processes and activities Support the Head of Security and Infrastructure across all functional areas within the security department Liaise with with our Privacy, Governance, Infrastructure, IT Operations, and Product / Engineering teams on all security matters Ensure tools are running correctly Ensure the integrity of our data Investigate Events of Interest (EoIs) Act upon alerts Continuous learning development Documentation … demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP / IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetration testing, Threat Hunting, Red Teaming methodologies Familiarity with More ❯
to address specific client needs. Collaborate with clients to design and implement risk mitigation strategies and incident response plans. Provide expert guidance to clients on frameworks (GDPR, NIST, ISO, HIPAA) and related strategies, with a focus on cyber security. Conduct thorough assessments … of clients' existing security programs, identifying gaps and vulnerabilities. Develop and implement effective framework policies, procedures, and standards that align with clients' goals and industry best practices. Conduct tabletops / workshops with clients discussing information security best practices, incident response, and the threat landscape. Advise clients on compliance requirements, such as GDPR, HIPAA, NIST, ISO27001More ❯
equivalent experience). Relevant certifications (e.g., CCNA, CCNP, CISSP, etc.) are highly desirable. Technical Skills: Strong experience with Windows and enterprise level Linux systems. Proficiency in networking protocols (TCP / IP, DNS, DHCP, etc.) and network security practices. Hands-on experience with firewalls, IDS / IPS, and VPN configurations. Experience with virtualization (VMware, Hyper-V, etc.). Familiarity … with various security tool sets such as SIEM solutions, DLP, Endpoint Protection. Experience implementing disaster recovery and business continuity plans. Familiarity with compliance and security frameworks (NIST, ISO27001, etc). Knowledge of zero-trust architecture and secure remote access solutions. Soft Skills: Strong analytical and troubleshooting skills. Excellent communication and collaboration abilities. Ability to prioritize … DefStan, NATO) would be advantageous. Candidates must be UK Nationals with a bility to satisfy Security Clearance requirements. Candidates should also have the flexibility to participate in the 24 / 7 On Call Support rota for our UK customer, which usually necessitates being available to provide remote assistance 2 weeks in every month. Equal Opportunity Employer Flatirons Solutions is More ❯
meantime! We are a friendly bunch and pride ourselves in having a strong culture and adhering to our values of resourcefulness, ambition, thoughtfulness and integrity. We really value work / life balance and we embrace a flat hierarchy structure company-wide. Join us and you'll learn fast about cutting-edge tech and work with some of the brightest … resolution of priority issues. Maintain a robust cyber incident response plan, including coordinating necessary responses to incidents and security investigations. Requirements Extensive practical experience implementing and maintaining an ISO27001 compliant ISMS. Demonstrable experience with PCI DSS compliance, including preparing for and undergoing assessments. Familiarity with information security frameworks (e.g., NIST, CIS). Proficiency in risk More ❯
closely with development, operations, and executive teams to ensure security practices are understood and implemented across the organization. Compliance: Ensure security architectures comply with regulations such as GDPR, ISO27001, NIST, and other relevant standards. Requirements Education: Bachelor's degree in Computer Science, Information Security, or a related field; Master's degree preferred. Experience: At least More ❯
Sun Prairie, Wisconsin, United States Hybrid / WFH Options
QBE Insurance
to data protection, risk management, and regulatory standards. Qualifications: Necessary Qualifications include: Solid understanding of security protocols, cryptography, authentication, and authorization. Familiar with industry-recognized frameworks such as ISO27001 and NIST Cybersecurity Framework (CSF). Adept at communicating and enforcing security measures across diverse teams and stakeholders. Broad technical knowledge across security, networking, web applications More ❯
information security, with a focus on network security and architecture. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security frameworks and standards (e.g., NIST, ISO27001). Excellent communication and leadership skills. Relevant certifications such as CISSP, CISM, or TOGAF are highly desirable. Previous job roles that may indicate success include Information … practices. Understanding of protocol analysis techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS / IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle … clustering / High Availability technologies, and secure administrative practices. More ❯
designing, implementing, and maintaining highly scalable and resilient cloud infrastructure to support our trading operations. The ideal candidate will have a strong background in cloud computing, automation, and CI / CD pipelines, ensuring high availability and performance for mission-critical systems. Key Responsibilities Cloud Infrastructure Management: Design, deploy, and maintain scalable and resilient infrastructure on AWS using Infrastructure-as … Code (IaC). Kubernetes Administration: Manage and optimize Kubernetes clusters for containerized applications, ensuring high availability and security. Automation & CI / CD: Implement and manage CI / CD pipelines for efficient deployment, testing, and monitoring of applications. Observability & Monitoring: Develop comprehensive monitoring solutions using Prometheus, Grafana, ELK stack, or similar tools to improve system reliability. Security & Compliance: Apply … Familiarity with monitoring, logging, and observability tools (Prometheus, Grafana, Datadog, ELK, etc.). Strong understanding of networking concepts (VPC, Load Balancers, DNS, Firewalls). Experience with DevOps methodologies, CI / CD pipelines, and GitOps practices. Experience with high-performance and low-latency (sub millisecond) systems. Familiarity with serverless architectures and event-driven computing. Exposure to cloud cost optimization and More ❯
expertise with monitoring and securing enterprise class technology estates. You will have proven experience with Cyber Security best practice including the NIST Cloud Security guidelines. You will support ISO27001 … compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK Telecom Security Act would be advantageous to your application, as would CISSP and / or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and More ❯
in a Security Operations Centre (SOC) environment, managing high volumes of incidents. Deep technical expertise in Microsoft security tools and solutions, including but not limited to Microsoft Defender, E5 / A5, Sentinel, and Azure Security. Strong analytical and problem-solving skills, with the ability to make sound decisions under pressure. Demonstrated experience in incident detection, triage, containment, and remediation. … such as NIST, ISO27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM / SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Identity Fundamentals) a plus. More ❯
and functions; enabling organizations to more quickly and widely adopt emerging technologies while ensuring the integrity of their intellectual property; information flow during disaster response scenarios, and zero-trust / least-privilege environments for M&A, attorney-client privileged communications, etc. And we've only scratched the surface. At our core, we're driven by a shared mission and … and the ability to gracefully handle node failures. • Guarantee 99.9% uptime for the platform's control plane and deployment management. Design and implement a disaster recovery plan with active / passive deployments and seamless failover capabilities. • Architect and implement a highly available deployment setup for applications within the Acra platform. This will involve designing and building the infrastructure and … Bash, Python. •Deep experience with Kubernetes security: RBAC, PodSecurityPolicies (or their replacements), Admission Controllers and Kubernetes network policies. •Proficiency in secure networking practices, including TLS, mutual TLS (mTLS), ingress / egress controls and VPN tunneling configurations. •Proven experience operating and securing service mesh technologies (e.g. Istio, Linkerd, or Consul Connect). •Hands on experience with HashiCorp Vault in production More ❯
Senior Backend Engineer at Kiln, you will join our Software Team, composed of 14 engineers (Backend, Frontend, QA) split into 3 squads, to build the future of our SaaS / API-first products . You will report to our Head of Software, and collaborate with the Product, Infrastructure and Smart-Contract teams to work on the various products that … to architectural decisions and technical strategy. Develop and implement software features in our Golang services (data aggregators, APIs, Blockchain Transaction crafting, ). Take part in automation, testing, and CI / CD processes. Participate in code review, bug fixing, code maintenance. Ensure that our services communicate with each other seamlessly, have minimal downtime, and recover quickly. Make sure we respect … day 2Tb of staking data available through our Kiln Connect API Requirements +6 years of experience as Software Engineer (Backend) , designing, building, and deploying user-facing, infrastructure-related, and / or API-based products. +3 years of Golang programming - professional experience in a production environment. Familiar with container / orchestrator technologies (Docker / Kubernetes), and Continuous Integration. More ❯
Cyber Security Specialist ** Location: London / Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a Cyber Security Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work … and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g., ISO27001, NIST, CIS). Knowledge of security technologies such as firewalls and web proxies; experience with ZTNA, CTI, and threat modelling is beneficial. Excellent communication and interpersonal More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
Cyber Security Specialist ** Location: London / Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a Cyber Security Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work … and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g., ISO27001, NIST, CIS). Knowledge of security technologies such as firewalls and web proxies; experience with ZTNA, CTI, and threat modelling is beneficial. Excellent communication and interpersonal More ❯
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to keep pace with the continually evolving threat landscape, in support of A&O Shearmans strategy to lead where global complexity creates opportunity. In addition, you More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
Azure Cloud Security Architect – £700 / day – Outside IR35 – Hybrid (Cardiff) We’re working with a major organisation undergoing a large-scale Azure transformation. They’re seeking a Cloud Security Architect with deep Azure expertise to lead the design and implementation of secure cloud solutions. Key Details: Location: Cardiff (Hybrid – 2 days / week on-site) Rate: Up … to £700 / day IR35 Status: Outside IR35 Contract Length: 6 months (strong extension potential) Start Date: ASAP Role Overview: As the Azure Cloud Security Architect, you’ll play a critical role in shaping the organisation’s cloud security posture. You’ll work across architecture, engineering, and compliance teams to ensure secure-by-design principles are embedded throughout the … Key Responsibilities: Design and implement secure Azure cloud architectures Lead threat modelling, risk assessments, and security reviews Define and enforce cloud security policies and governance Integrate security into CI / CD pipelines and DevOps practices Provide guidance on Azure-native security tools (e.g., Defender for Cloud, Sentinel, Key Vault, Azure Policy) Support zero trust and identity-based security models More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
data platforms. Perform threat modelling, architecture reviews, and propose mitigation strategies. Ensure alignment with European regulatory standards (e.g., GDPR, PSD2, DORA, NIS2). Embed DevSecOps into SDLC and CI / CD pipelines using IaC and automation tools. Drive adoption of Zero Trust principles, secure APIs, container security, and logging strategies. What Were Looking For 15+ years in Information Security … years of hands-on cloud security experience (AWS, Azure, or GCP multi-cloud preferred). In-depth understanding of financial services compliance requirements and frameworks (e.g., NIST CSF, ISO27001, CSA CCM, PCI DSS). Expert-level knowledge of IAM, network security, encryption, API and application security, container security, and SIEM strategies. Proven leadership in DevSecOps More ❯
performance, and capacity planning through robust monitoring and proactive incident management. • Cybersecurity & Compliance • Collaborate with InfoSec to ensure comprehensive threat management, data protection, and regulatory compliance (e.g., GDPR, ISO27001). • Embed security by design across all IT and video platforms. • Service Delivery & Support • Lead global IT support and service delivery teams with a focus on … process discipline. • Cloud & Digital Transformation • Drive cloud modernization strategies across AWS, Oracle Cloud, and related platforms to support digital innovation and scale. • Champion DevOps, infrastructure-as-code, and CI / CD practices to accelerate delivery and improve quality. • Vendor & Financial Management • Manage enterprise vendor relationships and large-scale contracts across IT and video infrastructure providers. • Own the global IT More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Inspire People
engineers and contribute to the development of the security profession. Skills and experience It is essential that you have: Proven experience in cloud cyber security engineering in a SecOps / Security environment Ability to lead technical teams and influence senior stakeholders. Expertise in Log management. Experience working in a DevOps environment and following DevOps practices. A good working knowledge … etc) network security, and secure software development. Incident management and alerts triage experience Experience in Microsoft Sentinel Strong understanding of security principles, technologies, and frameworks (e.g., NCSC guidance, ISO27001, NIST). It is desirable that you have: Experience working with Django framework Good working knowledge of Query Languages (SQL, KQL (Kusto), etc.) How to apply More ❯
testing, and provide detailed assessments of proposed solutions. Foster collaboration with cross-functional teams to ensure security integration and architectural alignment. Partner with infrastructure, application, network, and business architects / engineers to ensure compliance with GCIS security standards and policies. Support security governance activities and contribute to risk mitigation initiatives. Occasionally assist with hands-on security configurations for commercial … on experience with industry-leading security tools across network, data, application, and cloud domains. Solid understanding and practical experience with compliance and security frameworks such as NIST CSF, ISO27001, CSA CCM, PCI-DSS, GDPR. Familiarity with enterprise architecture frameworks such as TOGAF. Experience 5 to 10+ years of experience in cybersecurity. Demonstrated experience creating reference More ❯
more about this opportunity, feel free to reach out and apply today! Responsibilities: Lead full-scope, threat intelligence-led penetration testing across applications, infrastructure, cloud (AWS, Azure), APIs, OT / ICS, and O365. Develop sophisticated test plans and use cases based on emerging threats and attacker TTPs. Produce detailed, high-impact reports with clear technical findings and business-aligned … in threat-informed testing methodologies. Required Skills: 5+ years of professional experience in penetration testing, with a strong emphasis on threat intel and adversary emulation. Deep understanding of OT / IT systems, common vulnerabilities, network protocols, cryptography, and attack vectors. Proficiency in tools and frameworks used in both offensive security and threat intelligence. Proven ability to scope, manage, and … deliver complex engagements with excellent communication across technical and non-technical stakeholders. CREST CRT / CHECK (or higher) certification is essential. Must hold or be eligible for SC Clearance. Desirable Skills: Experience with Breach Attack Simulation tools and vulnerability management processes. Familiarity with ISO27001, risk management frameworks, and compliance-oriented testing. Hands-on knowledge More ❯