The Cybersecurity team, within the IT department, is responsible for information and Cybersecurity. Responsibilities include information and cybersecurity risk management, and ensuring compliance to CAA, NIS and ISO27001 standards. The team also works closely with our majority shareholders, and partners … such as retailers, ground handlers, as well as suppliers, to ensure a joined-up approach to information and cyber security. We are seeking a highly skilled and motivated IT CyberSecurity Engineer, with a passion for protecting digital assets against cyber threats, to join our dynamic team. The successful candidate will have a strong technical background and a thorough understanding … security logs from various systems (including SIEM) and network devices to identify potential threats and vulnerabilities. Knowledge, skills & experience required: Essential * Bachelor's degree in computer science, Information Technology, CyberSecurity, or a related field. * 5+ years of experience in cybersecurity, with a strong understanding of network protocols and security tools. * A well-organised and structured approach to work planning More ❯
activity plans aligned to Zero Trust principles and common industry frameworks (NIST, PCI DSS etc) Assisting in the review and development of operational processes and procedures required to maintain cybersecurity for I T services, including managing endpoint compliance, system hardening, host firewall settings, endpoint applications, regulatory requirements, audit issues, endpoint security tools such as DLP, AV, EDR, patching etc. More ❯
to learn more. Base pay range Direct message the job poster from Burman Recruitment Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies, implementing security solutions, and managing risks while ensuring compliance with … Computer and Network Security, Higher Education, and IT System Operations and Maintenance Referrals increase your chances of interviewing at Burman Recruitment by 2x Get notified about new Head of CyberSecurity jobs in London Area, United Kingdom . London, England, United Kingdom 4 days ago London, England, United Kingdom 3 days ago London, England, United Kingdom 2 days ago Chief … England, United Kingdom 1 month ago London, England, United Kingdom 5 days ago London, England, United Kingdom 3 weeks ago London, England, United Kingdom 1 day ago Head of CyberSecurity, Professional Services, Part Remote London, England, United Kingdom 2 weeks ago London, England, United Kingdom 1 week ago Head of CyberSecurity & Infrastructure Head of Safety & Security – Autonomous and More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
Information Security Analyst - Audit, Compliance & Cybersecurity United Kingdom - Southampton At NICE, we don't limit our challenges. We challenge our limits. Always. We're ambitious. We're game changers. And we play to win. We set the highest standards and execute beyond them. And if you're like us, we can offer you the ultimate career opportunity that will light … Cyber Essentials Plus, ISO 27001, ISO 27701, ISO 42001, GDPR, and DORA. This role focuses on internal audits, regulatory compliance, and readiness for external audits while also contributing to Cybersecurity Operations Center (CSOC) activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards … with security monitoring and incident detection. Incident Response Support: Participate in incident response efforts, documenting security incidents and assisting in containment and recovery actions. Threat Identification: Contribute to analyzing cybersecurity threats and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. More ❯
management of the Cyber Defence and Security Operations Centre within their time-zone, EMEA & APAC. They will make sure that the firm can effectively monitor, analyse, and respond to cybersecurity events and incidents and will oversee a team of senior analysts and analysts, providing guidance and direction to protect the organisation's information assets and infrastructure from cyber threats. … the effective and efficient transition from the prior shift and to the next shift in line with the follow-the-sun operating model. Take the lead in a CSIRT (cybersecurity incident response team) capacity for managing global response activities for Level 3 security and data breach incidents, coordinating with IT teams and stakeholders including Privacy Officers. Oversee incident investigation … Strategy and Policy Development Manage the development, maintenance and implementation of Cyber Defence and Security Operations strategies, policies, playbooks, and procedures to ensure effective monitoring, analysis, and response to cybersecurity events and incidents, under the strategic direction of the Head of Cyber Defence. Own and govern the lifecycle of any other documentation relating to Cyber Defence, ensuring accuracy, accessibility More ❯
investigate incidents and recommend remediation strategies, and ensure compliance with security standards, relevant policies, and procedures. Additionally, the IT Security Analyst plays a key role in educating users on cybersecurity best practices and collaborates closely with IT teams and campus partners to strengthen the institution's overall security posture. The IT Security Analyst must work collaboratively within the Campus Technology … Oversee the vendor security assessment and review process using HECVAT and SOC 2 and compliance tracking tools. •Maintain and monitor campus-wide information security training efforts. Lead campus-wide cybersecurity training and awareness programs, including KnowBe4 training, phishing simulations, security communications (e.g. digital signage with security tips) and awareness campaigns. •Contribute to the development, planning, and implementation of departmental long … term strategic goals. •Provide Mentorship for student employees, including hands-on exposure to real-world cybersecurity tasks. •Perform related duties as assigned. Juniata College is committed to cultivating an equity-minded and equity-engaged campus culture, one that is inclusive and supportive of its students, faculty, and staff. We believe that all members of the College community share the responsibility More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
and medical supplies to the world's remotest regions and places of deepest human need - places where flying is not a luxury but a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission … driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cybersecurity solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, and access management-and want to use your skills to support a … security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're passionate about cybersecurity and want to make a meaningful impact, then this role is for you. We would consider a remote worker for this role. (This More ❯
technology Security Engineer to join the IT team. As the first line of defence in the IT department, the principal purpose of this job mainly focusses on information security, cybersecurity and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices … with the Head Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and in line with local regulations.The ideal candidate will be responsible for managing information security systems, ensuring … of security measures such as firewalls, intrusion detection systems, and data encryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information Security, Computer Science, or a related field.- Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in More ❯
Introduce and integrate tools to enhance internal capabilities for routine security testing activities. Develop and deploy tools and automation to streamline common IT Security Operations tasks. Identify areas of cybersecurity improvement to ensure cybersecurity and data security by design controls. Collaborate closely with IT and Development teams to embed security-by-design principles into development processes. Conduct reviews … Level designs for review and presentation. Representing IT security at the Change Authority Board, Architecture Review Board Attend IT and Security operational meetings. Required Experience Between 5 - 10 years CyberSecurity Engineer experience. Hands-on technical support experience in IT and Network Security Engineering and/or Systems Engineering roles. Substantial experience in Security Technology Management and Incident Response, including More ❯
response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident Follow major incident process Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Proactively hunt for threats within enterprise environments …/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds CyberSecurity Certification e.g. ISC2 CISSP, GIAC, SC-200, Certified SOC Analyst Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and More ❯
response plans, ensuring they align with industry best practices. Escalation management in the event of a security incident Follow major incident process Threat Intelligence: Stay abreast of the latest cybersecurity threats and vulnerabilities, integrating threat intelligence into security monitoring processes. Contribute to the development of threat intelligence feeds to enhance proactive threat detection. Proactively hunt for threats within enterprise environments …/IPS, Firewalls) Education Requirements & Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds CyberSecurity Certification e.g. ISC2 CISSP, GIAC, SC-200, Certified SOC Analyst Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and More ❯
london, south east england, united kingdom Hybrid / WFH Options
VML
platforms (e.g., AWS, Azure, GCP) and their security implications. Experience with running and managing heterogenous hardware (Apple, Intel), OS (OSX, Linux, Windows) and software environments. In-depth knowledge of cybersecurity principles, best practices, and relevant technologies. Professionally qualified e.g. CISSP, CISM or CISA. Experience with IT service management (ITSM) frameworks, such as ITIL. Other Skills & Abilities: Excellent leadership, communication, and More ❯
improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM landscape. Prepare responses to risk assessments and audits that identify and mitigate potential IAM risks. Participate in security IAM incident investigations … KPI and KRI metrics and reports for executive management. Create IAM presentations for an executive audience. Build business cases for any new capabilities or solutions needed. Collaborate with the Cybersecurity and solution architects to create and maintain the IAM strategy and roadmap. What you will bring: Minimum of 10 years of experience in IT or Security, with at least … management role overseeing IAM programs. Professional certification such as Certified Identity and Access Manager (CIAM) or Certified Identity Management Professional (CIMP), CISSP, or CISM is highly desirable. Experience with cybersecurity frameworks and standards, such as NIST, ISO 27001, or similar. General understanding of operational risk and risk-related control frameworks and practices such (ISO 27001, NIST SP 800-53, NIST More ❯
60k per annum As a Cloud/CyberSecurity Solutions Architect , you will design and implement advanced cloud and security architectures to protect an organisation's critical digital assets. You'll collaborate with key stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identity … Stay updated on the latest cloud security trends and technologies. Collaboration : Work with IT, security, and development teams to ensure solutions meet business needs. Required Skills : Strong knowledge of cybersecurity technologies and practices Expertise in security frameworks (CIS, ISF, Mitre, NIST, or equivalent) Deep understanding of CIS18 controls and security architecture concepts Experience with incident investigation and remediation Proficiency in … cloud security (Azure, AWS, or Google Cloud) Excellent stakeholder management and communication skills Relevant cybersecurity certifications (CISSP, CISM, CEH, etc.) Requirements Bachelor's degree in a related field (e.g., Computer Science, Information Security) 10+ years of proven experience in cybersecurity, with at least 5 years focused on cloud security solutions Solid experience in designing and implementing cloud security solutions Strong More ❯
london, south east england, united kingdom Hybrid / WFH Options
TikTok
Senior CyberSecurity Operations Center (CSOC) Analyst - USDS Senior CyberSecurity Operations Center (CSOC) Analyst - USDS 2 weeks ago Be among the first 25 applicants Responsibilities About the Team The CSOC team is responsible for 24x7 monitoring of multiple security-related information sources to manage incidents related to cyber, privacy, and data protection for TikTok data, infrastructure, and products. The … regularly review our hybrid work model, and the specific requirements may change at any time. As a Senior CSOC Analyst, you will be a member of TikTok's US CyberSecurity Operations Center (CSOC) team. You will belong to a team of strong people, processes, and technologies with the overarching goal of detecting and responding to threats targeting TikTok's … US operations and infrastructure. You'll be based in our CyberSecurity Operations Center in London, UK. Duties and Responsibilities: - Participate in incident response activities. - Conduct technical analysis and assessments of security-related incidents, including malware analysis, packet-level analysis, and system-level forensic analysis. - Collect and analyze disk & memory images with the intent of identifying information related to a More ❯
london, south east england, united kingdom Hybrid / WFH Options
Sonata One
of Sonata One. This role is critical in protecting the confidentiality, integrity, and availability of our information systems and data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a Data Protection Officer, ensuring that data privacy and governance meet the high … regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain information security policies, standards, and procedures. Lead the organization's cybersecurity strategy, risk assessments, and security roadmap. Manage information security projects and initiatives across IT and business units. Collaborate with senior leadership to align security goals with business objectives. Lead risk assessments and threat … z2bz0 years of experience in information security, preferably in financial services. In-depth understanding of security frameworks (e.g., ISO/IEC 27001, NIST CSF, CIS Controls) and cybersecurity principles, practices, and regulatory requirements in the finance sector. Experience in security technologies such as firewalls, IDS/IPS, SIEM, encryption, and identity management. Experience with secure cloud computing platforms (e.g., Azure More ❯
architecture of the client's IT systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: - Identify business objectives, user needs, risk appetite and cybersecurity obligations - Identify vulnerabilities, perform threat modelling, undertake risk assessment, evaluate the effectiveness of security controls - Verify and evidence alignment to 'Secure by Design' principles, corporate security policy/standards … documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification of identified risks and emerging cybersecurity vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and … verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to cybersecurity, information assurance, cyber risk, data privacy including regulatory and compliance considerations Lead the development and enhancement of governance, risk and compliance aligned to policy, standards an industry good practice Ensure that continuous assessment, identification, analysis More ❯
ability to deliver timely high quality analytical work in a relatively unsupervised environment. Technical and management experience (operational leadership or within an audit/control function) covering Technology Infrastructure, CyberSecurity or Resilience. Experience of one or more of the following areas: cloud technologies, incident response, vulnerability management, threat management, information risk management, data leakage protection, identity & access management, technology … Linux, Windows, Databases, or Middleware storage technologies or Networks. Additionally, ITIL service management processes including Incident, Problem and Change, Data Backup and Recovery. Knowledge of new and emerging technology, cybersecurity, and resilience risks and mitigating controls. Relevant professional qualifications (e.g. CISA, CISSP, CRISC, TOGAF or other relevant technical qualification; and graduate degree). Practical understanding of relevant regulatory environment. … skills with the ability to communicate effectively to senior technical specialists and senior non-technical individuals. Desirable skillsets/good to have: Operational or audit experience of performing technology, cybersecurity or resilience risk and control assessments. Financial services industry knowledge. Exposure to and background knowledge of IT Architecture. Programme/Project delivery experience (including: agile, waterfall and SDLC) or More ❯
assets through proactive security measures, advanced threat intelligence, and world-class support. Join a dynamic, innovation-driven team where your skills make a real impact. Your Mission: As a CyberSecurity Engineer, you’ll take charge of designing and implementing advanced security systems, supporting clients in improving their security posture, and staying ahead of emerging cyber threats. You’ll play … and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We’re Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms More ❯
Job Title: CyberSecurity Test Analyst Location: Sheffield, UK (3 days/week Onsite) Duration: 6months+ Banking Client Experience required Job Summary: Required Experience Proven experience in software testing, preferably within Privileged Access Management (PAM) or Identity & Access Management (IAM). Experience with PAM solutions such as CyberArk, BeyondTrust, Delinea (Thycotic), or Microsoft PAM. Strong understanding of IAM principles, privileged More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
looking for someone who has these abilities and skills: Required Skills and Abilities: Established Penetration Testing experience and/or Information Security Project Management experience Proven experience Penetration Testing, cybersecurity, or related fields. Understanding of Penetration Testing process and lifecycle, OWASP Application vulnerabilities and IT systems. Knowledge of Cybersecurity frameworks (e.g., NIST, ISO 27001) and compliance regulations (e.g., DORA, GDPR … Burpsuite Digital Forensics or Discovery experience Basic understanding of eMail infrastructure/Outlook/Office365 and Microsoft Application Basic understanding of virtual environments Bachelor's degree in Information Technology, Cybersecurity, Computer Science, or a related field, Master's degree or relevant certifications (e.g., PMP, Prince, CISSP, OSCP) is a plus Be able to work in a pressurised situation and set More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience More ❯