This is an excellent opportunity to join a world-class Cybersecurity organization. As a Senior Product Security Architect in the Cybersecurity & Technology Controls (CTC) team for the International Consumer, you will work proactively with your technology and business colleagues to identify and quantify security issues within their business and empower them to take decisive risk decisions at speed and scale. … expert with a strong mix of technical and communication skills and are passionate about enabling safe and secure innovation. You will work with some of the best and brightest cybersecurity and technology engineers to solve complex problems, which will both challenge you and help you develop your skills in one of the most innovative and respected companies in the world. … self-motivated to learn all about them, applying critical thinking to identify hidden issues along the way. Be your product's security thought leader. Learn from your product and cybersecurity teams and share best practice in both directions. Be recognized in your product as the clear point of escalation and subject matter expert for IT Risk and Cyber domains. Act More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
Junior Cybersecurity Consultant Milton Keynes, UK Full-Time, Permanent £30,000 - £32,000 per annum We’re recruiting on behalf of a leading cybersecurity client who is looking for a Cybersecurity Consultant to join their UK team. This is a hands-on, client-facing role where you'll help businesses improve their cyber defences—especially in areas like DDoS protection … WAAP). You’ll receive full training in DDoS mitigation and WAAP technologies, making this a great opportunity to develop your skills in a fast-growing area. Responsibilities: Conduct cybersecurity audits, simulations, and assessments Develop clear and practical recommendations for clients Deliver training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date More ❯
the communities in which we work and live. It is personal to all of us." - Julie Sweet, Accenture CEO In our team you will learn: You will have a CyberSecurity background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. As a Cyber Threat Analyst you will … threats within client environments highlighting any identified risks Collaborate with security detection engineers to design and implement customised detection alerts Provide threat-related input and investigation support during relevant cybersecurity incidents Deliver detailed threat reporting including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM … tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly Commitment to staying abreast of emerging threats, technologies, and methodologies in cybersecurity Creative and resourceful in finding solutions More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
R3vamp Limited
left” initiatives Acting as the go-to expert on Microsoft Entra ID and Active Directory What You’ll Bring Proven leadership experience in Security Operations, Identity & Access Management or Cybersecurity Strong hands-on knowledge of Microsoft Entra ID and Active Directory Experience managing or shaping a technical team Deep understanding of threat detection, incident response and security best practices A More ❯
of the function however you see fit, in line with business need. We are an ambitious bunch at Risk Ledger, always learning and pushing boundaries to change the way cybersecurity is managed in the supply chain. Our own internal security is pivotal to this. We won’t compromise and don’t expect you to either. We’re looking for … more years experience as a qualified Head (or Deputy Head) of Information Security role, seasoned with scale-up organisation challenges. {CISSP, CISM} Has solid experience of assuring compliance with cybersecurity and data protection regulations within the UK and globally (e.g. GDPR, NIS Directive, EBA Guidelines). Has a comprehensive understanding of what it takes to comply with cybersecurity … industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working with colleagues to define More ❯
of the function however you see fit, in line with business need. We are an ambitious bunch at Risk Ledger, always learning and pushing boundaries to change the way cybersecurity is managed in the supply chain. Our own internal security is pivotal to this. We won't compromise and don't expect you to either. We're looking for … more years experience as a qualified Head (or Deputy Head) of Information Security role, seasoned with scale-up organisation challenges. CISSP, CISM Has solid experience of assuring compliance with cybersecurity and data protection regulations within the UK and globally (e.g. GDPR, NIS Directive, EBA Guidelines). Has a comprehensive understanding of what it takes to comply with cybersecurity … industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working with colleagues to define More ❯
Wandsworth, Greater London, UK Hybrid / WFH Options
Risk Ledger Ltd
of the function however you see fit, in line with business need. We are an ambitious bunch at Risk Ledger, always learning and pushing boundaries to change the way cybersecurity is managed in the supply chain. Our own internal security is pivotal to this. We won’t compromise and don’t expect you to either. We’re looking for … more years experience as a qualified Head (or Deputy Head) of Information Security role, seasoned with scale-up organisation challenges. {CISSP, CISM} Has solid experience of assuring compliance with cybersecurity and data protection regulations within the UK and globally (e.g. GDPR, NIS Directive, EBA Guidelines). Has a comprehensive understanding of what it takes to comply with cybersecurity … industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls that make a real difference. Has proven ability to enable a business to move fast, working with colleagues to define More ❯
Our Client is seeking an experienced Head of Information Security to lead the InfoSec function across their UK and European operations. This is a leadership role that combines deep cybersecurity expertise, regulatory awareness, and business acumen to drive the security agenda in a fast-paced, regulated financial services environment. As the Head of Information Security, you'll be the primary More ❯
Our Client is seeking an experienced Head of Information Security to lead the InfoSec function across their UK and European operations. This is a leadership role that combines deep cybersecurity expertise, regulatory awareness, and business acumen to drive the security agenda in a fast-paced, regulated financial services environment. As the Head of Information Security, you'll be the primary More ❯
non-rational Hadoop Some other highly valued skills may include: Advanced knowledge of malicious attack vectors used by cyber fraud adversaries Knowledge of Enterprise security frameworks such as NIST Cybersecurity Framework and Cyber-attack phases Previous advanced experience using analytical tools and platforms such as SQL/SAS/Hue/Hive Basic, Quantexa, Elastic Search, SAS and MI tools … protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cybersecurity incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cybersecurity threats, attack techniques and technologies to detect/prevent incidents … security logs, events and alerts/potential threats. Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. Management of cybersecurity incidents including remediation & driving to closure. Assistant Vice President Expectations To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness. Collaborate closely with More ❯
non-rational Hadoop Some other highly valued skills may include: Advanced knowledge of malicious attack vectors used by cyber fraud adversaries Knowledge of Enterprise security frameworks such as NIST Cybersecurity Framework and Cyber-attack phases Previous advanced experience using analytical tools and platforms such as SQL/SAS/Hue/Hive Basic, Quantexa, Elastic Search, SAS and MI tools … protect the bank from potential cyber-attacks and respond to threats. Accountabilities Management of security monitoring systems, including intrusive prevention and detection systems, to alert, detect and block potential cybersecurity incidents, and provide a prompt response to restore normal operations with minimised system damage. Identification of emerging cybersecurity threats, attack techniques and technologies to detect/prevent incidents … security logs, events and alerts/potential threats. Triage of data loss prevention alerts to identify and prevent sensitive data for being exfiltrated from the banks network. Management of cybersecurity incidents including remediation & driving to closure. Assistant Vice President Expectations To advise and influence decision making, contribute to policy development and take responsibility for operational effectiveness. Collaborate closely with More ❯
and briefings in high-visibility environments • Strong leadership in collaborating across multidisciplinary, classified development teams Preferred: • Experience mentoring development teams and guiding architecture-level decisions • Familiarity with classified systems, cybersecurity best practices, and offensive tool development • Knowledge of agile software development within national security or DoD programs Bonus: Ability to shape the future of cyber operations by leading the development More ❯
/SCI) Clearance with a Polygraph. B4Corp is seeking a motivated, career and customer-oriented Cloud Security Engineer to join our team in Herndon, VA. Join a team of cybersecurity experts that protects and defends the largest target in the world. As a Cloud Security Engineer on our team, you will utilize the latest tools available and assist in creating … Expert Salary: Up to $195,000.00 per year Core Hours: 9am to 4pm Location: McLean VA Mandatory Requirements: • High School Diploma and 15+ years of experience in cloud or cybersecurity or Bachelor's degree and 11+ years of experience • 5+ years of experience in cyber incident response • 3+ years' experience architecting, engineering, implementing, or securing solutions within Google Cloud More ❯
Job Description Job Purpose The ICE Cybersecurity Digital Forensics and Incident Response (DFIR) team is responsible for defending critical financial infrastructure from Global Cyber threats. We leverage an evolving arsenal of controls that require technical proficiency as well as tenacity, professionalism, and strong communication skills. Responsibilities Security Analytics - Efficiently distill actionable information from large data sets for reporting, hunting, and More ❯
of Information Security' or Senior Information Security Management role. Leading teams and enterprise risk remediation programmes. Designing and delivering enterprise Information Security risk remediation programmes. Designing and delivering enterprise Cybersecurity risk remediation programmes. Ability to read, understand and analyse regulatory information, 'good practice' and develop Information Security strategies and programs. Strong written and verbal communication skills, especially the ability to More ❯
Top Secret/SCI clearance with eligibility for a p olygraph Certification: CompTIA Security+ ce , GIAC Security Essentials (GSEC), or Systems Security Certified Practitioner (SSCP) Meets Cyber IT/Cybersecurity Workforce (CSWF) System Administrator (451) Intermediate Level requirements PREFERRED QUALIFICATIONS Experience with IT technologies such as Cisco, Nutanix, VMware, Splunk, Trellix , Ivanti, ACAS, or Rapid7 Knowledge of ServiceNow functionality and More ❯
Overview: We are seeking a highly skilled and experienced Senior Arista Network Engineer to support PEO Digital Network Modernization efforts. This role will be pivotal in establishing operational and cybersecurity resiliency, optimizing cloud services health, and enhancing the overall end-user experience across critical Navy networks. The Senior Arista Network Engineer will architect, design, deploy, maintain, and operate a modernized … environments, particularly with Navy and Department of Defense (DoD) networks Why Join Us? You'll play a critical role in modernizing the Navy's network infrastructure, ensuring mission resilience, cybersecurity, and seamless cloud integration for the PEO Digital Network Modernization initiative. Your contributions will directly impact the Navy's ability to operate in a highly contested environment, ensuring continuous operations More ❯
articulate new idea and concepts to technical and nontechnical audiences as well as senior-level executives. The position shall meet the minimum credential requirements for a Cyber IT/Cybersecurity Workforce (CSWF) position as defined in Section 6, Table 3. System Administrator (451); Intermediate Level for SECNAV M-5239.2 compliance. (See Navy Cool WebSite). Education: Bachelor's degree from More ❯
Transfer Solutions and Access Solutions Required Qualifications • Active TS/SCI • Bachelor's degree in computer science, Information Assurance, Systems Engineering, or related field • 10+ years of experience in cybersecurity, system architecture, or secure communications with at least 5+ years in CDS design and implementation • Demonstrated leadership in delivering accredited CDS solutions within IC, DoD, or Federal Civilian mission environments More ❯
and talent in data visualization. Extensive experience creating workflows for Incident Response within a SIEM Tool. Security+ Certification. GIAC Certified Incident Handler Certification/GIAC Cyber Threat Intelligence Certification. Cybersecurity certifications. Formal SIEM training. Experience working on an Agile team/program. More ❯
supports the Distributed Common Ground System (DCGS) and STATEFARM programs by leading the development, editing, and oversight of a wide range of technical documentation critical to systems integration, engineering, cybersecurity, and lifecycle sustainment. This position ensures that all documentation meets Air Force (C3IA and local unit) directives, federal standards, and applicable security classification and labeling guidelines. Operating under the direction … of program leadership, the Technical Compliance Manager works collaboratively with engineers, imagery analysts, system integrators, and cybersecurity professionals to produce user-friendly, compliant documentation. This includes technical manuals, installation guides, reports, procedures, and Standard Operating Procedures (SOPs). The manager plays a key role in quality assurance, classification review, and version control across all program documentation efforts, and supports staff … by maintaining consistency of technical style, terminology, and process adherence. ESSENTIAL JOB FUNCTIONS Develop, edit, and maintain documentation related to engineering, system operations, cybersecurity, installation, and maintenance processes. Ensure compliance with documentation standards outlined in DoDM 5200.01 Vol 2, DoD 5400.7-R, AFI 16-1404, ICD 710, JDCSISSS 6.3.7, CAPCO, and related information security policies. Collaborate with technical staff to More ❯
real time ️ Collaborating with cross-functional teams to ensure security best practices are integrated throughout the development and deployment processes What We're Looking For: ️ Proven experience as a Cybersecurity Engineer or in a similar cybersecurity role ️ Strong knowledge of network protocols, encryption techniques, and security technologies (e.g., firewalls, IDS/IPS, VPNs, SIEM) ️ Experience with cloud security and hybrid More ❯
on approach to vendor relationship management. Youll have strong knowledge and experience of the following: Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) NIST Cybersecurity Framework (CSF) Critical Security Controls (CIS) Cyber Essential Plus (CEP) With proven experience in managing and delivering complex Security Operations activities within a fast-paced and dynamic security domain, youll More ❯
organization's information security strategy, policies, and programs ️ Overseeing the implementation of risk management practices and ensuring compliance with industry regulations (e.g., GDPR, ISO 27001) ️ Managing and mentoring the cybersecurity team to strengthen the organization's security posture ️ Collaborating with cross-functional teams to align security initiatives with overall business objectives ️ Reporting directly to the board and executive leadership on … the state of cybersecurity and potential risks What We're Looking For: ️ Proven experience as a CISO or in a senior cybersecurity leadership role ️ Extensive knowledge of information security frameworks, governance, and compliance standards ️ Strong experience in risk management, incident response, and disaster recovery planning ️ Ability to communicate complex security concepts to non-technical stakeholders ️ Relevant certifications such as CISSP More ❯
feel supported in the workplace and at home, there's nothing we can't achieve. BASIC QUALIFICATIONS - 4+ years experience working in areas related to security assurance, such as cybersecurity, auditing, security architecture, regulatory affairs or public sector agencies involved in cybersecurity management. - Experience working with governance, risk and compliance programs that directly involve interaction with regulatory bodies. - Proficient … with government security frameworks, policies and standards (e.g. PSPF, ISM, DSPF. ASD Essential Eight) - Experience working with cloud technologies. PREFERRED QUALIFICATIONS - Degree or equivalent experience in (Computer Science, Engineering, CyberSecurity, IT Security Management, Security Risk Management)a related security field - Minimum 4 years experience in implementing and operationalising security to meet business outcomes - Proven ability to not only influence More ❯