SOC and the security tools in the Cloud environment (Defender and Sentinel) Oversee security architecture, vulnerability management, incident response, and threat intelligence Lead security risk assessments and manage remediation plans for identified gaps Ensure compliance with financial regulations (e.g. GDPR, PCI DSS, SOX, FCA requirements) Establish and enforce security policies, standards, and procedures Report security posture, incidents, and More ❯
awareness and education programmes – Analysis of information security alerts and incidents – Report on incidents, risks, threats and vulnerabilities – Scheduling internal and external penetration and vulnerability tests and managing remediationplanning Assist in evaluation of cyber security tools Manage online ISMS system. Assist the ISM to deliver Information Security projects Participate in technology and information security related audits, providing More ❯
understood and complied with across teams. Developing and integrating security testing plans into the Secure Software Development Lifecycle (S-SDLC) . Performing and overseeing security testing while managing remediation plans for identified vulnerabilities. What we're looking for: Experience in Software Engineering and Application Security . In-depth understanding of application security vulnerabilities , testing techniques, and familiarity with More ❯
Sunderland, Tyne and Wear, England, United Kingdom
Nigel Wright Group
processes. Cloud cost optimisation while maintaining performance standards. Continuous improvement through technology evaluation and personal development. Onboarding and integration of new partner firms, including IT due diligence and remediation planning. Provision of quality 3rd line technical support and escalation handling. Accurate issue tracking and resolution documentation. Time and workload management across multiple incidents. Occasional travel and out-of More ❯
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
london (city of london), south east england, united kingdom
Alexander Ash Consulting
infrastructure SMEs to document end-to-end technical and business processes. Support network migration activities, including mapping current-state to target-state architectures and identifying dependencies, risks, and remediation plans. Drive clarity around requirements for replatforming projects, ensuring alignment with enterprise architecture, cloud strategy, and regulatory standards. Produce high-quality documentation including user stories, process flows, functional and More ❯
closely with business, compliance, technology, and other teams to define and communicate data-related business requirements for initiative planning and prioritization. Supports investigations into data quality issues, developed remediation plans, and recommended solutions to resolve root causes. Maintains consistent communication with cross-functional teams to provide updates, ensure alignment, and track progress effectively. Profile Strong knowledge and hands More ❯
application security programme. This role will give you the chance to work closely with engineering and development teams, embedding security into the development lifecycle, driving automation, and influencing remediation plans that have real impact. What you’ll be doing Guiding teams on security best practices, compliance, and secure coding. Collaborating with architects and developers to review designs and More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
Morson Talent
application security programme. This role will give you the chance to work closely with engineering and development teams, embedding security into the development lifecycle, driving automation, and influencing remediation plans that have real impact. What you'll be doing Guiding teams on security best practices, compliance, and secure coding. Collaborating with architects and developers to review designs and More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Computer Futures - London & S.E(Permanent and Contract)
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
Risk Assessment and Architecture: Proven experience in creating risk assessment and architecture documentation. Penetration Testing Processes: A comprehensive understanding of pen testing procedures, including reporting, triaging, and devising remediation plans. MOD Knowledge: Familiarity with Ministry of Defence (MOD) protocols and requirements. NCSC Guidance: Expertise in applying NCSC (National Cyber Security Centre) guidance effectively. Desirable Skills Security Architecture Expertise More ❯
intelligence · Lead threat hunting engagements · Conduct incident response within various Cloud platforms · Identify attacker Tactics, Techniques and Procedures (TTPs) to develop indicators of compromise · Develop and implement dynamic remediation plans in conjunction with incident response engagements · Take a lead role in authoring comprehensively written client reports on investigative findings · Effectively communicate and interface with customers, both technically and More ❯
based Required Skills & Experience: Proven ability to lead or contribute to BCBS 239 implementation programmes, ensuring compliance with regulatory principles. Strong experience in conducting gap analyses and defining remediation plans for data governance, data quality, and reporting processes. Ability to collaborate effectively with Risk, Finance, and IT teams to implement end-to-end solutions for data lineage, accuracy More ❯
based Required Skills & Experience: Proven ability to lead or contribute to BCBS 239 implementation programmes, ensuring compliance with regulatory principles. Strong experience in conducting gap analyses and defining remediation plans for data governance, data quality, and reporting processes. Ability to collaborate effectively with Risk, Finance, and IT teams to implement end-to-end solutions for data lineage, accuracy More ❯
london (city of london), south east england, united kingdom
Vallum Associates
based Required Skills & Experience: Proven ability to lead or contribute to BCBS 239 implementation programmes, ensuring compliance with regulatory principles. Strong experience in conducting gap analyses and defining remediation plans for data governance, data quality, and reporting processes. Ability to collaborate effectively with Risk, Finance, and IT teams to implement end-to-end solutions for data lineage, accuracy More ❯
assessing function capability, and suggesting improvements where necessary. Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts. Produces reports detailing key threats and risks to the organisation at a strategic level for business units to digest. Conducts remediationplanning to illustrate how the More ❯
assessing function capability, and suggesting improvements where necessary. Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts. Produces reports detailing key threats and risks to the organisation at a strategic level for business units to digest. Conducts remediationplanning to illustrate how the More ❯
assessing function capability, and suggesting improvements where necessary. • Identifying security gaps, and building attack simulations to support Purple Team engagements by illustrating potential attack patterns to prioritise future remediation efforts. • Produces reports detailing key threats and risks to the organisation at a strategic level for business units to digest. • Conducts remediationplanning to illustrate how the More ❯
help monitor and defend networks, systems, and applications against evolving threats. You'll work as part of a team that provides 24/7 monitoring, detection, response, and remediation services for a diverse client base. Key Responsibilities: Support the Managed Extended Detection & Response (MXDR) service. Monitor security alerts and events to identify potential incidents. Assist in investigating security … incidents, determining root causes, and supporting remediation plans. Collaborate with internal teams and external stakeholders to ensure security controls are effectively maintained. Generate and review reports on events, incidents, and trends to drive continual improvement. Stay current with security developments, tools, and techniques to strengthen the service. Qualifications & Requirements: Bachelor's degree in Computer Science, Cybersecurity, or a More ❯
the delivery of the security roadmap and a continuous improvement model for security Ensure Information Security controls are operating effectively Ensure where gaps are identified that these have remediation plans agreed and delivered Ensure effective Information Security pen testing co-ordination along with Vulnerability Security assessments Help embed security best practices throughout the business and early in projects … such as Confused.com, Go Compare and Compare the Market, via our broker partners. What we offer in return? A collaborative and fast paced work environment Private medical health care plan 25 days annual leave plus of Bank Holidays and the ability to buy holiday A benefit scheme that offers discounts and cashback on shopping, restaurants, travel and more Life More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Gerrard White
the delivery of the security roadmap and a continuous improvement model for security Ensure Information Security controls are operating effectively Ensure where gaps are identified that these have remediation plans agreed and delivered Ensure effective Information Security pen testing co-ordination along with Vulnerability Security assessments Help embed security best practices throughout the business and early in projects … such as Confused.com, Go Compare and Compare the Market, via our broker partners. What we offer in return? A collaborative and fast paced work environment Private medical health care plan 25 days annual leave plus of Bank Holidays and the ability to buy holiday A benefit scheme that offers discounts and cashback on shopping, restaurants, travel and more Life More ❯