Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … closely with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerabilitymanagement and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity … principles including network security, identity management, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence More ❯
london (city of london), south east england, united kingdom
Selby Jennings
Cyber Security Analyst (VP) - Investment Management - London Our client, a leading investment management firm, is seeking a Cyber Security Analyst (VP level) to join their London office. This role sits within the compliance function and plays a critical part in supporting external audits, particularly SOC 1 Type II and SOC 2. It combines hands-on security monitoring and … closely with IT, compliance, and external auditors to provide control evidence, enhance processes, and strengthen the firm's overall security posture. Responsibilities include monitoring and investigating security alerts, supporting vulnerabilitymanagement and patching, and maintaining a forward-looking 6-12 month roadmap to align emerging requirements with timely policy updates. Key Skills & Experience: Strong understanding of core cybersecurity … principles including network security, identity management, and threat detection Hands-on experience with security and IT monitoring tools such as SIEM, Network Configuration Manager, Zabbix, HALO, DarkTrace, and Fortinet firewalls Familiarity with IT access controls and their application in regulated environments Proven experience supporting or participating in SOC 1 Type II and SOC 2 audits Excellent documentation and evidence More ❯
Chesterfield, Derbyshire, East Midlands, United Kingdom Hybrid / WFH Options
Hays
in developing and implementing information security strategies, policies, and procedures to safeguard the organisation's digital assets and mitigating potential risks. You will oversee information security, compliance, and risk management practices based on industry-accepted information security and risk management frameworks, whilst establishing and maintaining an incident response plan, including incident detection, response, investigation, and resolution, to minimise … incidents. What you'll need to succeed Demonstrable experience of implementing and maintaining information security frameworks e.g. ISO27001 within a medium/large sized public sector organisation Solid stakeholder management and mentoring skills Information Security,Cyber Security, Assurance and vulnerabilitymanagement would be ideal Comprehensive knowledge of Information Security Management Systems with the ability to scope … design, and implement such systems Strong ICT infrastructure, application, and cloud technical skills would be advantageous Evidenced knowledge and understanding of ISO270001, ITIL, and Prince 2 management practices Ability to lead the workforce, increasing their skills and knowledge in relation to information security What you'll get in return This exciting position is paying between £50,000 and More ❯
procedures for use across multiple information systems or support compliance with them. Apply routine security procedures appropriate to the role, such as patching, managing access rights, malware protection, or vulnerability testing with autonomy. Develop and test rules for detecting violations of security operating procedures with autonomy. Lead small teams managing Cyber Security operations within an organisation. Champion secure design … build tooling to support pre-commit, Continuous Integration, Continuous Deployment through to production. They have experience of operating systems, Networking, PKI and Cloud Security tools. They build Secure Configuration Management using Infrastructure as Code Role Criteria Essential Criteria Demonstrable experience in design, delivery and operation of cloud native vulnerabilitymanagement, security monitoring and cyber incident managementMore ❯
Epsom, Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
Support, first line (some 2nd line) Ensure all incidents and service requests are successfully logged and accurately identified, categorised, prioritised, diagnosed and managed in the Service Desk IT service management tool Keep detailed, accurate and consistent records for the teams' calls to ensure they are updated regularly, and that the customer is kept informed. Work with third parties and … colleagues to investigate, accurately diagnose, analyse & resolve issues and service interruptions Customer Care/Collaboration/Communication Knowledge Management/Asset Management/Reporting & Regulatory Create and maintain all documentation (Customer facing and internal technical documentation) ensuring it is completed to a professional quality, checked for accuracy of grammar and spelling and reviewed prior to distribution. Ensure that … all IT equipment the Service Desk manage is asset tagged and maintained accurately and consistently. VulnerabilityManagement Complete daily reports (when assigned) to ensure all active attacks and vulnerabilities are resolved and removed from the vulnerability report. Liaise with 3rd level teams where appropriate. This applies to client and mobile devices. Microsoft Power Apps: Work with other More ❯
Load Balancers, VPN, WAF etc., align with the organization's strategies, policies, and standards. Design and manage firewall policies, network access controls, AAA mechanisms, MFA, IAM solutions, RBAC, Privilege Management etc., In-depth understanding of cloud network security, different network architectures (e.g., LAN, WAN, DMZ) and topologies, network protocols, routing, switching, and subnetting. Ensure network security measures are aligned … frameworks like NIST Cybersecurity Framework, ISO 27001, and CIS Critical Security Controls. Familiarity with the use of standard security technology solutions and processes such as user provisioning, directory, SIEM, vulnerabilitymanagement, Cloud Security (OCI/Azure/AWS), Web Security, Email Security, Logging and Monitoring, General PKI and Cryptography. Evaluate and recommend security technologies, tools, and methodologies to More ❯
security controls in lab-based environments used for R&D operations. Network Security - Implement and manage network segmentation, access controls (user/vendor), and secure wireless communication. Firewall Policy Management - Own and deliver Firewall policy; engage with Firewall change processes and tools (eg . Zscaler, Dynamic Edge Segmentation (DES). Incident Management - Serve as the lead contact for … OT-related incidents, ensuring rapid technical resolution. Device Management - Work closely with R&D and global teams to secure OT assets to internal standards. VulnerabilityManagement - Identify, assess, and prioritise vulnerabilities based on business risk. Patch Management - Coordinate with R&D lines and vendors to validate and deploy security updates for OT environments. Security Controls Deployment More ❯
technical risks into business impact. Part of this role, you will be required to obtain GCP certification. What You'll Do: Design and implement secure architectures, incorporating identity, access management, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO … . Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerabilitymanagement initiatives. Configure and manage security tools such as Google SecOps tooling, Security Command Center, Cloud Armour, and VPC Service Controls. Collaborate with engineering and DevOps teams to embed security into CI/CD pipelines. Support incident response planning and More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
ideally SOC or incident response Strong experience with Splunk and/or QRadar (other SIEMs considered) Good understanding of incident response, DFIR, malware analysis Knowledge of network traffic flows, vulnerabilitymanagement, penetration testing Familiarity with ITIL disciplines (incident, problem, change management) Able to work with minimal supervision and lead response activity SC clearance (or eligibility to obtain More ❯
and respond to security alerts and threats. Application Security Collaborate with the Application Security Engineer to ensure the security of software applications through secure coding practices, regular assessments, and vulnerability management. Conduct periodic security assessments of existing applications and systems. Security Awareness and Training Promote a culture of security awareness among all employees through training programs and communication initiatives. … or application security expertise is favoured. Experience designing, building and implementing security controls. Programming skills are required. Experience in application security-inclusive of secure coding practices-and threat and vulnerabilitymanagement are desirable. Strong communication and interpersonal skills. Ability to influence and drive security initiatives at both the tactical and strategic levels. Familiarity with relevant laws, regulations, and More ❯
be advantageous to your application, as would CISSP and/or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerabilitymanagement, network security, cloud security (AWS & Azure), firewalls and intrusion detection systems. You will monitor networks and systems for security breaches, enhance the performance of SecOps tools, perform More ❯
in securing cloud workloads and services, responsible for configuring, managing, and optimizing Microsoft Defender for Cloud across multi-cloud environments. This role will focus on threat protection, incident response, vulnerabilitymanagement, and ensuring compliance with industry standards, while supporting integration and automation of security operations. Key Responsibilities: Configure, manage, and monitor Microsoft Defender for Cloud across multi-cloud … environments (Azure, AWS, GCP). Investigate and respond to security alerts ; perform root cause analysis and coordinate remediation. Conduct vulnerability assessments and ensure timely patching or remediation. Review Secure Score and enforce policies to align with compliance frameworks (ISO, NIST, CIS). Integrate Defender for Cloud with SIEM/SOAR tools (e.g., Microsoft Sentinel) and automate responses. What You More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
in a SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerabilitymanagement, penetration testing, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation More ❯
milton, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
in a SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerabilitymanagement, penetration testing, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation More ❯
paisley, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
in a SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerabilitymanagement, penetration testing, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation More ❯
in a SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerabilitymanagement, penetration testing, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
positive difference to the lives of our clients, customers, colleagues, shareholders and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses, interactive investor (ii), Investments and Adviser … others. Proactive strategic leadership, demonstrable skills in the design, communication and delivery of end user technologies. Ability to engage and communicate at all levels from technical SMEs to Executive Management Experience working in partnership with a Tier 1 Systems Integrator, in a blended model. Ability to quickly learn, implement and utilize new technologies. Technical Skills The candidate is expected … Enterprise Applications Solid understanding of Identity Governance & Administration within the context of a highly regulated environment. Azure Virtual Desktop Administration (inc Azure Networking) Experiencing working with Endpoint Configuration/Management & Application Delivery technologies such as Intune & MEM. Experience implementing IaC/DSC via Terraform to manage M365 & EntraID. Azure Virtual Desktop (inc Networking) Defender for Endpoint experience with vulnerabilityMore ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
governance Collaborate with cybersecurity teams to ensure alignment with broader security strategy Facilitate post-test reviews and lessons learned sessions Required Skills & Experience Proven experience in a PMO, project management, or program coordination role Familiarity with cybersecurity principles, especially around PEN Testing and vulnerabilitymanagement Strong communication skills with the ability to translate technical content for non … technical audiences Excellent organisational and stakeholder management abilities Experience working in regulated environments or with compliance frameworks (e.g. ISO 27001, NIST, etc.) is a plus Proficiency in project management tools (e.g. Jira, Confluence, MS Project, or similar) Additional Skills - Certifications like PMP, Prince2, or CISM/CISSP - Experience working with external PEN Testing vendors or consultancies - Ability to More ❯
roadmap that you will shape. What you'll be doing Application Security (AppSec) : Driving secure development practices, code analysis, and threat modelling. Security Operations (SOC) : Overseeing monitoring, incident response, vulnerabilitymanagement, and operational resilience. Governance, Risk & Compliance (GRC) : Leading our efforts to achieve and maintain compliance with PCI, GDPR, SOC2, and ISO27001. Vendor Security : Spearheading due diligence and … our Vendor Governance Forum. Policies & Assurance : Defining and enforcing security standards, collaborating with IT Ops and Platform Engineering on execution, and providing assurance to stakeholders, customers, and regulators. Risk Management : Escalating material risks directly to the CTO and other risk functions. Culture & Training : Promoting a secure-by-design culture through training, awareness, and best practices across the company. What … we're looking for We're seeking an experienced security leader who is comfortable with: Building a team : You have prior management experience and a proven track record of growing a collaborative and cross-functional Security team. Scaling AppSec : You've owned and scaled a robust Application Security program, including secure development, code analysis, and threat modelling. Running Security More ❯
Security Officer , you will set the strategic vision for cybersecurity and ensure our infrastructure and products comply with industry-leading security standards. Your role includes developing security policies, incident management strategies, hardening and protecting existing architecture and operations and ensuring adherence to global regulatory frameworks, particularly those related to blockchain technologies and financial services. You will partner closely with … Responsibilities: Define and implement Wallet’s cybersecurity strategy, aligning with business objectives. Develop, manage and evolve robust security frameworks and policies. Oversee cybersecurity audits, penetration testing, risk assessments and vulnerability management. Lead the response to cybersecurity incidents, ensuring alignment with regulatory requirements. Manage and develop a strong security team, supporting professional growth and security awareness. Communicate regularly with executive … communities and stakeholders. Requirements: 5+ years of experience in cybersecurity leadership roles, preferably in fintech, blockchain, or high- growth tech environments. Expertise in cybersecurity frameworks, regulatory requirements and incident management practices. Proven leadership in incident response, vulnerabilitymanagement, and security architecture design. Strong technical understanding of blockchain technologies, cryptography, cloud environments and distributed systems. Excellent communication and More ❯
Security Officer , you will set the strategic vision for cybersecurity and ensure our infrastructure and products comply with industry-leading security standards. Your role includes developing security policies, incident management strategies, hardening and protecting existing architecture and operations and ensuring adherence to global regulatory frameworks, particularly those related to blockchain technologies and financial services. You will partner closely with … Responsibilities: Define and implement Wallet’s cybersecurity strategy, aligning with business objectives. Develop, manage and evolve robust security frameworks and policies. Oversee cybersecurity audits, penetration testing, risk assessments and vulnerability management. Lead the response to cybersecurity incidents, ensuring alignment with regulatory requirements. Manage and develop a strong security team, supporting professional growth and security awareness. Communicate regularly with executive … communities and stakeholders. Requirements: 5+ years of experience in cybersecurity leadership roles, preferably in fintech, blockchain, or high- growth tech environments. Expertise in cybersecurity frameworks, regulatory requirements and incident management practices. Proven leadership in incident response, vulnerabilitymanagement, and security architecture design. Strong technical understanding of blockchain technologies, cryptography, cloud environments and distributed systems. Excellent communication and More ❯
driving the success of our people and the organisation. Our managers give clear communication, lead by example and feed back to foster growth and development of their team members. Management excellence is essential to the company's success, and effective leadership requires a combination of interpersonal skills, strategic thinking, and a commitment to providing a positive and productive work … VMware, Hyper-V, and Azure-hosted environments. Own and enhance Active Directory, Entra ID (Azure AD), Group Policy, Conditional Access, and role-based access control (RBAC). Lead patching, vulnerabilitymanagement, and disaster recovery initiatives across global environments. Drive infrastructure automation with PowerShell, Intune, and Azure Automation. Administer and optimise Microsoft 365, including Exchange Online, SharePoint Online, Teams … OneDrive for Business, and Viva. Implement and manage Intune Autopilot for secure device provisioning, lifecycle management, and compliance enforcement across Windows and macOS endpoints. Enhance collaboration through Teams governance, voice integration, security policies, and adoption programmes. Act as the technical authority for SharePoint Online architecture, migration projects, site governance, and workflow automation (Power Platform). Ensure data loss prevention More ❯