the customer. We use cutting-edge technologies to manage BMC's infrastructure and showcase it to the customers - program is called BMC on BMC! BMC is looking for a Security Engineer to join our amazing global Corporate Cybersecurity team within the IS&T department! In this role, you will build, maintain, and troubleshoot our information security systems while … supporting internal customers. You will have the opportunity to learn multiple tools and technologies across multiple security domains. So, if you're committed to customer success, an awesome team player, and enjoy building relationships - this is the role for you! Here is how, through this exciting role, YOU will contribute to BMC's and your own success: Deploy and … maintain security tools and systems to secure our multi-cloud and on-premise environments. Implement security policy, standards, guidelines, processes, and procedures to ensure ongoing security posture. Provide expertise in security control configuration to business as needed. Develop documentation to support ongoing security systems operation. Develop, analyze, and implement security specifications. Participate in incident More ❯
identify and draw attention to opportunities for enhancing our delivery and providing additional services to organisations we work with. We are seeking a highly motivated and experienced Lead Software Security Engineer to join our team. You will have a strong background in software development, security, and operations. This role is required to support the Digital Product Management team … in embedding security requirements and best practices into new Digital Products and Services. You will work closely with the Digital Product Management and IT Security teams to establish and build the right security controls and quality state gates across the product lifecycle. This includes security tooling to manage these controls. In this busy and rewarding role … you'll also: Collaborate with software development teams to integrate security into the development lifecycle Own the cultural shift to a Security DevSecOps mindset Manage & implement security controls, tools, and processes to secure applications and infrastructure Monitor and respond to security incidents and threats in a timely manner Stay up-to-date with security trends More ❯
SOC Support Engineer, AWS SOC Security Support Engineer Job ID: Amazon Australia Company Pty Ltd The Amazon Web Services (AWS) Security Operations Center (SOC) Support Engineer works across systems and services to provide security response for logical and physical domains in support of AWS security, customers, and partners. The SOC Support Engineer analyzes and responds to … security alerts across systems for internal services. They use their security knowledge and judgement to identify risks, drive swift mitigation, resolution and escalation as needed. Candidates for this role will possess both knowledge of security principles and experience with practical application of security response. An ideal candidate will have experience in one or more of the … following domains: security operation center (SOC), incident response, and security alert response. They will possess excellent verbal and written communication skills and be able to multitask effectively through multiple incidents or workflows. Successful candidates will demonstrate good judgement and critical thinking while following SOC procedures and guidelines. They will have a technical background to identify through systems and More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
AJ BELL BUSINESS SOLUTIONS LIMITED
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bells systems and services. This role is responsible for facilitating the secure delivery of AJ Bells technology and business change. The Information Security Architect will play a lead role in designing and implementing security … Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bells systems and data. Design and implementation of enterprise security technology controls and platforms, following … industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our securityposture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with Information Security, Infrastructure and Architecture to More ❯
Our leading Technology client is looking for Cyber Security Engineer based at Guildford London. This if office based job. Key Responsibilities Develop, implement, and maintain security policies, procedures, and protocols. Monitor, analyse and investigate security alerts, responding appropriately, documenting findings and collaborating with relevant teams. Conduct regular security assessments, audits and penetration tests to identify potential … vulnerabilities. Investigate and propose new technologies which would help improve our security posture. Coordinate with IT and other departments to ensure security measures are integrated into all systems and processes. Manage and conclude third party Cybersecurity assessments. Manage and oversee the implementation of security tools and technologies. Promote and conduct security awareness and training for employees. … Stay up-to-date with the latest security trends, threats, and technology solutions. Ensure compliance with relevant laws, regulations, and industry standards. Prepare and present security reports to senior management. Skills Preferred Skills/Requirements Ideally around 5 years of experience in cybersecurity or a related field. Knowledge of security frameworks and standards (e.g., ISO 27001, ITIL More ❯
Job Title: Head of IT Security Location: Saudi Arabia, Riyadh Employment Type: Full-Time - Onsite Compensation: Competitive salary and benefits package About the Role We are seeking a dynamic and experienced Head of IT Security to lead our cybersecurity strategy and operations. This is a pivotal role in a large, forward-thinking construction company undergoing digital transformation. The … ideal candidate will bring a blend of technical expertise , functional leadership , and strategic vision to build and manage a lean, agile, and proactive security team . Key Responsibilities Develop and execute the company’s cybersecurity strategy , policies, and frameworks. Lead the implementation and optimization of CrowdStrike Falcon EDR and NextGen SIEM platforms. Build and manage a high-performing security team , fostering a culture of agility, innovation, and accountability. Oversee threat detection, incident response, and vulnerability management . Collaborate with IT, operations, and executive leadership to align security initiatives with business goals. Ensure compliance with local and international cybersecurity regulations and standards. Conduct regular risk assessments , audits, and security awareness training. Stay ahead of emerging threats and More ❯
Regional Sales Engineer- Cloud (French Speaking) The Company: Varonis (Nasdaq: VRNS) is a leader in data security, fighting a different battle than conventional cybersecurity companies. Our cloud-native Data Security Platform continuously discovers and classifies critical data, removes exposures, and detects advanced threats with AI-powered automation. Thousands of organizations worldwide trust Varonis to defend their data wherever … it lives - across SaaS, IaaS, and hybrid cloud environments. Customers use Varonis to automate a wide range of security outcomes, including data securityposture management (DSPM), data classification, data access governance (DAG), data detection and response (DDR), data loss prevention (DLP), and insider risk management. The Role: The Cloud Regional Sales Engineer will provide integration solutions for … customers and prospects seeking visibility into their cloud environment's securityposture . They will develop expertise in onboarding Varonis to make it a key component of every client's cloud security program.Theideal candidate will build an intimate knowledge of cloud architecture and management (IaaS, SaaS, DSPM, CSPM, etc.) and enable the field on integration standards and More ❯
Coalville, England, United Kingdom Hybrid / WFH Options
Mobius Networks Limited
company has a strong track record of delivering data, remote diagnostics, and improving services while reducing maintenance costs. Mobius Networks offers a select range of networks known for their security, reliability, and availability, setting them apart in the industry. Key responsibilities: Deliver projects and solutions related to the IT Infrastructure (internal and customer facing) Manage, maintain, and optimise IT … Infrastructure for key and critical services (internal and customer facing) Implement changes and upgrades for the IT Infrastructure and customer IoT Network Proactively monitor and enhance the Cyber Securityposture for all IT Infrastructure services (internal and customer facing) Create, maintain, and adhere to documented policies, processes, and procedures Where required, collaborate with Mobius Mobile Network Operators on … RSA, Authenticator apps) Data Leakage Prevention (DLP) Desirable skills: CCNA or CCNP certification RADIUS: Experience with Steel-Belted RADIUS, FreeRADIUS, or nuRADIUS Database Management: Basic knowledge of MS SQL Security Appliances: Experience with filtering solutions, RSA authentication, and Data Leakage Prevention (DLP) SIEM solution exposure What Will Make You Shine at Mobius Strong multitasking with capability to manage and More ❯
Partner of the Year 2022 and CRN MSSP of the Year 2021. Since 2014, the company has been challenging the status quo in cybersecurity by offering a fully managed security platform where expert engineers take responsibility for maintaining critical services, applying updates, and monitoring vulnerabilities. Built on decades of hands-on technical experience, the company's consultative approach has … redefined industry standards, ensuring businesses receive proactive, tailored security solutions. With a dedicated support team known for exceptional issue resolution and strict SLA adherence, organizations can trust in a security partner that prioritizes protection and continuous innovation. The company is in search for a skilled L3 SOC Analyst to join the growing team. If you would like to … learn more about this opportunity, feel free to reach out and apply today! Responsibilities: Monitor and analyse security events within the SOC, ensuring timely detection and response. Perform threat analysis, vulnerability assessments, and implement mitigation strategies. Develop and refine incident response playbooks and procedures. Conduct root cause analysis (RCA) for high-priority incidents to prevent recurrence. Collaborate with internal More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
BT Group
Press Tab to Move to Skip to Content Link Select how often (in days) to receive an alert: SIEM Application Engineer Function: Cyber Security Unit: Networks Location: Snowhill, Birmingham, United Kingdom Salary: Competitive with Great Benefits The new Network SIEM is essential to BT's network security, meeting TSA requirements and improving our CAF level. Your role as … a SIEM Application Engineer in Security Engineering is to support the development, implementation, operation and support of BTs Strategic SIEM development. We are seeking a skilled SIEM Application Engineer with expertise in Elasticsearch to join our dynamic team. As a SIEM engineer, you will play a critical role in designing, developing, and maintaining our security information and event … management (SIEM) system. Your focus will be on leveraging Elasticsearch and related technologies to enhance threat detection, incident response, and overall security posture. This role is hybrid (3 days in office) and can be based in one of the following offices: Birmingham, Manchester, Ipswich (Ipswich only applicable to existing BT employees) What you'll be doing SIEM Solution Development More ❯
communication. You’ll be working closely with IT, SOC, and business teams to identify and manage technical risks, translate vulnerabilities into business impact, and support the Head of Information Security with day-to-day risk oversight. What You’ll Be Doing: Carrying out technical security risk assessments across infrastructure, applications, and suppliers. Translating threats into clear, business-aligned … risk narratives . Maintaining and updating the Cybersecurity Risk Register . Supporting SOC escalations and incident investigations. Reviewing third-party securityposture and assessing vendor risk during tenders. Producing risk reports and presenting findings to technical and non-technical stakeholders. What We’re Looking For: Strong hands-on experience in cybersecurity risk assessment and threat modelling . Deep … knowledge of network, endpoint, and cloud security principles. Comfortable working alongside or within a Security Operations Centre (SOC) . Able to communicate technical risks in plain business terms. Familiar with frameworks such as ISO 27005, NIST RMF , or similar. Available to start immediately or within short notice . Bonus Points For: Certifications: CISSP, CISM, CRISC, CEH or equivalent. More ❯
Security Engineer Location: Dummer, Basingstoke Salary: £35,000 - £55,000 (Based on Experience) Hybrid (3 days in the office and 2 days from home) Key Tasks: Security assessments: Create and perform security assessments and threat models Security standards: Develop, implement & maintain security standards and plans Vulnerability Management: Research weaknesses and find ways to counter them … Security incident response: Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing: Test company software, firmware, and firewalls Security software design: Design software security systems like intrusion detection systems and firewalls Security system maintenance: Maintain and proof network security systems Security system analysis: Analyse security systems and seek improvements on a continuous basis Help develop platforms and tools to automate and improve securityposture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM More ❯
Security Engineer Location: Dummer, Basingstoke Salary: £35,000 - £55,000 (Based on Experience) Hybrid (3 days in the office and 2 days from home) Key Tasks: Security assessments: Create and perform security assessments and threat models Security standards: Develop, implement & maintain security standards and plans Vulnerability Management: Research weaknesses and find ways to counter them … Security incident response: Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing: Test company software, firmware, and firewalls Security software design: Design software security systems like intrusion detection systems and firewalls Security system maintenance: Maintain and proof network security systems Security system analysis: Analyse security systems and seek improvements on a continuous basis Help develop platforms and tools to automate and improve securityposture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Southern Communications Ltd
Security Engineer Location: Dummer, Basingstoke Salary: £35,000 - £55,000 (Based on Experience) Hybrid (3 days in the office and 2 days from home) Key Tasks: Security assessments:?Create and perform security assessments and threat models Security standards:?Develop,implement&maintainsecurity standards and plans VulnerabilityManagement:?Research weaknesses and find ways to counter them Security incident … response:?Respond to attack vectors and security incidents, and coordinate incident response across teams Security software testing:?Test company software, firmware, and firewalls Security software design:?Design software security systems like intrusion detection systems and firewalls Security system maintenance:?Maintainand proof network security systems Security system analysis:?Analyse security systems and seek … improvements on a continuous basis? Help develop platforms and tools to automate and improve securityposture across the group Skills and Competencies Required: Knowledge and hands-on experience in management of IDS/IPS, Firewall, VPN, EDR/XDR, mail filtering and other security products Experience in Security Information Event Management (SIEM) tools, creation of basic More ❯
Information Security Lead - create the security strategy for a SaaS startup - £60,000 - £75,000 + 10% Bonus A dynamic and rapidly expanding technology company focused on revolutionizing learning and upskilling is seeking its first dedicated Information Security Lead. This is a crucial role for a fast-growing SaaS platform that empowers individuals to learn what they … need, when they need it, and is already trusted by major organizations. This is an exciting opportunity for an experienced Information Security professional to be the subject matter expert and build the security function from the ground up. You will take ownership of identifying, assessing, and mitigating information security risks across the business, as well as establishing … and maintaining robust security processes and controls to support commercial, engineering, and product teams. The ideal Information Security Lead will be responsible for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
Cyber Security Manager Sheffield + Hybrid working (3-4 days on site) Up to £75,00 0 Our Manufacturing client is seeking a highly skilled and proactive Cyber Security Manager to lead their cybersecurity efforts within a fast-paced manufacturing and engineering environment. You will be responsible for protecting critical assets, networks, and data against cyber threats while … managing a small team of security professionals and the relationship of our outsourced service providers. This role demands a strategic thinker with hands-on expertise in cybersecurity, compliance, and risk management. What you will be doing Team Leadership: Manage, mentor, and develop a small team of cybersecurity specialists, fostering collaboration and enhancing team performance. Strategy: Support the development, implementation … and maintenance of the IT strategy by offering security advice and creation of security policy to enable business objectives. Incident Management: Lead the response to security incidents, ensuring effective investigation, containment, and resolution to a successful outcome. Threat Analysis: Using a combination of in-house tooling and external resources, conduct vulnerability analysis, and penetration tests to identify More ❯
Pentest People is a UK-based security consultancy specialising in providing Penetration Testing as a Service to all its clients. Our innovative approach to security testing merges the benefits of consultant-led penetration testing with ongoing vulnerability assurance through our advanced SecurePortal. We are expanding our Incident Response team and are looking for a DFIR Analyst to join … and the ability to perform in a fast-paced environment. As part of our dynamic team, you’ll play a critical role in mitigating cyberattacks and enhancing our clients’ securityposture to prevent future incidents. Key Responsibilities: Conduct initial incident assessments and support ongoing Incident Response (IR) management. Participate in live IR operations, including digital forensics and data … acquisition. Perform security assessments, threat intelligence gathering, and OSINT analysis. Collaborate with internal teams to deliver a holistic cybersecurity service. Engage with clients regularly to collect relevant logs and gain infrastructure access for investigations. Thoroughly document incidents — including timelines, impacted systems, actions taken, and improvement recommendations. Prepare clear, well-structured reports for both technical and non-technical stakeholders. Technical More ❯
M5, Salford, Greater Manchester, United Kingdom Hybrid / WFH Options
AJ Bell Business Solutions Limited
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing and … implementing security controls and processes. Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bell’s systems and data. Design and implementation of enterprise … security technology controls and platforms, following industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our securityposture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
To support the Chief Information Security Officer in managing and reporting the Information Security Risks faced by Technology Services (TS) in delivering AJ Bell’s systems and services. This role is responsible for facilitating the secure delivery of AJ Bell’s technology and business change. The Information Security Architect will play a lead role in designing and … implementing security controls and processes. Key to this is assisting and supporting our colleagues in achieving their goals, but in a secure manner. The key responsibilities of the role are: Subject matter expertise for security best practice, ensuring the maintenance of the confidentiality, integrity and availability of AJ Bell’s systems and data. Design and implementation of enterprise … security technology controls and platforms, following industry best practices. Supporting and advising on projects and change initiatives to ensure that there is no negative impact on our securityposture Carrying out internal security reviews both on solutions we develop in house and third-party solutions. Supporting audit and due diligence activities within Technology Services Working with More ❯
Job Title: Information Security Manager Basis: Full-time, permanent Location: Canary Wharf, London - WeWork Reporting to: Co-founder About Onetrace Great products start with great people. Our relentless focus on user experience has been the cornerstone of our growth, helping us become the market leading software for fire protection subcontractors across the UK. We've grown by staying obsessed … matter, and your work shapes what comes next. Want to learn more about our journey? Check out our LinkedIn page. About the Role We're looking for an Information Security Manager to lead the systems, practices, and frameworks that protect Onetrace's data, people and infrastructure as we grow. This is a cross-functional, hands-on role with a … strong strategic lens -you'll own our information securityposture end-to-end, ensuring we maintain our ISO 27001 accreditation, while preparing for other relevant accreditations (such as SOC2 and Cyber Essentials). You'll proactively manage risks and help create a secure environment where teams can move fast without compromising on trust or safety. You'll also More ❯
Cyber SOC Analyst – Corsham Location: On-site, 5 days per week (Corsham) Security Clearance: Must currently hold SC clearance and be eligible for DV Citizenship Requirement: Sole British only About the Role Embedded within an established customer Security Operations Centre (SOC), this role involves participating in core SOC functions, identifying opportunities for improvement, and driving best practices in … cyber defence operations. You will play a key role in monitoring and responding to cyber threats, supporting threat detection and mitigation, and contributing to continuous improvement in security posture. Key Responsibilities Conduct reactive monitoring across client networks to deliver agile cyber defence across all domains Triage and manage alerts, perform impact assessments, and recommend mitigation strategies Improve and enforce … cyber security policies, procedures, and operational directives Maintain awareness of emerging cyber threats, vulnerabilities, and industry developments Share insights via reports, threat briefs, and team knowledge-sharing sessions Your Profile Experience working as a Security Analyst in a SOC or similar security monitoring environment Knowledge of data networks and SIEM tools Strong understanding of security operations More ❯
Lead Security Architect The Opportunity Albany Beck is partnering with a global Investment Bank to deliver a critical Protocol Analysis & Remediation programme. We’re looking for a Lead Security Architect with deep technical expertise and a strategic mindset to drive the design and implementation of security controls focused on reducing the risk of attackers moving undetected between … you'll lead discovery, design, and implementation efforts, playing a vital role in reducing risk and progressing toward a Zero Trust framework. Key Responsibilities Lead the development of robust security architectures to detect, prevent and contain lateral movement between endpoints and workloads. Drive the discovery phase by analysing logs (via Azure Log Analytics) and auditing configurations to identify vulnerabilities … and insecure protocols. Define and present security architecture designs and risk reduction recommendations to Cyber Security Architecture and Engineering teams for sign-off. Collaborate with Linux and Windows SMEs to implement secure configurations and protocol controls. Architect and enforce network segmentation and access control models. Conduct security assessments, provide remediation strategies, and guide stakeholders in secure design More ❯
Lead Security Architect The Opportunity Albany Beck is partnering with a global Investment Bank to deliver a critical Protocol Analysis & Remediation programme. We’re looking for a Lead Security Architect with deep technical expertise and a strategic mindset to drive the design and implementation of security controls focused on reducing the risk of attackers moving undetected between … you'll lead discovery, design, and implementation efforts, playing a vital role in reducing risk and progressing toward a Zero Trust framework. Key Responsibilities Lead the development of robust security architectures to detect, prevent and contain lateral movement between endpoints and workloads. Drive the discovery phase by analysing logs (via Azure Log Analytics) and auditing configurations to identify vulnerabilities … and insecure protocols. Define and present security architecture designs and risk reduction recommendations to Cyber Security Architecture and Engineering teams for sign-off. Collaborate with Linux and Windows SMEs to implement secure configurations and protocol controls. Architect and enforce network segmentation and access control models. Conduct security assessments, provide remediation strategies, and guide stakeholders in secure design More ❯
As part of a large Cloud Migration programme my client is looking to hire and experienced Google Cloud Security Architect on a 1 year rolling remote working contract Role: Design and implement secure cloud architectures and strategies on GCP. Evaluate and recommend security tools, services and configurations to strengthen cloud security posture. Ensure compliance with security standards and frameworks such as ISO 27001, NIST, CIS, GDPR and others. Lead threat modelling, risk assessments, and security reviews for GCP infrastructure and applications. Define and enforce Identity and Access Management (IAM) policies, including roles, permissions and service accounts. Implement and maintain security monitoring, logging, and alerting tools (e.g., Cloud Logging, Cloud Monitoring, SCC). Skills … Extensive experience in cloud security architecture, with at least 3 years on Google Cloud Platform. Deep understanding of GCP services such as VPC, IAM, Cloud Armor, KMS, SCC, GKE and others. Strong knowledge of security protocols, authentication, authorisation, encryption and network security. Experience implementing Infrastructure as Code (IaC) with tools like Terraform or Deployment Manager. Familiarity with DevSecOps More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
Cyber Security Analyst Eden Brown Synergy are working with a leading local authority based in London who are seeking an experienced Cyber Security Analyst to play a key role in strengthening their cyber security capabilities and ensuring the effective use of Microsoft's Sentinel security information and event management system. This opportunity offers a chance to … contribute to a progressive, security-focused team committed to protecting critical infrastructure and information assets. The role is offered on a hybrid working basis, with a requirement to attend the London office 2 days per week. Key Responsibilities: * Monitor and analyse various security systems to identify, mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and … related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetration testing to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security incidents. * Maintain accurate incident logs and reports to support post-incident analysis and More ❯