word for our reliability, security and professionalism (or even the many kind words from our clients), etiCloud is part of the elite top 1% of worldwide business with ISO accreditation. Our ISO27001 accreditation relates to our defined and implemented best-practice information security processes. So you can be sure that your data, and … that of your clients, is secure. We're equally proud of our ISO 9001 accreditation as an integral part of it is customer satisfaction. It demonstrates our commitment to our customer-led approach - one of the reasons we've built, and continue to build, our business on referrals. More ❯
to reduce risk to an acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn GRC tools and best practices. RSA Archer is preferred. Financial and / or Banking industry experience preferred. Ideally qualified in MSc Information Security, CICA, CRISC, CISM and / or Data analysis beneficial but not essential if experience validates skills. Knowledge … of security frameworks (e.g., NIST CSF, ISO27001, SOC1,2). Prince 2, MSP, APMQ advantageous. A desire to continue learning and developing security skills and qualifications If the above role is of interest please apply to this advertisement or call me on or email me directly on Robert Walters Operations Limited is an employment business … per annum Workplace Type: Hybrid Experience Level: Mid Management Location: London FULL_TIME Job Reference: BXLXWS-90F5FB78 Date posted: 24 June 2025 Consultant: Darius Goodarzi london information-technology / information-security 2025-06 08-23 banking London London GB GBP YEAR Robert Walters true More ❯
land major enterprise customers. This isn't your typical security role. We're looking for someone who can code first, audit later & are able to dive into our NodeJS / React stack, help teams ship secure-by-design features, and implement pragmatic security improvements across our application codebase, tooling and cloud infrastructure. You'll work closely with Engineering, Product … risks early. • Partner with Engineering Leads and our CPTO to assess new threats, handle incidents, and continuously improve our posture. • Support customer security reviews, RFPs, and external audits (SOC2, ISO27001, etc). • Design and tune WAF rules, bot protections, and layered defenses to mitigate real-world attacks. • Improve the security of our cloud infrastructure (AWS), IAM policies, and container configurations. … monitor, and when to say no. • Experience with WAFs, IAM, and infrastructure-layer security (e.g., network, container, or runtime protections). Nice-to-haves • Experience with SOC2 /ISO27001, Vanta, or security questionnaires for enterprise customers. • Familiarity with identity & access management (SSO, SCIM, RBAC), secure frontend patterns, and data encryption at rest / in transit. • Incident response experience More ❯
to address specific client needs. Collaborate with clients to design and implement risk mitigation strategies and incident response plans. Provide expert guidance to clients on frameworks (GDPR, NIST, ISO, HIPAA) and related strategies, with a focus on cyber security. Conduct thorough assessments … of clients' existing security programs, identifying gaps and vulnerabilities. Develop and implement effective framework policies, procedures, and standards that align with clients' goals and industry best practices. Conduct tabletops / workshops with clients discussing information security best practices, incident response, and the threat landscape. Advise clients on compliance requirements, such as GDPR, HIPAA, NIST, ISO27001More ❯
Senior Backend Engineer at Kiln, you will join our Software Team, composed of 14 engineers (Backend, Frontend, QA) split into 3 squads, to build the future of our SaaS / API-first products . You will report to our Head of Software, and collaborate with the Product, Infrastructure and Smart-Contract teams to work on the various products that … to architectural decisions and technical strategy. Develop and implement software features in our Golang services (data aggregators, APIs, Blockchain Transaction crafting, ). Take part in automation, testing, and CI / CD processes. Participate in code review, bug fixing, code maintenance. Ensure that our services communicate with each other seamlessly, have minimal downtime, and recover quickly. Make sure we respect … day 2Tb of staking data available through our Kiln Connect API Requirements +6 years of experience as Software Engineer (Backend) , designing, building, and deploying user-facing, infrastructure-related, and / or API-based products. +3 years of Golang programming - professional experience in a production environment. Familiar with container / orchestrator technologies (Docker / Kubernetes), and Continuous Integration. More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Halian Technology Limited
threat detection, vulnerability management, and incident response Lead threat modelling and risk assessments for critical systems and services Collaborate with engineering teams to integrate security best practices into CI / CD pipelines Monitor and respond to security incidents, coordinating investigation and remediation efforts Drive security automation and infrastructure-as-code initiatives Support compliance efforts (ISO27001 … understanding of networking, identity & access management, and encryption technologies Hands-on experience with tools like Terraform, Kubernetes, SIEM platforms, and security scanners Familiarity with DevSecOps practices and modern CI / CD pipelines Strong scripting or coding skills (e.g., Python, Bash, or PowerShell) Excellent problem-solving, communication, and stakeholder engagement skills Nice to Have Security certifications (e.g., CISSP, AWS Security More ❯
equivalent experience). Relevant certifications (e.g., CCNA, CCNP, CISSP, etc.) are highly desirable. Technical Skills: Strong experience with Windows and enterprise level Linux systems. Proficiency in networking protocols (TCP / IP, DNS, DHCP, etc.) and network security practices. Hands-on experience with firewalls, IDS / IPS, and VPN configurations. Experience with virtualization (VMware, Hyper-V, etc.). Familiarity … with various security tool sets such as SIEM solutions, DLP, Endpoint Protection. Experience implementing disaster recovery and business continuity plans. Familiarity with compliance and security frameworks (NIST, ISO27001, etc). Knowledge of zero-trust architecture and secure remote access solutions. Soft Skills: Strong analytical and troubleshooting skills. Excellent communication and collaboration abilities. Ability to prioritize … DefStan, NATO) would be advantageous. Candidates must be UK Nationals with a bility to satisfy Security Clearance requirements. Candidates should also have the flexibility to participate in the 24 / 7 On Call Support rota for our UK customer, which usually necessitates being available to provide remote assistance 2 weeks in every month. Equal Opportunity Employer Flatirons Solutions is More ❯
client's risk profile and operational needs. Guide clients in developing and improving their incident response processes, including playbook creation and alignment with security frameworks like NIST and ISO 27001. Regularly review and optimise SIEM configurations to reduce false positives, improve detection accuracy, and adapt to evolving threat landscapes. Advisory & Compliance: Advise clients on aligning SIEM deployments with … of experience in SIEM consulting, SOC, or security operations roles with a focus on threat detection and response. Strong understanding of threat detection methodologies, security frameworks (e.g., NIST, ISO27001), and compliance requirements. Experience with SIEM design and architecture, data ingestion, log management, and custom dashboard creation. Familiarity with cloud-native security solutions and knowledge of More ❯
CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
closely with development, operations, and executive teams to ensure security practices are understood and implemented across the organization. Compliance: Ensure security architectures comply with regulations such as GDPR, ISO27001, NIST, and other relevant standards. Requirements Education: Bachelor's degree in Computer Science, Information Security, or a related field; Master's degree preferred. Experience: At least More ❯
post-incident reviews and recommend improvements. Forensic Analysis Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration Partner with IT … What We re Looking For IT Expertise Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge Deep understanding of VPNs, network protocols, and security architecture. Incident Management Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management Experience managing security projects and working with cross-functional teams. Certifications Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
post-incident reviews and recommend improvements. Forensic Analysis - Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools - Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation - Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration - Partner with IT … What We’re Looking For IT Expertise - Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency - Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge - Deep understanding of VPNs, network protocols, and security architecture. Incident Management - Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management - Experience managing security projects and working with cross-functional teams. Certifications - Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
post-incident reviews and recommend improvements. Forensic Analysis – Investigate incidents, perform root cause analysis, preserve digital evidence, and produce forensic reports. Security Tools – Manage tools such as firewalls, IDS / IPS systems, and endpoint protection solutions; evaluate and recommend new technologies. Documentation – Maintain detailed logs and reports of incidents, assessments, and analyses for internal stakeholders. Collaboration – Partner with IT … What We’re Looking For IT Expertise – Strong knowledge of IT infrastructure, especially cloud platforms; AWS experience preferred. Security Tools Proficiency – Hands-on experience with Palo Alto firewalls, IDS / IPS, and endpoint protection. Network Security Knowledge – Deep understanding of VPNs, network protocols, and security architecture. Incident Management – Proven ability to detect, analyse, and resolve security threats and malware. … both technical and non-technical stakeholders. Project Management – Experience managing security projects and working with cross-functional teams. Certifications – Relevant qualifications such as CEH, CCSP, CompTIA Security+, or AWS / Azure certs are highly desirable. This fantastic role come with a highly competitive salary which is reviewed annually, and comes with an excellent benefits package which includes a More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum + 10% Bonus and Excellent Benefits
information security, with a focus on network security and architecture. Strong knowledge of malicious lateral movement techniques and mitigation strategies. Experience with security frameworks and standards (e.g., NIST, ISO27001). Excellent communication and leadership skills. Relevant certifications such as CISSP, CISM, or TOGAF are highly desirable. Previous job roles that may indicate success include Information … practices. Understanding of protocol analysis techniques. Experience with Azure Log Analytics, KQL, and Azure Alerts. Python, Shell, and PowerShell scripting. Experience with security tools and technologies (e.g., SIEM, IDS / IPS, NG Firewall capabilities, vulnerability scanners). Knowledge of Active Directory and Azure AD. Knowledge of application delivery and the infrastructures that enable it. Familiarity with SQL Server, Oracle … clustering / High Availability technologies, and secure administrative practices. More ❯
designing, implementing, and maintaining highly scalable and resilient cloud infrastructure to support our trading operations. The ideal candidate will have a strong background in cloud computing, automation, and CI / CD pipelines, ensuring high availability and performance for mission-critical systems. Key Responsibilities Cloud Infrastructure Management: Design, deploy, and maintain scalable and resilient infrastructure on AWS using Infrastructure-as … Code (IaC). Kubernetes Administration: Manage and optimize Kubernetes clusters for containerized applications, ensuring high availability and security. Automation & CI / CD: Implement and manage CI / CD pipelines for efficient deployment, testing, and monitoring of applications. Observability & Monitoring: Develop comprehensive monitoring solutions using Prometheus, Grafana, ELK stack, or similar tools to improve system reliability. Security & Compliance: Apply … Familiarity with monitoring, logging, and observability tools (Prometheus, Grafana, Datadog, ELK, etc.). Strong understanding of networking concepts (VPC, Load Balancers, DNS, Firewalls). Experience with DevOps methodologies, CI / CD pipelines, and GitOps practices. Experience with high-performance and low-latency (sub millisecond) systems. Familiarity with serverless architectures and event-driven computing. Exposure to cloud cost optimization and More ❯
3rd Line Technician / Solutions Architect Tela is a fast-growing, staff-focused company. We are constantly evolving and are incredibly excited about the constant changes in technology. The way we bring these changes to market means with need a great team around us. This role is for a senior IT professional who resolves complex technical issues, supports IT … and monitoring of IT infrastructure Incident and Problem Management Analyse recurring incidents to identify underlying problems Implement solutions to prevent future occurrences and improve overall system reliability Provide training / development recommendations to the management team Support the service desk team, as requested Project Implementation and Support Assist in the planning, design, and implementation of IT projects for new … in the deployment of new systems, upgrades, and migrations Technical Documentation Create and maintain comprehensive documentation for systems, procedures, and project plans Document configurations, troubleshooting steps, and resolutions Cyber / Security Ensure IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusion detection systems Conduct regular security More ❯
identify vulnerabilities, and suggest improvements. Stay updated on security trends, threats, and best practices. Skills & Qualifications: Mandatory: BSc Degree or equivalent experience Certifications such as CCNA, CCNP, CWNP, ISA /IEC 62443, GICSP (highly desirable) Experience in Control System Network Design Engineering Understanding of IEC62443 and IEC27001 / 2 standards Knowledge of automation and control engineering … disciplines Familiarity with industrial communication protocols (Modbus, DNP3, OPC) and security implications Experience in writing network specifications Experience with multiple system implementation projects and control platforms Experience in upgrades / replacements in automation / control projects Strong knowledge of engineering practices, standards, and procedures Knowledge of modern automation tools, methodologies, and security considerations in OT environments Organized, detail … oriented, inquisitive Desirable: Experience with Rockwell, Honeywell, Schneider PLC / SCADA systems Familiarity with telecom protocols, satellite communications, radio-link tech Experience with OT Intrusion Detection Systems With over 90 years of combined experience, NES Fircroft is a leading engineering staffing provider across multiple sectors worldwide, offering comprehensive support from visas to benefits and accommodation. More ❯
Gloucester, Gloucestershire, England, United Kingdom
Opus Recruitment Solutions Ltd
Security Architect – Azure Focused | Contract | Inside IR35 Day Rate - £650 / day Inside Hybrid - 2 / 3 days in the office About the Role: We’re seeking a highly skilled Security Architect with deep expertise in Microsoft Azure to join a dynamic enterprise environment. You’ll play a critical role in shaping and securing cloud-first strategies, ensuring … management processes. Essential Skills Minimum 5 years’ experience as a Security Architect, with a strong focus on Azure environments. Deep understanding of cloud security frameworks (e.g., NIST, CIS, ISO27001). Hands-on experience with the Microsoft security stack (Defender, Sentinel, Entra, Purview). Familiarity with Zero Trust architecture, identity and access management, and network security. More ❯
SIEM) Experience with public cloud security (AWS, Azure, GCP) and an understanding of security best practices in those environments Understanding of enterprise security standards and frameworks such as ISO27001, NIST CSF, OWASP Top … Strong communication skills, with an ability to convey technical security issues to non-technical stakeholders Exposure to security architecture frameworks (e.g., TOGAF, SABSA) Hands-on experience with CI / CD security, container security, or secure application design Familiarity with vulnerability management and threat modelling techniques Security certifications such as CISSP, CISA, or equivalent (or working towards) Why join us More ❯
organisation who is experiencing a level of growth and are leaders in their industry. Responsible for managing externally appointed auditors and for the maintenance of a variety of ISO standards. Responsible for the adherence to and continued certification of the following standards: ISO 9001 Quality Management System ISO27001 Information Security Management … System PCI-DSS Payment Card Industry Data Security Standard ISO 22301 Business Continuity GDPR and Data Protection Laws Conduct regular internal audits in line with the requirements of the standards. Implement compliance initiatives, identify and assess corporate risk, investigate customer and corporate incidents, monitor continuous improvement, recommend effective controls and processes, and integrate specific compliance objectives within business … management in identifying compliance risks and provide appropriate commercial solutions. Monitor industry, regulatory and corporate developments in order to identify areas of vulnerability and risk. Develop and implement corrective / preventative action plans for the resolution of compliance issues and provide guidance and coaching on how to avoid future incidents. Communicate the compliance programme to all employees. Prepare and More ❯
in a Security Operations Centre (SOC) environment, managing high volumes of incidents. Deep technical expertise in Microsoft security tools and solutions, including but not limited to Microsoft Defender, E5 / A5, Sentinel, and Azure Security. Strong analytical and problem-solving skills, with the ability to make sound decisions under pressure. Demonstrated experience in incident detection, triage, containment, and remediation. … such as NIST, ISO27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM / SOAR within large-scale, complex environments. Familiarity with other security tools and technologies. Desirable Skills: Relevant certifications (e.g., CISSP, CEH, Microsoft Certified: Security, Compliance, and Identity Fundamentals) a plus. More ❯
processes and activities Support the Head of Security and Infrastructure across all functional areas within the security department Liaise with with our Privacy, Governance, Infrastructure, IT Operations, and Product / Engineering teams on all security matters Ensure tools are running correctly Ensure the integrity of our data Investigate Events of Interest (EoIs) Act upon alerts Continuous learning development Documentation … demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP / IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetration testing, Threat Hunting, Red Teaming methodologies Familiarity with More ❯
with business travel to the Middle East . Job Type: Full-Time, Permanent Location: London, UK (with travel to the Middle East) Sector: Energy & Utilities Experience Level: Senior Manager / Director Role Overview This role is pivotal to the growth of our Cyber Security Services, providing technical and advisory expertise to help clients securely design and deploy industrial control … PLC, EMS, and related technologies Familiarity with protocols like TCP / IP, Modbus, IEC 61850, OPC UA, PROFINET Knowledge of security standards such as NIST CSF, ISO27001, IEC 62443, and NIS regulations Ability to develop pragmatic solutions to address cyber risks in OT environments More ❯
and functions; enabling organizations to more quickly and widely adopt emerging technologies while ensuring the integrity of their intellectual property; information flow during disaster response scenarios, and zero-trust / least-privilege environments for M&A, attorney-client privileged communications, etc. And we've only scratched the surface. At our core, we're driven by a shared mission and … and the ability to gracefully handle node failures. • Guarantee 99.9% uptime for the platform's control plane and deployment management. Design and implement a disaster recovery plan with active / passive deployments and seamless failover capabilities. • Architect and implement a highly available deployment setup for applications within the Acra platform. This will involve designing and building the infrastructure and … Bash, Python. •Deep experience with Kubernetes security: RBAC, PodSecurityPolicies (or their replacements), Admission Controllers and Kubernetes network policies. •Proficiency in secure networking practices, including TLS, mutual TLS (mTLS), ingress / egress controls and VPN tunneling configurations. •Proven experience operating and securing service mesh technologies (e.g. Istio, Linkerd, or Consul Connect). •Hands on experience with HashiCorp Vault in production More ❯