Develop and maintain the enterprise information security strategy aligned with business goals Oversee security architecture, vulnerability management, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure compliance with financial regulations (e.g. GDPR, PCI DSS, SOX, FCA requirements) Establish and enforce security policies, standards, and procedures Report security posture, incidents, and More ❯
SOC and the security tools in the Cloud environment (Defender and Sentinel) Oversee security architecture, vulnerability management, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure compliance with financial regulations (e.g. GDPR, PCI DSS, SOX, FCA requirements) Establish and enforce security policies, standards, and procedures Report security posture, incidents, and More ❯
successful candidate must demonstrate proven experience in leading teams and fostering a culture of technical excellence. They will be expected to establish best practices for risk identification and remediationplanning, while also influencing stakeholders and delivering competitive advantage for global organisations by protecting against external threats and potential security vulnerabilities. NUMBER OF DIRECT REPORTS Circa 5 Key Responsibilities … AVR) and Vulnerability Response (VR) modules to manage and report on vulnerabilities and violations across the estate, integrating with dashboards and workflows for visibility and accountability. Risk Management & Remediation Work with other technology teams to provide in-depth analysis of vulnerabilities and impacts to key stakeholders. Collaborate with application teams to ensure secure coding practices and timely remediation … methods, including results from Static Application Testing (SAST) and Software Composition Analysis (SCA) tooling (in conjunction with the Service Transition team). Influence stakeholders to prioritise and drive remediation of process and technology gaps Work with Cyber Security, Application Teams, and IT Risk to ensure controls are met and vulnerabilities are addressed across infrastructure and applications. Engage and More ❯
awareness and education programmes – Analysis of information security alerts and incidents – Report on incidents, risks, threats and vulnerabilities – Scheduling internal and external penetration and vulnerability tests and managing remediationplanning Assist in evaluation of cyber security tools Manage online ISMS system. Assist the ISM to deliver Information Security projects Participate in technology and information security related audits, providing More ❯
London, England, United Kingdom Hybrid / WFH Options
Palo Alto Networks
response, digital forensics, and information security. With a proven track record of delivering mission-critical cybersecurity solutions, we work swiftly to provide effective incident response, attack readiness, and remediation plans, focusing on long-term support to enhance our clients’ security posture. Job Description Your Career Unit 42 is a dynamic, energetic, and highly collaborative organization within Palo Alto More ❯
understood and complied with across teams. Developing and integrating security testing plans into the Secure Software Development Lifecycle (S-SDLC) . Performing and overseeing security testing while managing remediation plans for identified vulnerabilities. What we're looking for: Experience in Software Engineering and Application Security . In-depth understanding of application security vulnerabilities , testing techniques, and familiarity with More ❯
Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
processes. Cloud cost optimisation while maintaining performance standards. Continuous improvement through technology evaluation and personal development. Onboarding and integration of new partner firms, including IT due diligence and remediation planning. Provision of quality 3rd line technical support and escalation handling. Accurate issue tracking and resolution documentation. Time and workload management across multiple incidents. Occasional travel and out-of More ❯
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
london (city of london), south east england, united kingdom
Alexander Ash Consulting
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
Cyber Essentials/Plus Telecommunications (Security) Act 2021 Identify risks and provide actionable recommendations. Produce clear audit reports and present findings to client stakeholders. Support clients in remediationplanning and regulatory alignment. Stay current with UK cybersecurity legislation and industry standards. Proven experience in cybersecurity auditing, ideally in a consultancy or client-facing role. Strong knowledge of UK More ❯
successful candidate must demonstrate proven experience in leading teams and fostering a culture of technical excellence. They will be expected to establish best practices for risk identification and remediationplanning, while also influencing stakeholders and delivering competitive advantage for global organisations by protecting against external threats and potential security vulnerabilities.NUMBER OF DIRECT REPORTSCirca 5 KEY RESPONSIBILITIES Strategic Leadership … AVR) and Vulnerability Response (VR) modules to manage and report on vulnerabilities and violations across the estate, integrating with dashboards and workflows for visibility and accountability. Risk Management & Remediation Work with other technology teams to provide in-depth analysis of vulnerabilities and impacts to key stakeholders. Collaborate with application teams to ensure secure coding practices and timely remediation … methods, including results from Static Application Testing (SAST) and Software Composition Analysis (SCA) tooling (in conjunction with the Service Transition team). Influence stakeholders to prioritise and drive remediation of process and technology gaps Work with Cyber Security, Application Teams, and IT Risk to ensure controls are met and vulnerabilities are addressed across infrastructure and applications. Engage and More ❯
closely with business, compliance, technology, and other teams to define and communicate data-related business requirements for initiative planning and prioritization. Supports investigations into data quality issues, developed remediation plans, and recommended solutions to resolve root causes. Maintains consistent communication with cross-functional teams to provide updates, ensure alignment, and track progress effectively. Profile Strong knowledge and hands More ❯
application security programme. This role will give you the chance to work closely with engineering and development teams, embedding security into the development lifecycle, driving automation, and influencing remediation plans that have real impact. What you’ll be doing Guiding teams on security best practices, compliance, and secure coding. Collaborating with architects and developers to review designs and More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
Morson Talent
application security programme. This role will give you the chance to work closely with engineering and development teams, embedding security into the development lifecycle, driving automation, and influencing remediation plans that have real impact. What you'll be doing Guiding teams on security best practices, compliance, and secure coding. Collaborating with architects and developers to review designs and More ❯
deployment and the criticality of the tool in the DevOps chain Run Quarterly Business Reviews (QBR) with Account Sales representatives Execute Sonar deployment audits, identify gaps, and drive remediation plans for Accounts Contribute to the Account Management plans with Sales Representatives. Elaborate the Technical strategy tailored to the Account context, provide inputs on the Commercial strategy Keep yourself More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Computer Futures - London & S.E(Permanent and Contract)
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
internal stakeholders. - Executing control testing activities aligned with regulatory and internal frameworks (e.g., SOX, FCF). - Assessing the effectiveness of controls, document findings, and support the development of remediation plans. - Updating or creating risk and control documentation in accordance with governance standards. - Driving enhancements through automation and digital tools to improve testing efficiency and accuracy. Skills and Experience More ❯
intelligence · Lead threat hunting engagements · Conduct incident response within various Cloud platforms · Identify attacker Tactics, Techniques and Procedures (TTPs) to develop indicators of compromise · Develop and implement dynamic remediation plans in conjunction with incident response engagements · Take a lead role in authoring comprehensively written client reports on investigative findings · Effectively communicate and interface with customers, both technically and More ❯