IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service … manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat … principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical More ❯
IT Security Engineer to be based in our London office. Main responsibilities within the Senior IT Security Engineer position include: Support Information Security risk management, compliance activities, and governance initiatives. Collaborate with stakeholders to identify, document, and mitigate security risks through effective controls. Work with key software and service … manage security products and solutions. Lead and support security incident response, including investigation, containment, and remediation. Deploy, manage, and continuously improve security tools, including vulnerabilitymanagement, identity management, and attack surface monitoring. Analyse emerging threats and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat … principles, practices and standards and how they translate into real world technical solutions. Significant experience in the field of Information Security including Governance, Risk management and Compliance frameworks, Security Awareness and Threat Intelligence. Ability to effectively communicate complex security or intelligence related information to both technical and non-technical More ❯
Senior Project Manager – Security & Asset Management We are looking for a dynamic and experienced Senior Project Manager to lead projects in asset management, vulnerabilitymanagement, and risk management . The ideal candidate will have a strong background in IT and OT environments , with a preference … for those with utilities sector experience . Key Responsibilities: Oversee asset management , ensuring efficient tracking and security of IT and OT assets. Lead vulnerability and risk management initiatives, mitigating security threats. Manage end-to-end software and security projects, ensuring timely delivery. Collaborate with cross-functional teams … to enhance security and compliance. Drive innovation and best practices in project execution. Requirements: Proven experience in asset and risk management within IT/OT environments. Utilities sector experience is highly desirable. Strong background in software project management and security best practices. Ability to lead complex projects and More ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
to safeguard critical business operations by design and default. You will be responsible for security automation, CI/CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI/CD pipeline to enhance development security. Work … secure AWS cloud infrastructure for clients and internal operations. Automate AWS infrastructure builds following CIS hardening standards . Ensure top-tier security configuration, access management, and incident response on cloud platforms. Operational Support & Incident Response: Support business-critical Windows and Linux-based environments. Monitor and respond to security alerts … across Infosec, servers, firewalls, and applications. Conduct continuous monitoring of internal and third-party information security controls. Threat & VulnerabilityManagement: Assess SAST (Static Application Security Testing) and DAST (Dynamic Application Security Testing) scans. Implement remediation and mitigation strategies in collaboration with development teams. Maintain network security protocols, firewalls More ❯
teams to establish and enforce network access policies, ensuring that only authorized individuals and devices have the correct access privileges. Proactive Security Testing and VulnerabilityManagement Conduct vulnerability assessments and penetration testing to identify and address security weaknesses in mobile network architectures. Develop and enforce security policies … together with system administrators and application owners to resolve discovered vulnerabilities by applying necessary patches or making configuration adjustments. Create and sustain a thorough vulnerabilitymanagement program that includes tracking vulnerabilities, assessing risks, and planning remediation strategies. Engage in network security incident response efforts by providing technical expertise … and mobile network security. Understanding of 3GPP mobile network CORE and RAN architectures and security requirements. Strong knowledge of network security protocols, VPN, firewall management, and intrusion detection systems. Experience with security tools such as SIEM, IDS/IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks More ❯
be responsible for safeguarding our critical scientific and technological assets. This role demands a proactive leader with deep expertise in Security Operations, Risk & Compliance Management, Identity & Access Management and the ability to work cross-functionally with IT, research teams and executive leadership. The successful candidate will be instrumental … Engineering Develop, implement, and oversee enterprise-wide security operations to detect, prevent, and respond to cyber threats. Lead and enhance Security Information and Event Management (SIEM) and Threat Intelligence capabilities. Lead security incident response and forensic investigations, ensuring robust incident handling and mitigation. Report on cybersecurity KPIs and manage … significant IS risks and their appropriate Risk Treatment Plans. Risk & Compliance Management Define and enforce IT security policies, standards, and procedures. Ensure compliance with industry accreditations (e.g., ISO 27001, NIST, GDPR), working closely with external auditors and regulatory bodies. Conduct regular risk assessments and vulnerabilitymanagement, and More ❯
methodologies to adapt to new regulations, compliance requirements and business change Advise on and foster continuous improvement and effectiveness of GRC processes, driving improved management information to better allow appropriate prioritisation and risk based decisions Lead initiatives that build a culture of accountability and responsibility across engagements Enhance governance … Design) Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies, standards and … identification of identified risks and emerging cyber security vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and verify/evidence appropriate compliance and security KPIs Work closely with 1st More ❯
role offers excellent opportunities for growth and career development in the ever-evolving field of cybersecurity. Your primary areas of focus will include: Event Management Incident Response and Management Endpoint Security Network Security VulnerabilityManagement Responsibilities As an Operational Security Analyst, you will: Investigate security events … Security (Azure/AWS) Windows Security Linux Security Active Directory/LDAP Authentication Mechanisms (Kerberos, NTLM, etc.) Basic programming/scripting (e.g., PowerShell, Bash) VulnerabilityManagement and associated tools (e.g., Rapid7) SIEM and associated tools (e.g., Splunk) Endpoint Security Controls (e.g., EDR/Anti-virus) Networking Fundamentals (OSI … Computer Science, Computer Security) Knowledge of ISO/IEC 27000 Information Security standards and experience working with a compliant ISMS Experience in IT problem management and root cause analysis At Trayport, we encourage applications from all backgrounds and walks of life, and we are committed to building a team More ❯
role offers excellent opportunities for growth and career development in the ever-evolving field of cybersecurity. Your primary areas of focus will include: Event Management Incident Response and Management Endpoint Security Network Security VulnerabilityManagement Responsibilities As an Operational Security Analyst, you will: Investigate security events … Security (Azure/AWS) Windows Security Linux Security Active Directory/LDAP Authentication Mechanisms (Kerberos, NTLM, etc.) Basic programming/scripting (e.g., PowerShell, Bash) VulnerabilityManagement and associated tools (e.g., Rapid7) SIEM and associated tools (e.g., Splunk) Endpoint Security Controls (e.g., EDR/Anti-virus) Networking Fundamentals (OSI … Computer Science, Computer Security) Knowledge of ISO/IEC 27000 Information Security standards and experience working with a compliant ISMS Experience in IT problem management and root cause analysis At Trayport, we encourage applications from all backgrounds and walks of life, and we are committed to building a team More ❯
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerabilitymanagement, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
Albany Beck is looking for an experienced Security Consultant with a strong background in Security Risk Management, GRC, Vulnerability Analysis, and Compliance to join a high-impact programme within a leading global investment bank. This is an exciting opportunity to play a key role in the design and … a Security Consultant, you’ll be working in the client’s security team, contributing to critical workstreams that span governance, risk and compliance (GRC), vulnerabilitymanagement, and security control design. You'll work closely with cross-functional stakeholders including technology, audit, and operations teams to ensure the organisation … and continuous improvement of security governance frameworks and GRC processes. Design and enhance security controls across infrastructure, applications, and cloud environments. Lead or support vulnerability analysis activities, including risk-based prioritisation and remediation tracking. Ensure alignment with global security standards and frameworks (e.g. NIST, ISO 27001, CIS). Partner More ❯
and forums, as well as representing the team where required. Critical Work Support the ongoing and periodic regulatory and compliance responses and engagements. Audit management and coordination. Issue remediation oversight and closure validation. Responding to customer RFIs using standardised formats and frameworks. Quality assurance on library of responses required … Cyber security qualification e.g. CISMP/Apprenticeship (desirable). Demonstrable working knowledge and understanding of key technology and cyber security controls such as Incident Management, Backup & Recovery, Capacity Management, VulnerabilityManagement, Identity & Access Management, Authentication and Authorisation systems, Data Protection, Application Security, Secure Application Development … and standards. Operational risk frameworks. Regulatory compliance. Operational Resilience. Good understanding of data protection controls. Financial Services sector experience. Technology & Cyber Security. Leadership and management experience Not essential but experience will be recognised, greater focus on work experiences and ability to engage and drive initiatives. Personal skills and capabilities More ❯
Overview Expleo is a trusted partner for end-to-end, integrated engineering, quality services, and management consulting for digital transformation. We help businesses harness unrelenting technological change to deliver innovations that provide a competitive advantage and improve everyday life worldwide. As part of the Expleo Digital and Emerging Technology … GRID/GRID+ (SANS/GIAC), GICSP, or equivalent industrial cybersecurity training are desirable. Essential skills Strong understanding of core cybersecurity principles, risk management, and control implementation in critical infrastructure environments. Hands-on experience with infrastructure security across cloud, on-premises, and hybrid environments. Proven ability to implement and … assess security controls at the OT/IT boundary, including segmentation, firewalls, monitoring, and remote access safeguards. Familiarity with enterprise security tooling, including vulnerabilitymanagement platforms, endpoint protection, SIEM, identity and access management, and logging solutions. Knowledge of regulatory frameworks and industry standards relevant to the E More ❯
of today and tomorrow. Essential Duties and Responsibilities: As a Lead InfoSec Consultant, you'll take the lead in executing advanced penetration tests and vulnerability assessments across a diverse portfolio of applications. This is a hands-on, technical role where you'll actively identify, exploit, and help remediate security … in testing the security of applications, networks, and systems, while ensuring that security standards are integrated into the development process. Key Responsibilities: Penetration Testing & Vulnerability Assessment: Conduct and oversee regular penetration tests and vulnerability assessments on applications, networks, systems, and infrastructures. Identify, exploit, and document vulnerabilities, including demonstrating … developers and system administrators. Keep up to date with the latest security vulnerabilities, exploits, and attack methodologies to ensure effective penetration testing. Security Risk Management: Develop and manage the organisation's vulnerabilitymanagement program, ensuring compliance with internal policies and industry regulations. Identify security weaknesses and work More ❯
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
Head of Vulnerability and Threat Intelligence Location: Hybrid - London, Blackfriars Join us at Merlin Entertainments as we transform the future of digital guest experiences across our iconic global attractions. Merlin is embarking on an exciting Digital and Data Transformation focused on enhancing the end-to-end guest journey in … our attractions. The Head of Vulnerability and Threat Intelligence is responsible for identifying, assessing, and mitigating security vulnerabilities and threats across the organisation’s digital infrastructure. About the Role This role is critical in maintaining the organisation’s security posture by leading the vulnerabilitymanagement programme, conducting … IT, security operations, and business units to ensure proactive defence measures are in place to protect critical systems and data. Responsibilities Develop and implement VulnerabilityManagement Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with More ❯
security measures. Incident Response - Proficiency in detecting, analysing, and responding to security incidents. Threat Analysis - Ability to identify and assess cyber threats and vulnerabilities. VulnerabilityManagement - Experience with vulnerabilitymanagement and reporting solutions, assessing customer vulnerabilities, creating regular reporting packs, devising mitigation strategies and working with … customers to support their implementation of these plans. Security Information and Event Management (SIEM) - In-depth experience with SIEM tools for monitoring and analysing security events. Malware Analysis - Skills in identifying, dissecting and mitigating malware threats. Forensic Analysis - Knowledge of digital forensics to investigate and remediate security breaches. The More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
project to ensure the efficient operation of end user devices, including Laptops, phones, handheld devices etc. The primary responsibility with the role will be vulnerabilityManagement, including conducting regular assessments, implementing security measures and liaising with various depts. The successful candidate will implement and manage software patches promptly … and configure MS Teams, Intune and Endpoint Config Manager accordingly. Skills required: - Relevant experience in vulnerabilitymanagement and endpoint security Strong knowledge of MS Teams, Intune and Endpoint Configuration manager Familiar with identity and access management principles Responsibilities: Respond to incidents related to EUC reported through the … Implement and manage software patches for end user computing devices, ensuring security updates are applied promptly to mitigate vulnerabilities. Conduct regular reviews of outstanding vulnerability and patch management activities using tools such as Qualys and Microsoft InTune. Maintain configuration baselines for end user devices and ensuring compliance with More ❯
logging is being collected and analyzed and relevant security alerts are being generated. Automate processes to reduce manual task delivery and enhance process delivery. VulnerabilityManagement Collaborate with IT and development teams to detect and remediate vulnerabilities across the enterprise in alignment with defined SLAs. Understand current and … . Knowledge of security frameworks and regulatory compliance standards (NIST CSF, SOX ITGC, GDPR, MITRE ATT&CK, etc.) Experience with common industry SIEM and vulnerabilitymanagement platforms. Experience maintaining the Microsoft Defender platform and other Microsoft security products. Ability to rank and prioritize vulnerabilities and security recommendations appropriately … within the context of the infrastructure and business processes. Experience maintaining identity and access management systems including PAM technology and other authentication and authorization control platforms. Experience with Incident Response best practices. Knowledge of cloud security best practices related to AWS and Azure cloud services. Knowledge of DevOps practices More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
IDS/IPS, SIEM, and DLP tools. Compliance : Ensure solutions adhere to security standards and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). VulnerabilityManagement : Collaborate with SecOps to develop and implement vulnerabilitymanagement programs, including assessments, penetration testing, and remediation. Cloud Security : Maintain expertise … in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely with product leads, solution architects, and engineering teams to integrate security into solution design and implementation. Investment Guidance : Advise customers on security controls aligned with business objectives, prioritising based on threat likelihood and … Strong understanding of security principles, methodologies, and best practices. Technical Skills : Hands-on experience with security technologies like firewalls, IDS/IPS, SIEM, and vulnerability scanners. Cloud Security : Experience with AWS and Azure security. Compliance : Knowledge of security standards and frameworks (e.g., ISO 27001, NIST). Communication : Excellent skills More ❯
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerabilitymanagement support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & VulnerabilityManagement Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯
years' experience working in a corporate, structured environment in a security analyst or security operations role. You'll focus on daily log analysis, vulnerabilitymanagement support, antivirus monitoring, and helping to close security-related incidents. Key Responsibilities: 🔍 Security Monitoring & Analysis Review, monitor, and analyze daily security logs using … positives, escalate true positives, and assist in incident investigations. Support service desk and IT teams with closing out security-related calls and incidents. 🛠️ Threat & VulnerabilityManagement Assist with running and analyzing vulnerability scans; help track remediation. Monitor and manage endpoint protection and antivirus alerts. Collaborate with infrastructure … Support Maintain security incident logs, reports, and operational documentation. Support periodic health checks of security tools and systems. Work closely with firewall and access management processes (basic reviews and requests). Who This Role Would Suit: A candidate with 2–3 years of security analyst experience in a structured More ❯