col-wide Job Description: I am recruiting on behalf of a very prestigious hedge fund in London, looking to hire a Security Engineer with experience across IAM, device security, vulnerabilitymanagement and cloud platforms (Azure/AWS). Although IAM plays a big of the role, wider experience across the above security areas is required. The makeup of … history of academic excellence, typically from a leading university or institution known for rigorous standards. Responsibilities will include: Architect and deploy IAM solutions (Entra ID, Conditional Access, PAM) Drive vulnerabilitymanagement strategy and tooling Apply Zero Trust and Secure by Default principles Monitor systems, respond to threats, and support incident response Communicate findings to both technical and non More ❯
Job overview: This is an opportunity to lead global Security Operations focused on safeguarding Arm's digital environment through exemplary threat detection, incident response, and vulnerabilitymanagement capabilities. This senior role, reporting directly into the CISO, is accountable for driving the strategic direction of Arm's Detect & Response function, delivering outstanding performance and ensuring we are resilient against … an evolving threat landscape! In addition to operations, you will lead cyber crisis management, C-Suite level stress testing, team development, and top-level cybersecurity thought leadership. Responsibilities: Own and deliver the strategic roadmap for cyber incident and vulnerability detection & response in line with Arm's threat profile and business objectives. You will guide and develop a high … of enterprise security domains and how they can be used as a force multiplier for a technology business strategy, with the ability to influence at all levels. Extensive people management experience, fostering a culture focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such More ❯
on our journey! As a Security Engineer , you'll drive high-quality security baselines, ensure robust data for detection engineering, and enhance incident response. You'll manage logging, monitoring, vulnerability tools, and forensic analysis while strengthening Yolo Group's security posture. Your day-to-day Implement and maintain security logging and monitoring controls to ensure continuous threat detection; Develop … Enhance and improve incident detection and response capabilities to strengthen security resilience; Act as a 2nd line incident responder, assisting with forensic collection and analysis; Set up and manage vulnerabilitymanagement tools to identify and mitigate security risks; Create templated security solutions to support teams across Yolo Group in improving their security posture; Engage in incident response actions … to set priorities, manage tasks independently, and deliver on commitments; Proficient in coding with Python and Go, with the ability to write patches in other languages; Experienced in infrastructure management using Git in AWS/Azure, leveraging Terraform and Ansible; Skilled in containerization and cloud environments, including Kubernetes (K8s), ECS, and EC2, with expertise in baking images and templating More ❯
business, this position offers the opportunity to engage in various projects across a large and complex organisation. The ideal candidate will have a strong background in IT security, risk management, and regulatory compliance, with the ability to develop and implement effective strategies aligned with Global Policies and Standards. This role is crucial in protecting digital assets, maintaining the integrity … maintain IT process documentation. Conduct regular assessments and audits to ensure compliance. Support IT demand processes for new solutions, assurance evidence, and documentation. Manage and improve the IT risk management framework for the UK & Ireland. Oversee the Information Security Management System and support security policies, vulnerabilitymanagement, and incident responses. Manage customer assurance requests, review contractual … security schedules, and support the commercial team during the bid process. Professional and Personal Competencies/Qualifications: Extensive experience leading IT risk management and compliance within a complex global organisation. Strong knowledge of IT regulations, standards, and best practices. Strong knowledge of IT General Controls and Information Security Management Systems. Experience with regulatory requirements and standards, including ITIL More ❯
proactive IT, Security & Compliance Manager to join their team as the first in-house IT hire. In this pivotal role, you will take ownership of the day-to-day management of IT services, systems security, and incident response. You will ensure the security, integrity, and availability of the company’s systems and infrastructure, and play a key part in … Oversee user accounts, device security, and application access control Provide first and second-line Helpdesk support to internal users Maintain and test business continuity and disaster recovery plans Cybersecurity Management Implement and maintain security policies (access control, password management, vulnerabilitymanagement) Monitor threats and respond to security incidents Ensure effective implementation of technical controls Compliance Support … such as Commercial, Finance, and Engineering to support compliance initiatives You be a good fit if you align to the following: Proven experience in IT operations, cybersecurity, and compliance management Strong technical knowledge of relevant systems and security frameworks Excellent communication and stakeholder management skills Ability to work proactively and collaboratively in a fast-paced environment #J More ❯
London, England, United Kingdom Hybrid / WFH Options
Sanderson Government & Defence
commercial sectors collaborating with stakeholders and engineers across the business. The organisation is seeking an experienced Cyber Security Engineer with security clearance to support critical national security functions, including vulnerabilitymanagement, endpoint protection, and incident response, within a highly secure environment. Role Overview: This is a hands-on engineering role requiring the delivery of endpoint security engineering activities … of the initial project, cannot be dual national . What we're looking for: Strong understanding of modern endpoint security and hardening practices Familiarity with NIST security controls and vulnerabilitymanagement processes Practical experience with tools such as Ivanti, Trellix, SonarQube, Nessus, or Trivvy Comfortable working within Agile or Scrum environments Excellent written and verbal communication skills, with … Professionals who value collaboration and are comfortable working closely with a range of stakeholders. Those with a growth mindset, intellectual curiosity, and a personable, team-oriented approach. Key Responsibilities: Vulnerability Scanning & Reporting Conduct regular scans using tools such as SonarQube, Trivvy, and Nessus Generate and analyse vulnerability reports; support the Vulnerability & Patch Manager Maintain and manage endpoint More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
will be responsible for technically leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive … for 2024 and the whole business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution … Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, and NIST More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
will be responsible for technically leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well as someone who can drive … for 2024 and the whole business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and Reporting. Responsibilities Own the evolution … Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, and NIST More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Dunfermline, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Livingston, Scotland, United Kingdom Hybrid / WFH Options
JR United Kingdom
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
Broughton Astley, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
role, you will gather, analyze, and enrich data to produce governance scorecards and reports spanning key cybersecurity areas such as Data Loss Prevention (DLP), Key/Cert/Encryption Management (KCEM), Software Development Lifecycle (SDLC), Cloud Security (CS), Cyber Incident Management (CIM), and Threat and VulnerabilityManagement (TVM). Your insights will inform senior leadership, regulatory More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
Job Description Role Overview We're looking for a pragmatic, risk-focused Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information Security Management System (ISMS). We sit in the second line of defence and advise the business on security risks, incidents, audits, assurance, and the implementation and monitoring of security controls that … protect Nest. You'll have a solid background in information security management systems, technology, and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating certified ISMS using ISO 27001/2, NIST CSF, and other security standards in the design and management of information security controls. … to audit and evidence compliance with security policies, standards, etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance, Network Security, Data Protection, Risk Management, Access Management, VulnerabilityManagement, Anti-Malware, Mobile Device Management, and Cloud Security. We are open to discussing working patterns. We welcome all internal applicants to More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
maintenance of the organisation's technology infrastructure, interfacing closely with the business to understand and support their needs, you'll drive efficiencies and assist in the design and lifecycle management of the infrastructure across the organisation encompassing physical, virtual and with a continued focus on cloud platforms and associated stack technologies. About you You'll have strong technical knowledge … Exchange Hybrid, M365, Intune) o Microsoft Security stack tools(Defender, Security and Compliance, Purview) o Virtualisation Technologies (VMWare) o Networking Technologies (LAN/WLAN, WAN/MPLS) o Storage Management (physical SAN and software-defined) o Monitoring and management tools (PRTG, SCCM, intune) o Backup, restore and business recovery processes o Security Technologies (Firewalls/VPN/Malware … Protection/Email & Web Filtering) With practical experience of securing and hardening above platforms and use of vulnerabilitymanagement systems, you'll also have exposure to SIEM/XDR/MDR systems and knowledge and practical experience of Service Management tools. You'll have significant experience of implementing and supporting Infrastructure technology solutions, as well as practical More ❯
GCS) controls. The role acts as a primary contact for all Cybersecurity matters, requiring a broad understanding of security controls and their effective implementation in corporate environments. Strong relationship management skills across the region/sub-region are essential to facilitate business adoption. As a Director within the Regional Security Office (RSO) service, you will be accountable for service … delivery to the assigned region/sub-region and solution lines. Effective relationships with senior leadership are crucial to support regional business goals and maintain an effective security risk management regime aligned with a security risk mitigation strategy. The role involves presenting to local leaders, regulators, and clients as needed, with prior regulatory management experience required. This highly … colleague security culture programs. Represent the region/sub-region in security incident management. Manage remediation efforts, e.g., internal audit findings. Oversee cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee to support cyber risk management. Track remediation of audit and compliance findings. Review cybersecurity metrics and lead remediation programs. Lead or sponsor cybersecurity initiatives. More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
training offered. This is an all-rounder role, which whilst it will have a technical focus, will also encompass GRC and compliance Key day to day responsibilities will include: Management of cyber incidents and liaison with the SOC provider Threat hunting using proactive methods Vulnerabilitymanagement (tenable is tool used) and patching Security policy, compliance, and user More ❯
Risk and Compliance in London, United Kingdom Minimum Qualifications: Bachelor's degree or equivalent practical experience. 5 years of experience in program management. 5 years of experience with risk management or compliance in regulated industries (i.e., financial services, public sector, healthcare). 5 years of experience in program definition and management with a focus on audit compliance or … cross-functional or cross-team projects. Experience in one or more of the following: data protection, threat modeling, incident/emergency response, security risk mitigation or evaluation, OS hardening, vulnerabilitymanagement, pen testing, access management, or cryptographic concepts. Experience with ISO 27k family, SOC reports, PCI DSS, FedRAMP, or equivalent information security and privacy compliance certifications. Experience More ❯
Maidstone, England, United Kingdom Hybrid / WFH Options
Payter B.V
security requirements and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerabilitymanagement, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy … international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools ● Experience with SIEM solutions ● Proficiency with vulnerabilitymanagement platforms ● Knowledge of container security solutions ● Experience with secret management solutions Cloud & Infrastructure Security ● Expertise in GCP IAM, security controls, and compliance frameworks ● Experience with infrastructure … services ● Understanding of zero trust network architecture principles Application Security ● Understanding of secure coding practices and code review techniques ● Knowledge of secure CI/CD pipeline implementation Compliance & Risk Management ● Experience implementing security controls for multiple compliance frameworks simultaneously ● Knowledge of payment technologies and standards ● Experience with security risk quantification methodologies ● Understanding of data privacy regulations beyond PCI (e.g. More ❯
London, England, United Kingdom Hybrid / WFH Options
PAYTER
security requirements and oversight for software, cloud infrastructure, and internal IT projects Harden cloud environments and internal IT systems against attacks and vulnerabilities Implement and manage security assessment tools (vulnerabilitymanagement, SIEM) across all environments Lead comprehensive penetration testing program for payment applications, infrastructure, and internal systems Risk Management & Compliance Perform regular internal security audits and policy … international scale-up, shaping the future in a booming market where you can have impact and growth opportunities. Technical skills: Security Technologies & Tools • Experience with SIEM solutions • Proficiency with vulnerabilitymanagement platforms • Knowledge of container security solutions • Experience with secret management solutions Cloud & Infrastructure Security • Expertise in GCP IAM, security controls, and compliance frameworks • Experience with infrastructure … services • Understanding of zero trust network architecture principles Application Security • Understanding of secure coding practices and code review techniques • Knowledge of secure CI/CD pipeline implementation Compliance & Risk Management • Experience implementing security controls for multiple compliance frameworks simultaneously • Knowledge of payment technologies and standards • Experience with security risk quantification methodologies • Understanding of data privacy regulations beyond PCI (e.g. More ❯
including security monitoring, incident detection, analysis, and response establishing and documenting robust processes and workflows oversee the continuous improvement and development of security tools and technologies e.g. NDR, EDR,Vulnerability and Exposure Management, SIEM and SOAR work closely with business owners, to proactively identify and reduce cyber security threats and vulnerabilities We’re looking for someone who is … a security operations environment able to showcase a strong understanding of cyber security concepts, technologies, and best practices proven to manage and communicate effectively with diverse stakeholders, including executive management experienced overseeing security tools and technologies (SIEM, IDS/IPS, EDR, vulnerabilitymanagement) able to work with cloud environments exposure to threat modelling (We know it’s More ❯