Swindon, England, United Kingdom Hybrid / WFH Options
Nationwide
Society. This role is within the 2nd line of the 3 lines of defence model. The role is part of the Oversight for Chief Operations Office which includes technology, security, data and 3rd party management specialisms. This role will be accountable for support, challenge, and influence over the security strategy through liaison with the Chief InformationSecurity Officer, Security Architects, and risk partners. Security underpins all business and member services so understanding and managing security risk, control, and policy effectively is a critical part delivering services to customers. At Nationwide we offer hybrid working wherever possible. More rewarding relationships are supported through our hybrid approach, bringing colleagues together across our UK wide estate … the advert earlier than the advertised date, so please apply as soon as you can. What you'll be doing This role is focussed on the risk oversight of Security within the Society covering Cyber and Physical Security. You will be providing oversight and assurance on the management of operational and delivery risk within the Security Strategy and More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
JIM - Jobs In Manchester
Join to apply for the Cyber Security Architect role at JIM - Jobs In Manchester Continue with Google Continue with Google 2 days ago Be among the first 25 applicants Join to apply for the Cyber Security Architect role at JIM - Jobs In Manchester Job reference: PSX-028374 Salary: £59,139 to £70,579 per annum depending on experience … Faculty/Organisational Unit: Professional Services Location: Oxford Road Employment type: Permanent Division/Team: InformationSecurity, Identity and Access Management Hours Per Week: Full Time (1 FTE) Closing date (DD/MM/YYYY): 09/07/2025 Contract Duration: Permanent School/Directorate: Directorate of IT Services Cyber Security Architect Shape the Future of … Cyber Security in a World-Class Research Environment The University of Manchester is a place of ideas... BIG, bold, transformative ideas. Our researchers probe the edge of the possible, our students push boundaries, and our communities ask urgent questions of the world. But none of this can happen without robust, thoughtful, and resilient digital defences. That’s where you More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
RealVNC
the success of the business, committed to delivering high quality results, collaboration and innovation to help accelerate company growth. Position: We are seeking a highly skilled and motivated Cyber Security Engineer to join our Cyber Security team. This role is crucial in maintaining the security of our systems, networks, and data. The successful candidate will implement security measures, monitor for vulnerabilities, respond to incidents, and ensure compliance with RealVNC policies and industry standards and regulations. Key responsibilities include; Security Monitoring and Incident Response: Serve as a point of contact between the internal security team and our external SOC provider, to continuously monitor systems for security breaches and anomalies. Ensure that alerts, escalations, and … queries, analytics rules, threat hunting scripts, and automation logic. Work with internal teams to mitigate threats and implement recommendations - for example MFA enforcement, Conditional Access policies, and identity protection. Security Architecture and Implementation: Evaluate and recommend security solutions to enhance internal security posture. Utilising third-party security tools to scan the environments for vulnerabilities, mitigate findings More ❯
Description We are looking for a Lead Cyber Security Engineer - Threat Simulation to be an integral part of our Offensive Security organization and contribute towards improving CME Group's security posture. This role will be responsible for participating in the execution of Red Team cyber exercises of internal and internet facing information systems and infrastructure to … identify misconfigurations and cyber security vulnerabilities that could be exploited by a threat actor to gain unauthorized access to computer systems and data. In addition, the role will require participation in Purple Team exercises to help the Blue Team improve their detection capabilities. This is a perfect opportunity for the right person to become a key part of a … Participate in purple team exercises that are intelligence driven to test cyber detections Build and maintain Red and Purple team infrastructure, automating functions where possible. Continually research new offensive security tactics, techniques, and procedures and communicate knowledge of the same to other team members . Conduct ad-hoc offensive security testing using industry standard tools and/or More ❯
Job summary Join our dynamic Digital, Data and Technology (DDaT) team at NHSBSA as a Cyber Security Operations Team Lead. You'll lead a team of specialists, manage security operations, and support various projects and initiatives. Your role involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities: Lead and … manage the Cyber Security Operations team. Ensure compliance with security standards (ISO27001, NCSC CAF). Manage security incidents and vulnerabilities. Collaborate with third-party suppliers and internal teams. Provide expert advice on security technologies and processes. Requirements: Proven team leadership experience.Strong knowledge of security technologies (firewalls, IDS/IPS, SIEM).Relevant qualifications (CISSP, CISM, etc. … . Apply now to make a significant impact on NHS BSA's cyber security strategy! What do we offer?o 27 days leave (increasing with length of service) plus 8 bank holidayso Flexible working (we are happy to discuss options such as compressed hours)o Hybrid working model (we are currently working largely remotely)o Career development o Active More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
Job Details: Senior Cyber Security Engineer Vacancy Name: Senior Cyber Security Engineer Vacancy No: VN447 Employment Type: Full-Time Business Name: PayPoint Network Ltd Location: Remote (Hybrid) with some travel required What will you be doing? We have an exciting opportunity for a Senior Cyber Security Engineer to join the PayPoint Group team. If you’re passionate … and like a challenge, then please keep reading.... You will be responsible for creating, implementing, and maintaining security content such as rules, playbooks, dashboards, and reports for our security systems. This role requires a strong understanding of security best practices and experience working with enterprise security platforms within a SOC environment. You will join the InformationSecurity team and use your experience to provide technical guidance and mentorship to existing team members. You'll help keep our systems safe by setting up security alerts, improving threat detection, and automating incident response. Managing logs and ensuring our most important assets are protected will be part of your daily tasks. You'll monitor securityMore ❯
and access View job & apply Zero Trust Architect Location: Fully Remote Job type: Contract Position Overview: Leading FinTech company seeking a Zero Trust Architect to design and implement Cyber Security Vulnerability Management Analyst Cyber Security Vulnerability Management Analyst required for a market leading financial services firm. It's a great opportunity to get to work with industry-leading … tools and security partners, to enhance your analytical, technical and communication skills, and to really make a difference to our customers and colleagues. This role will contribute to the development, maintenance and overall delivery of Vulnerability Management controls for the Bank, reporting to the Vulnerability Management Lead. The Vulnerability Management Analyst will contribute to the day-to-day running … of the team, assisting Specialists with managing the Bank's Vulnerability Management controls and providing security input for vulnerabilities which threaten the organisation. Experience Understanding of vulnerability lifecycles, standards and ratings Risk assessing findings to determine appropriate response with a proactive approach to recording, management and escalation of risks Increasing the quality of vulnerability reporting automation to reduce manual More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Pertemps
As the Critical Asset and Classification Lead , you will be part of the InformationSecurity team, focused on identifying, managing, and protecting Thames Water’s most critical data assets, often referred to as “crown jewels.” This role will also lead the development and implementation of data classification methodologies to ensure appropriate protection based on sensitivity and importance. The … you’ll be doing as the Critical Asset and Classification Lead: Critical Asset Framework Development: Lead the development and ongoing refresh of the framework for identifying and protecting critical information systems and data assets. Data Classification Methodology: Design and implement methodologies to classify data assets based on sensitivity, criticality, and business importance. Security Controls Monitoring: Assign and monitor … appropriate security controls aligned with system criticality and data classification standards. Asset Register Management: Maintain and periodically review registers for both critical information systems and information assets. Cross-functional Collaboration: Collaborate with business and digital teams to identify, score, and categorise critical assets and ensure alignment with strategic security objectives. Compliance & Best Practice: Ensure data classification More ❯
development, embraces an inclusive environment, and rewards innovative excellence. If you're as passionate about your future as we are, join our team. Roles & Responsibilities You analyze complex enterprise informationsecurity programs and infrastructure in both public and private sector. You assist with assessments of clients' IT and security processes, risk, controls and compliance against leading practices … people models to address key and evolving risks. You are the interface with client executives and hands-on technology practitioners to bring meaningful, strategic change in the areas of information protection, data security and privacy, security operations and business continuity. You articulate business risks of technical vulnerabilities and identify and communicate findings to client personnel. You review … demonstrate excellent project management skills, promote teamwork and individual accountability with engagement team members. Skills & Qualifications You have min. 5 years of experience in the field of cybersecurity and information risk management. You have a master degree or equivalent by experience. Having cybersecurity related certification (e.g. CISSP, CEH, CISM, CISA, GIAC, GSEC) is a plus. Having experience in leading More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
InstaVolt
self-service capabilities for common support tasks to improve efficiency and user experience. Collaborate with the CTO and technology leaders to align IT strategies with business goals, supporting scalability, security, and regulatory compliance. Manage and optimise hybrid cloud environments (e.g., Azure, AWS, Google Cloud) in support of internal services and business operations. Deliver demonstrable progress in the company's … support team, including recruiting, coaching, performance management, and professional development. Manage relationships with external vendors, MSPs, and technology partners to ensure cost-effective and reliable service delivery. Collaborate with InfoSec and Legal teams to ensure compliance with relevant regulations (e.g., ISO 27001, GDPR). Lead incident response and disaster recovery planning/testing for internal platforms and operational IT. Requirements … Needed: Bachelor's degree in information technology, Computer Science, or related experience. 10+ years of experience in IT operations and support services, with at least 5 years in a leadership role. Proven experience managing enterprise IT systems, cloud platforms, and service desk operations in a 24 7 environment. Strong knowledge of ITSM frameworks and modern collaboration tools (e.g., M365 More ❯
London, England, United Kingdom Hybrid / WFH Options
55 Exec Search
off shift pattern , ensuring sustained SOC coverage across critical hours. You’ll manage, mentor, and train two junior SOC analysts working on your shift, while also delivering advanced security operations services to clients across a range of industries. As a Senior SOC Analyst , you will be central to incident response, threat hunting , and real-time defence management , guiding and … two junior SOC analysts. The SOC team is deeply committed to leveraging the latest in automation and artificial intelligence, including SOAR platforms, to deliver smarter, faster, and more effective security outcomes. This role provides a unique opportunity to help shape the future of a next-gen SOC environment. This role combines hands-on technical expertise with management responsibility, offering … a unique blend and the chance to contribute meaningfully to both team development and cutting-edge security operations. The shift pattern is four days on, four days off, with rotating early (6 am-3 pm), late (2 pm-11 pm), and night (10 pm-7 am) shifts. Key Responsibilities Mentorship & Team Leadership: Guide and support two juniors with ticket More ❯
The IT Security Operations Center's mission is to preserve the confidentiality, integrity, and availability of our assets by identifying operational and security risks and collaborating with business, functional, and customer stakeholders to develop plans that manage risk to acceptable levels. We are currently seeking a Sr. Cyber Incident Response Analyst to join our team. About the Role … Monitor for and investigate suspicious or malicious activity and alerts Review Change Management requests for security relevance and impact Daily review of system, application logs, and custom monitoring tools Malware and Advanced Persistent Threat (APT) analysis and remediation Incident Response and Investigations Availability for rotating on-call shifts (up to 2 - 3 times per year) About You Bachelor's … degree preferred or equivalent related field experience Professional Certifications preferred, including SANS GIAC or CISSP Microsoft, Linux, Networking or related certifications a plus. Experience in Information Technology Extensive experience in informationsecurity incident response and operations management Extensive experience of OS, application, and network security weaknesses, vulnerabilities, and remediation Experience researching, analyzing, and resolving complex problems More ❯
London, England, United Kingdom Hybrid / WFH Options
MUFG
investing in talent, technologies, and tools that empower you to own your career. Join MUFG, where being inspired is expected and making a meaningful impact is rewarded. IT Risk, Security & Control department covers cyber security strategy maintenance and tactical planning and operations to provide IT Security protection, governance, risk management and reporting. This includes promoting the global … InformationSecurity Standards and Procedures (ISSP) requirements and local security requirements. The department deploys, supports and monitors security solutions such as virus protection, vulnerability management, compliance monitoring and threat/incident management activities to reduce risk. NUMBER OF DIRECT REPORTS 1-2 MAIN PURPOSE OF THE ROLE To manage the technical delivery of various cybersecurity projects … high degree of difficulty Experience in managing cybersecurity technology projects such as implementation of DLP, Cyber infrastructure replacement, Cloud monitoring tools etc. Demonstrable proficiency in a wide range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Threat Intelligence, Risk Evaluation, SecurityMore ❯
London, England, United Kingdom Hybrid / WFH Options
Sportradar
or Munich WORK TYPE : Hybrid remote and onsite (3 days office, 2 days remote) Job Description : The Senior Incident Response Specialist will serve as a senior member of the Security Operations Center within the InformationSecurity team, leading incident response and proactive threat hunts. This position requires a hands-on, expert-level professional responsible for proactively detecting … improve SOC detection and response efficiency. Desired Experience : Applying the results of previous incidents and threat hunting activities to creating new detection use cases. Hands-on experience with AWS security services, such as GuardDuty, Security Hub, CloudTrail, and IAM configurations. Familiarity with securing web applications, including common vulnerabilities (e.g. OWASP Top 10) and mitigation techniques. Proficiency in scripting … languages like PowerShell and Python. Experience working within agile or continuous improvement environments. Desired Qualifications : Strong analytical skills, with the ability to handle high-pressure situations and manage complex security incidents from start to finish. Effective communication skills, with the ability to produce clear, concise documentation and interact effectively with both technical and non-technical stakeholders. Certifications in relevant More ❯
make a difference. Position Summary This is a great opportunity to grow your career and lead enterprise engagements as a Senior Consultant! In this position you will assess the security and compliance of client firms against regulatory and industry requirements and standards, and against security best practice frameworks. You will have a strong understanding of framework requirements, perform … timelines and deliverables. As a Senior Consultant, you will regularly interact with peers and clients as both an auditor and assessor, depending on the engagement. This role will audit information systems with confidence and accuracy to ensure the integrity and effectiveness of security measures. You will test technical controls, policies and procedures, laws, regulations, and industry best practices. … sales. Travel 25-50%. Ability to be successful when working remotely. What You'll Bring Current PCI-QSA certification preferred (will consider former QSA) One of the following InformationSecurity certifications required: CISSP, CISM or ISO 27001 Lead Implementer. One of the following Audit certifications required: CISA, GSNA, CIA, IRCA ISMS Auditor or higher, or ISO More ❯
London, England, United Kingdom Hybrid / WFH Options
Coalfire Systems, Inc
make a difference. Position Summary This is a great opportunity to grow your career and lead enterprise engagements as a Senior Consultant! In this position you will assess the security and compliance of client firms against regulatory and industry requirements and standards, and against security best practice frameworks. You will have a strong understanding of framework requirements, perform … timelines and deliverables. As a Senior Consultant, you will regularly interact with peers and clients as both an auditor and assessor, depending on the engagement. This role will audit information systems with confidence and accuracy to ensure the integrity and effectiveness of security measures. You will test technical controls, policies and procedures, laws, regulations, and industry best practices. … sales. Travel 25-50%. Ability to be successful when working remotely. What You'll Bring Current PCI-QSA certification preferred (will consider former QSA) One of the following InformationSecurity certifications required: CISSP, CISM or ISO 27001 Lead Implementer. One of the following Audit certifications required: CISA, GSNA, CIA, IRCA ISMS Auditor or higher, or ISO More ❯
Cambridge, England, United Kingdom Hybrid / WFH Options
AVEVA
to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with business objectives to integrate security and compliance seamlessly into business processes. The role includes developing the IDAM strategy, delivering a step change in how IDAM is approached, owning IDAM platforms, governance, and processes, and … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication … Act as a subject-matter expert on all IDAM disciplines, including identity lifecycle, governance, access management (SSO, MFA), and identity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement emerging IDAM technologies to enhance security, user experience, and More ❯
London, England, United Kingdom Hybrid / WFH Options
AVEVA Denmark
to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with business objectives to integrate security and compliance seamlessly into business processes. The role includes developing the IDAM strategy, delivering a step change in how IDAM is approached, owning IDAM platforms, governance, and processes, and … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization’s digital assets while enabling secure and effective user experiences. Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication, and … Act as a subject-matter expert on all IDAM disciplines, including identity lifecycle, governance, access management (SSO, MFA), and identity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement emerging IDAM technologies to enhance security, user experience, and More ❯
London, England, United Kingdom Hybrid / WFH Options
Aztec
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … analysis support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practice in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec’s technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo’s to provide independent challenge More ❯
Southampton, England, United Kingdom Hybrid / WFH Options
Aztec
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … to support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practices in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec’s technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo’s to provide independent challenge More ❯
London, England, United Kingdom Hybrid / WFH Options
Control Risks
powered advice on this job and more exclusive features. Thanks to continued growth we now have a brand new role for a Director to join our Digital Risks (Cyber Security) practice in London. We are seeking a senior leader to drive the growth of Digital Risks in the United Kingdom, with a primary focus on cyber assurance, third-party … and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in informationsecurity, Computer Science, Engineering, or a related field. Relevant certifications such as CREST, OSCP, CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity More ❯
South Kensington, England, United Kingdom Hybrid / WFH Options
Control Risks
powered advice on this job and more exclusive features. Thanks to continued growth we now have a brand new role for a Director to join our Digital Risks (Cyber Security) practice in London. We are seeking a senior leader to drive the growth of Digital Risks in the United Kingdom, with a primary focus on cyber assurance, third-party … and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor's or master's degree in informationsecurity, Computer Science, Engineering, or a related field. Relevant certifications such as CREST, OSCP, CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity More ❯
London, England, United Kingdom Hybrid / WFH Options
RecruitMe
Energy Infrastructure/Carbon Reduction Drive Security for a Greener Future We’re looking for a passionate and detail-driven InformationSecurity Analyst to join the InfoSec team at our client, a fully integrated energy infrastructure company committed to a net-zero future. As a key player in the transition to low-carbon energy, our client owns … storage systems (BESS), and EV chargepoints. In this role, you’ll help safeguard the digital infrastructure that powers critical environmental innovation. What You’ll Do: Manage and support the InformationSecurity Management System (ISMS) across the group and its subsidiaries Ensure compliance with leading frameworks: ISO27001, Cyber Essentials Plus, and NIST CSF Coordinate responses to customer and supplier … advice on GDPR, data privacy, and technical control implementation Generate actionable reports and insight for senior stakeholders Oversee third-party security compliance and due diligence processes Collaborate with InfoSec and IT teams to deliver on the SecOps roadmap What You’ll Bring: Essential Experience & Skills: Solid experience in InformationSecurity, auditing, and compliance Hands-on knowledge of More ❯
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯