compliance requirements. Key Responsibilities: Overseeing, educating and assessing the implementation of Digital Safety policies and security standards. Safeguarding company data throughout all processes and systems. Validating threat models produced as part of the project design process. Conducting security assessments and raising identified cyber risks into More ❯
day role to management. How You'll Do It Analyze, design, code, test, and deploy new user stories and product features with high quality (security, reliability, operations) to production. Understand the software development lifecycle and leverage critical thinking skills to properly evaluate features and functionality. Guide early-career engineers … and data scientists. Contribute to and lead technology communities of practice at Discover in areas of design-thinking, tools/technology, agile software development, security, architecture, and/or data. Create and enforce IT standards within the system/application infrastructure and ensure compatibility with the architecture of the … platform. Minimum Qualifications At a minimum, here's what we need from you: Bachelor's degree in Computer Science, Engineering, Informatics, InformationSecurity, Information Technology, or related field. Experience in Information Technology, (Software) Engineering, or related field. For roles requiring Dreyfus Rating - Internal applicants only: technical More ❯
both business and technical focused. You will have ideas of how to drive the business forward, and be skilled in the commercial aspects of security testing, above all you will know what clients are looking for when they buy security testing and how to deliver it. Management and … STAR-FS, CHECK. Proven experience of successfully managing and delivering testing engagements on time and to budget. Proven experience working within the UK cyber security industry Demonstrable understanding and practical application of informationsecurity principles Strong technical background in computing, networks, and programming. Proven experience of producing … and verbal) Experience leading, coaching and mentoring highly technical teams A genuine interest and desire to work with large multi-national clients in the informationsecurity field. Advantageous: CCT-App or CSTL-App. Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List More ❯
both business and technical focused. You will have ideas of how to drive the business forward, and be skilled in the commercial aspects of security testing, above all you will know what clients are looking for when they buy security testing and how to deliver it. Management and … STAR-FS, CHECK. Proven experience of successfully managing and delivering testing engagements on time and to budget. Proven experience working within the UK cyber security industry Demonstrable understanding and practical application of informationsecurity principles Strong technical background in computing, networks, and programming. Proven experience of producing … and verbal) Experience leading, coaching and mentoring highly technical teams A genuine interest and desire to work with large multi-national clients in the informationsecurity field. Advantageous: CCT-App or CSTL-App. Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List More ❯
both business and technical focused. You will have ideas of how to drive the business forward, and be skilled in the commercial aspects of security testing, above all you will know what clients are looking for when they buy security testing and how to deliver it. This is … STAR-FS, CHECK. Proven experience of successfully managing and delivering testing engagements on time and to budget. Proven experience working within the UK cyber security industry Demonstrable understanding and practical application of informationsecurity principles Strong technical background in computing, networks, and programming. Proven experience of producing … and verbal) Experience leading, coaching and mentoring highly technical teams A genuine interest and desire to work with large multi-national clients in the informationsecurity field. Advantageous: CCT-App or CSTL-App. Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List More ❯
both business and technical focused. You will have ideas of how to drive the business forward, and be skilled in the commercial aspects of security testing, above all you will know what clients are looking for when they buy security testing and how to deliver it. This is … STAR-FS, CHECK. Proven experience of successfully managing and delivering testing engagements on time and to budget. Proven experience working within the UK cyber security industry Demonstrable understanding and practical application of informationsecurity principles Strong technical background in computing, networks, and programming. Proven experience of producing … and verbal) Experience leading, coaching and mentoring highly technical teams A genuine interest and desire to work with large multi-national clients in the informationsecurity field. Advantageous: CCT-App or CSTL-App. Knowledge of NCSC CTAS and CPA Assurance Schemes Knowledge of working in secure environments (List More ❯
offices on-site, full time, 5 days per week is a requirement for this role. We're on the hunt for a motivated, engaged Security Operations Analyst to support, maintain and improve/contribute to the management of real time security operations, including real time analysis and ongoing … security management across Vix's application suite. This opportunity will suit someone with similarly aligned experience, working closely with our Platforms and Engineering streams, with excellent collaboration and communications skills. You'll be based at our Manchester offices. What You'll Be Doing: Responding to security events Operation … globally Enforce compliance to recognised standards, such as PCI-DSS, ISO27001 Review and update security program documentation (Policies and Procedures) Stay current with infosec trends, emerging threats and best practices, tailoring recommendations to our business and customer needs What You'll Bring To The Role: AWS platform experience and More ❯
high-quality, focused IT consultancy. We seek a Junior SOC Analyst to work on fast-moving, innovative, and influential projects in the Defence and Security Sector. The role is challenging, interesting, and technically diverse. Key Responsibilities and Tasks Monitoring systems for security alerts, intrusions, or unauthorized activities Responding … to incidents using established playbooks Escalating complex incidents to Tier 2 Incident Response Teams Reviewing and developing security controls in a growing technical environment Triaging and reviewing vulnerability scanning reports, providing feedback to technical teams Reviewing secure configurations and feeding back for remediations Generating recurring security reports for … stakeholders Providing feedback for service improvements to the SOC Manager Staying updated on the latest security threats and trends Researching and developing understanding of security disciplines Working shifts in a 24/7 SOC service Experience (Essential) No corporate experience required, but desirable Relevant qualifications in Cyber SecurityMore ❯
business may wish to enter into. Leading the response to the due diligence exercises of customers and other third parties: Ensure that the correct information is gathered and submitted in a timely manner. Assisting with Data Subject Access Requests. Assisting the Group Head of Compliance and HR: With general … HR and/or health and safety-related tasks as may be required. General compliance-related and office administration tasks as may be required InformationSecurity: Adherence to all Group InformationSecurity policies and procedures in all aspects of your job role, with emphasis on confidentiality … integrity and availability of information assets. Health & Safety: Have a duty to take care of your own health and safety and that of others who may be affected by your actions at work. More ❯
will be part of the Cyber Response Services (CRS) Team within our Risk Consulting practice, directly reporting to the head of cyber response. Cyber security is among the sectors that KPMG has pinpointed for significant investment and expansion. Our clients encounter a difficult cyber threat and rely on us … to assist them in comprehending and dealing with that threat. Key Responsibilities: • Oversee and coordinate cyber security incidents for our clients • Conduct digital forensics on pertinent incident data (disk, volatile memory, network packets, log files). • Keep an updated perspective of the cyber threat environment and be capable of … and project-related issues. • Ability to produce well-organized responses to bids and requests for proposals. Key Skills: A comprehensive comprehension of the cyber security threat environment. Robust technical foundation in computing and networking, along with programming abilities. Notable and demonstrated experience in managing cyber security incidents and More ❯
will be part of the Cyber Response Services (CRS) Team within our Risk Consulting practice, directly reporting to the head of cyber response. Cyber security is among the sectors that KPMG has pinpointed for significant investment and expansion. Our clients encounter a difficult cyber threat and rely on us … to assist them in comprehending and dealing with that threat. Key Responsibilities: • Oversee and coordinate cyber security incidents for our clients • Conduct digital forensics on pertinent incident data (disk, volatile memory, network packets, log files). • Keep an updated perspective of the cyber threat environment and be capable of … and project-related issues. • Ability to produce well-organized responses to bids and requests for proposals. Key Skills: A comprehensive comprehension of the cyber security threat environment. Robust technical foundation in computing and networking, along with programming abilities. Notable and demonstrated experience in managing cyber security incidents and More ❯
with high quality to production. Level of technical expertise enables solutions with high complexity and depth. Competent in multiple technical domains, including programming languages, security, automation, testing, and business domains. As a result, is the go-to person for many people outside of their team. Participates in strategic technology … solving to determine root cause. Coaches technology communities at Discover in areas of specific technology domain, design-thinking, agile software development way of working, security, architecture and/or data engineering. Minimum Qualifications Bachelor's in Computer Science, Engineering, Informatics, InformationSecurity, Information Technology, or related … Experience in Information Technology (software), Engineering, or related Internal applicants only: technical proficiency rating of proficient on the Dreyfus engineering scale Physical and Cognitive Requirements The physical requirements described here are representative of those that must be met by an employee to successfully perform the essential functions of this More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
My client a growing informationsecurity consultancy, is seeking a qualified, highly motivated and skilled Cyber Essentials/CE Plus Assessor to join our team. We require the applicant to have a minimum of 2 years experience working on CE. Must be able to get to Milton Keynes … that stays at the forefront of the constantly evolving field of Cybersecurity. This role also has the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities: Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices … systems, and controls to ensure compliance to the Cyber Essentials Scheme Conduct in-depth vulnerability assessments to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations More ❯
peace of mind that are hallmarks of a solution crafted by Huguenots. The solutions we deliver are business critical and highly visible, delivering key information to investors worldwide. On a personal level, we are a close-knit team of 30 talented individuals, who thrive on collaboration and enjoy one … to manage and own projects. You will report directly to senior management and your role will involve high-level engagement with the infrastructure and informationsecurity teams at our clients (major fund management companies). This role would suit an all-round IT Manager/Team Leader who … has been involved in areas such as windows server, backup, networking, security standards etc. This position will also involve day to day ICT operational assistance for planned activities, operational reporting, assistance with reviewing and updating operational compliance documentation, audits, and the provision of hardware. Must also be comfortable being More ❯
peace of mind that are hallmarks of a solution crafted by Huguenots. The solutions we deliver are business critical and highly visible, delivering key information to investors worldwide. On a personal level, we are a close-knit team of 30 talented individuals, who thrive on collaboration and enjoy one … to manage and own projects. You will report directly to senior management and your role will involve high-level engagement with the infrastructure and informationsecurity teams at our clients (major fund management companies). This role would suit an all-round IT Manager/Team Leader who … has been involved in areas such as windows server, backup, networking, security standards etc. This position will also involve day to day ICT operational assistance for planned activities, operational reporting, assistance with reviewing and updating operational compliance documentation, audits, and the provision of hardware. Must also be comfortable being More ❯