Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
Information Security Analyst - Audit, Compliance & Cybersecurity United Kingdom - Southampton At NICE, we don't limit our challenges. We challenge our limits. Always. We're ambitious. We're game changers. And we play to win. We set the highest standards and execute beyond them. And if you're like us, we can offer you the ultimate career opportunity that will light … Cyber Essentials Plus, ISO 27001, ISO 27701, ISO 42001, GDPR, and DORA. This role focuses on internal audits, regulatory compliance, and readiness for external audits while also contributing to Cybersecurity Operations Center (CSOC) activities, including incident monitoring and response. How will you make an impact? Internal Audit Execution: Conduct internal audits to evaluate and enhance IT controls, compliance with standards … with security monitoring and incident detection. Incident Response Support: Participate in incident response efforts, documenting security incidents and assisting in containment and recovery actions. Threat Identification: Contribute to analyzing cybersecurity threats and implementing recommendations to improve the security posture. Policy and Procedure Development: Assist in creating and refining cybersecurity policies and operational procedures to align with audit and compliance objectives. More ❯
Job title: CyberSecurity Analyst Location: UK (Remote with some travel to UK sites) Salary: Up to £70,000 + car allowance + package Why Apply? Join a growing organisation in the engineering sector in a newly created role that will play a key role as the company continues to grow. You will contribute to a dynamic, fast-paced environment … data, working on a mix of BAU security operations and security-focused projects as they work towards their ISO certifications, building your technical skills while making a meaningful impact. CyberSecurity Analyst/Engineer Responsibilities: With day-to-day reporting to the Group Information Security Officer (GISO), you will combine operational monitoring and incident response with hands-on project delivery. … Leading security-focused projects across the network, Windows Desktop/Server environments, VMware, Intune, O365/Azure, and related systems. Reviewing and remediating vulnerabilities in collaboration with relevant teams. CyberSecurity Analyst/Engineer Requirements: Technically adept with proven experience as a security analyst or engineer. Proficiency with security tools, including SIEM, PAM, IDS/IPS, antivirus, and MS Sentinel. More ❯
Analyst is highly engaged in risk management, including evaluating vendor risk, examining vendor contracts, understanding third-party risk, and data privacy issues. This individual serves as an expert on cybersecurity protection, detection, response, and recovery, coordinating penetration testing and managing cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, data … encryption, vulnerability scanning, and configuration of security tools. Prior experience in an international enterprise environment is essential. Responsibilities Collaborate with IT teams to design and implement the company's cybersecurity strategy. Identify and address security gaps through ongoing monitoring and enhancements. Manage access to privileged accounts and audit activities to meet regulatory requirements. Evaluate and implement cybersecurity solutions to maintain … acting as incident response leader. Develop security, risk, and compliance reports and alerts. Review policies and procedures annually for security compliance. Develop, test, and implement disaster recovery procedures. Manage cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
Social network you want to login/join with: Senior CyberSecurity Analyst As a Senior CyberSecurity Analyst , you will play a critical role in strengthening Thames Water's digital defences by maintaining and optimising security operations tools and processes. You'll focus on monitoring, analysing, and responding to cyber threats, while supporting the SOC team and ensuring effective … You'll also contribute to readiness for significant incidents and play a key role in proactive threat hunting and compliance reporting. What you'll be doing as a Senior CyberSecurity Analyst: Security Incident Response : Investigate security alerts from SIEM and third-party MSSPs, triage and respond to incidents, and support root cause analysis to drive remediation. Stakeholder Engagement : Work … to explain technical issues to non-technical stakeholders Desirable Skills & Qualifications: Microsoft Security certifications (e.g., SC-200, AZ-900) Cybersecurity certifications such as CISSP, CISM, or CCS Degree in CyberSecurity, Computer Science, or related field Familiarity with firewalls, IDS/IPS, VPNs, and NAC Experience mentoring or leading SOC analysts What's in it for you? Salary range up More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
Job Title: CyberSecurity Engineer Location: Milton Keynes (hybrid- 2 days onsite) Industry: Financial Services Salary: £40,000-50,000 per annum Overview: We are seeking a skilled and proactive CyberSecurity Engineer to join our growing Information Security team at a leading finance company based in Milton Keynes. In this role, you will be responsible for designing, implementing, and … maintaining robust cybersecurity measures to protect our systems, data, and infrastructure against emerging threats. Key Responsibilities: Monitor, detect, and respond to security incidents and threats in real-time. Design and implement security solutions and controls, including firewalls, intrusion detection/prevention systems (IDS/IPS), and endpoint protection. Perform regular vulnerability assessments, penetration testing, and risk analysis. Collaborate with … and regulatory requirements (e.g., FCA, GDPR, ISO 27001). Stay up to date with the latest security technologies, trends, and threat intelligence. Essential Skills & Qualifications: Proven experience in a cybersecurity or information security engineering role. Strong knowledge of network and system security, encryption, and authentication protocols. Experience with security tools such as SIEM, vulnerability scanners, firewalls, antivirus, and endpoint More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
and medical supplies to the world's remotest regions and places of deepest human need - places where flying is not a luxury but a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission … driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cybersecurity solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, and access management-and want to use your skills to support a … security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're passionate about cybersecurity and want to make a meaningful impact, then this role is for you. We would consider a remote worker for this role. (This More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
Mission Aviation Fellowship
and medical supplies to the world's remotest regions and places of deepest human need - places where flying is not a luxury but a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission … driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cybersecurity solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, and access management-and want to use your skills to support a … security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're passionate about cybersecurity and want to make a meaningful impact, then this role is for you. We would consider a remote worker for this role (this More ❯
and medical supplies to the world's remotest regions and places of deepest human need - places where flying is not a luxury but a lifeline. Are you a skilled cybersecurity professional with a passion for aviation or mission … driven charity work? In this role, you'll be responsible for implementing and managing security infrastructure, responding to threats, and ensuring compliance across systems. You'll work with various cybersecurity solutions while driving security best practices and incident response. If you have experience in cybersecurity tools, governance, and access management-and want to use your skills to support a … security, VPNs, SD-WAN, and Microsoft Defender solutions will help safeguard our systems, while your contributions to incident response, governance, and security strategy will shape the future of our cybersecurity posture. If you're passionate about cybersecurity and want to make a meaningful impact, then this role is for you. We would consider a remote worker for this role. (This More ❯
Employer details Our client is a well known systems security and network provider. They plays a strategic role in enabling secure and high-performance connectivity, cloud solutions, and cybersecurity frameworks. They are located near central station in Brussels. Thay want to hire a Information Security Architect that bridges the gap between operational security and security architecture. The role ensures that … architectural level for new systems and changes. Assist in the development of automated provisioning, monitoring, and incident response processes. Required experience Profile Requirements Master's degree in Computer Science, Cybersecurity, or related field. At least 6 years of experience in information security, including a minimum of 2 years as a security architect or engineer. Technical and Core Competencies Familiarity with … GCP), IAM/PAM, network and endpoint protection. Proficiency with SIEM and monitoring tools (e.g., Microsoft Sentinel, Elastic Stack, Splunk, QRadar), and understanding of incident response. Strong knowledge of cybersecurity principles including threat modeling, zero trust, and defense-in-depth. Understanding of cryptography and key management. Strong communication and documentation skills; capable of explaining complex security topics to both technical More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Softek International Inc
the integrity and availability of all hardware, server resources, logs, systems, and key processes. • Ensure the team is maintaining compliance with applicable policies, standards, and procedures in support of Cybersecurity Provider (CSP) requirements and Authority to Operate (ATO) • Conduct market research, product evaluation, prototyping, integration, development, deployment, recapitalization, operations, and maintenance support for a variety of security software and computing … experience is ideal, DHS experience a plus. • U.S. citizenship required with active Top-Secret clearance with ability to receive SCI. Education BA/BS in a Science, Technology, Engineering, Cybersecurity Management field Management Certifications of Interest (Desired, but not required) • CISSP (Certified Information Security Systems Professional) • PMI Project Management Professional (PMP) • Certified associate in project management (CAPM) • CompTIA Security+ • ITIL More ❯
of Sonata One. This role is critical in protecting the confidentiality, integrity, and availability of our information systems and data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a Data Protection Officer, ensuring that data privacy and governance meet the high … regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain information security policies, standards, and procedures. Lead the organization's cybersecurity strategy, risk assessments, and security roadmap. Manage information security projects and initiatives across IT and business units. Collaborate with senior leadership to align security goals with business objectives. Lead risk assessments and threat … z2bz0 years of experience in information security, preferably in financial services. In-depth understanding of security frameworks (e.g., ISO/IEC 27001, NIST CSF, CIS Controls) and cybersecurity principles, practices, and regulatory requirements in the finance sector. Experience in security technologies such as firewalls, IDS/IPS, SIEM, encryption, and identity management. Experience with secure cloud computing platforms (e.g., Azure More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience More ❯
Springwell, England, United Kingdom Hybrid / WFH Options
MOTT MACDONALD-4
All potential applicants are encouraged to scroll through and read the complete job description before applying. Location/s: Newcastle Recruiter contact: Nikki George Mott MacDonald is a global engineering, management, and development consultancy with over 20,000 employees across More ❯
response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate about cybersecurity, threat detection, and investigative analysis. Key Responsibilities Advanced Incident Detection & Response Lead the investigation and resolution of complex cyber incidents, including APTs, malware outbreaks, and data breaches. Take charge of … teams to manage regulatory reporting during security incidents. Your Profile Essential Skills & Experience: Bachelor’s degree in Computer Science, Information Security, or a related field. 6–8+ years in cybersecurity with a focus on incident response and threat hunting. Proven experience investigating APTs, ransomware, and data exfiltration attempts. Deep knowledge of SIEM platforms (e.g., Splunk, LogRhythm, ArcSight) and EDR solutions. More ❯
savers and businesses across the UK, and together we use our expertise to help them achieve their ambitions and build a sustainable future. We are seeking an experienced Senior CyberSecurity Engineer who is looking to grow in a friendly environment. We are flexible, inclusive, committed to your wellbeing, and passionate about supporting your potential. Let's grow together. Purpose … of the role Reporting to the Head of CyberSecurity, the Cybersecurity Engineer will be part of a team ensuring the security of all group systems, infrastructure (cloud and on-premises), and applications. The role involves delivering and implementing the bank's technology roadmap, ensuring best practices, security standards, and policies are followed. Good communication skills, both verbal and written More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
Job Title: Network Cybersecurity Architect Location: Onsite Colorado Springs, CO, Huntsville, AL Department: Architecture & Engineering Employment Type: Full-Time Permanent Reports To: Chief Architect Overview We are seeking a highly skilled and forward-thinking Network Cybersecurity Architect to lead the design, evolution, and governance of secure network architectures across our enterprise and cloud environments. This is a strategic and hands … on role at the intersection of network engineering, cybersecurity, automation, and cloud-native design. You will work cross-functionally to embed robust, scalable, and secure networking into our hybrid digital landscape-helping to modernize how our organization protects users, systems, and data. As a champion of Zero Trust, Agile delivery, and security automation, you'll drive best-in-class security … Ensure designs align with enterprise security policies, compliance requirements (e.g., NIST, ISO 27001, PCI-DSS), and architecture governance standards. Key Skills & Experience • 8+ years of experience in network security, cybersecurity architecture, or network engineering-including 3+ years in a design or architecture-focused role. • Advanced knowledge of network protocols, routing/switching, encryption, segmentation, and identity-aware access. • Hands-on More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
OSAAVA Services
Job Title: Network Cybersecurity Architect Location: Onsite Colorado Springs, CO, Huntsville, AL Department: Architecture & Engineering Employment Type: Full-Time Permanent Reports To: Chief Architect Overview We are seeking a highly skilled and forward-thinking Network Cybersecurity Architect to lead the design, evolution, and governance of secure network architectures across our enterprise and cloud environments. This is a strategic and hands … on role at the intersection of network engineering, cybersecurity, automation, and cloud-native design. You will work cross-functionally to embed robust, scalable, and secure networking into our hybrid digital landscape-helping to modernize how our organization protects users, systems, and data. As a champion of Zero Trust, Agile delivery, and security automation, you'll drive best-in-class security … Ensure designs align with enterprise security policies, compliance requirements (e.g., NIST, ISO 27001, PCI-DSS), and architecture governance standards. Key Skills & Experience • 8+ years of experience in network security, cybersecurity architecture, or network engineering-including 3+ years in a design or architecture-focused role. • Advanced knowledge of network protocols, routing/switching, encryption, segmentation, and identity-aware access. • Hands-on More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
performing in-depth analysis, assessment, and response to security threats by following documented policies to meet Service Level Goals. The team provides global 24x7 security operations and monitoring for cybersecurity events affecting Experian. You will be a part of the first line of defence in Experian's broader incident response and incident management departments, responsible for receiving and prioritizing cybersecurity … people across 32 countries. Our corporate headquarters are in Dublin, Ireland. Learn more at Experience and Skills Some information security experience working within a Security Operations Center or CyberSecurity Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH … GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and other cybersecurity frameworks. High-level understanding of common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs), and common industry recommendations to prevent and respond to threats such as phishing, malware, network attacks, suspicious activity More ❯
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Newbury, Berkshire, United Kingdom Hybrid / WFH Options
Newbury Building Society
problem-solving skills to identify and assess risks, threats, patterns, and trends. Highly organised, with the ability to work effectively under pressure to meet deadlines. An understanding of the cybersecurity risks associated with various technologies and ways to manage them. In-depth experience of managing hosted and on-premises services and infrastructure, including network, perimeter security, hosting architecture and … cloud services. Good knowledge of Microsoft 365 Defender, Active Directory and Microsoft 365. Knowledge of IT and cybersecurity principles and best practice. Desirable skills and experience: Experience of as a Security Analyst within a multi-site environment CyberSecurity qualification Experience of Azure and AWS Microsoft Certified Professional: - Windows Server - Microsoft 365 - Security Why work for Newbury Building Society More ❯
Freelancer Opportunity Description: Senior Information Security Officer Are you passionate about AI or cybersecurity? You love working with high profile teams with a sure taste for challenge and variety? You dream to join a fast-growing company with start-up mentality? Eager to learn continuously? Join Proximus Ada! Within this Proximus' newly created centre of excellence for AI and Cybersecurity … assist with the overall reinforcement of their security posture. Help them in maintaining their ISO27001 certification or in preparing for an ISO 27001 certification and achieving NIS2 compliance. Perform cybersecurity assessments (NIS2, ISO27001, security maturity, risk) to identify gaps in the security program, define a baseline, As-Is state, to-be desired state and establish a roadmap. Create information security … requests for the products that Proximus offers to its customers by completing security questionnaires within established SLA. Your Profile: Bachelor's bachelor's or a master's degree in cybersecurity or computer science. 5+ years of experience in a combination of audit, risk management, information security and IT jobs. Knowledge of information security management frameworks, such as ISO More ❯