Cyber Security Specialist ** Location: London / Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a Cyber Security Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work … and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g., ISO27001, NIST, CIS). Knowledge of security technologies such as firewalls and web proxies; experience with ZTNA, CTI, and threat modelling is beneficial. Excellent communication and interpersonal More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
Cyber Security Specialist ** Location: London / Hybrid (2 days in office) Rate: A highly competitive salary is available for suitable candidates Role Profile As a Cyber Security Specialist, you will be the go-to Subject Matter Expert (SME) for various projects, offering your insights and recommendations to enhance our security posture. With a strong technical background, you will work … and practises. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Familiarity with security standards and frameworks (e.g., ISO27001, NIST, CIS). Knowledge of security technologies such as firewalls and web proxies; experience with ZTNA, CTI, and threat modelling is beneficial. Excellent communication and interpersonal More ❯
CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
CyberArk, OpenText, ServiceNow and Microsoft to enhance the relationship with Turnkey and deliver value to our clients When needed, work alongside our Sales, Marketing & Innovation team to provide materials / Pre-Sales support for sales activities Writing and reviewing reports and other client-facing deliverables, to a high standard The expectation will be that you have basic skill in … IAM vendors capabilities (e.g. Life Cycle Management, Application Onboarding, Workflows, Provisioning, Access Review, Reports, Roles, SoDs, etc.) Identity Governance and Administration (IGA) Identity Management (IDM) Ideally with good conceptual / practical knowledge of: Access Management (inc. Single Sign-On (SSO) / Multi-Factor Authentication (MFA) / Password-less Authentication) Privileged Access Management (PAM) Consumer Identity (CIAM) Required … an IAM solution across all aspects of the SDLC (Analyse, Design, Develop / Configure, Test, Deploy, Document) Understanding of regulatory frameworks, and their application to IAM, e.g. SOx, ISO27001, NIST, HIPAA, GDPR, PSD2, etc. Ideally, an education in Business, IT, IT security or related field Advantageous: Professional certifications such as CISSP, CISA, ITIL, etc. Product certifications from SailPoint, or More ❯
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
and evaluation of risk, as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO27001, SOC 2, NIST 800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving … to work every day. And you'll never stop growing, whatever your level . Discover more reasons to connect with us, our people and purpose-driven culture at deloitte.co.uk / careers More ❯
management. Knowledge of Risk Management frameworks and their integration with threat intelligence. Hands-on experience with cloud security reviews (AWS, Azure, GCP) considering cloud-specific threats. Familiarity with ISO27001 audits and threat-informed compliance practices. Additional certifications such as CISM, CISSP, ECSA, CREST CCT are advantageous. Who we are: We're a global business empowering More ❯
security best practice across the business. You will also assist with maintaining and improving the company’s accredited Information Security Management System (ISMS), with a particular focus on ISO27001 and Cyber Essentials Plus requirements. In addition, you will help mentor team members, providing guidance and support to develop their skills, and work collaboratively with Cyber More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to keep pace with the continually evolving threat landscape, in support of A&O Shearmans strategy to lead where global complexity creates opportunity. In addition, you More ❯
expertise with monitoring and securing enterprise class technology estates. You will have proven experience with Cyber Security best practice including the NIST Cloud Security guidelines. You will support ISO27001 … compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK Telecom Security Act would be advantageous to your application, as would CISSP and / or CISM accreditation. You will develop and maintain the information security architecture and will have proven experience with compliance, vulnerability management, network security, cloud security (AWS & Azure), firewalls and More ❯
infrastructure-as-code, you'll help us build, run, and scale with confidence. Key Responsibilities: Lead a collaborative team of infrastructure and DevOps engineers Build secure, scalable infrastructure (Windows / Linux, VMs, containers) Drive CI / CD, automation, and Infrastructure as Code practices Ensure compliance with NIST, NCSC, CIS, JSP, and ISO27001 Oversee … in systems administration & automation Solid grasp of compliance frameworks (NIST, NCSC, JSP) Excellent communication and stakeholder management Tech Stack You'll Work With: OS: Windows Server, Hardened Linux Containers / Orchestration: Docker, Kubernetes, Portainer DevOps Tools: Jenkins, Artifactory, Jira, Azure DevOps Virtualization: Nutanix, VMware Security: Defender, Wazuh, Nessus, OPSWAT Monitoring: PRTG, Zabbix Access / Apps: Citrix Netscaler, KASM More ❯
tools including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), and Software Composition Analysis (SCA). Collaborate with development teams to integrate security testing seamlessly into CI / CD pipelines, enabling early detection and continuous monitoring of vulnerabilities. Drive the creation of custom security automation scripts and tools to enhance scanning coverage, improve detection accuracy, and streamline … practices to reduce vulnerabilities proactively. Governance, Compliance & Training Ensure that application security architecture and practices comply with relevant regulatory and industry standards such as PCI-DSS, SOC 2, ISO27001, and GDPR. Lead efforts to prepare for and support external and internal audits by providing comprehensive documentation, risk assessments, and remediation evidence. Develop and deliver targeted … as Certified Secure Software Lifecycle Professional (CSSLP), GIAC Web Application Penetration Tester (GWAPT), or Google Professional Cloud Security Engineer. Experience securing containerized environments and orchestration platforms such as Kubernetes / GKE. Knowledge of DevSecOps tooling and automation frameworks (Jenkins, GitLab CI / CD, Terraform). Familiarity with API security gateways, Web Application Firewalls (WAFs), and Runtime Application Self More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
Azure Cloud Security Architect – £700 / day – Outside IR35 – Hybrid (Cardiff) We’re working with a major organisation undergoing a large-scale Azure transformation. They’re seeking a Cloud Security Architect with deep Azure expertise to lead the design and implementation of secure cloud solutions. Key Details: Location: Cardiff (Hybrid – 2 days / week on-site) Rate: Up … to £700 / day IR35 Status: Outside IR35 Contract Length: 6 months (strong extension potential) Start Date: ASAP Role Overview: As the Azure Cloud Security Architect, you’ll play a critical role in shaping the organisation’s cloud security posture. You’ll work across architecture, engineering, and compliance teams to ensure secure-by-design principles are embedded throughout the … Key Responsibilities: Design and implement secure Azure cloud architectures Lead threat modelling, risk assessments, and security reviews Define and enforce cloud security policies and governance Integrate security into CI / CD pipelines and DevOps practices Provide guidance on Azure-native security tools (e.g., Defender for Cloud, Sentinel, Key Vault, Azure Policy) Support zero trust and identity-based security models More ❯
including Microsoft security, compliance and identity services. Managed SOC Managed XDR Cloud Security (M365, Azure, AWS) Managed SIEM (Sentinel + multi vendor) Security Professional Services Pen Testing Red Teaming ISO27001/ Cyber Essential Plus Apps / Infra testing You role will be to drive sales across through a mix of marketing campaigns, events and direct selling to create More ❯
in office will be confirmed by your Hiring Manager. Educated to degree level in a relevant discipline or equivalent work experience. 5 years minimum as a payment risk and / or information security subject matter expert. Knowledge of payment risk and information security practices with direct experience in developing and implementing policies and risk frameworks. Knowledge of information security … to keep pace with demands of business by anticipating problems, proffering appropriate solutions and providing the leadership to effectively implement change. Self-driven, demonstrated excellence in leading risk and / or compliance programs. Preferred Qualifications Security certifications (CISSP, CISA, ISO27001 Lead Auditor) Knowledge, understanding and experience of risk management practices in financial services Knowledge … of the UK and wider European payments and / or financial services industry and the major trends affecting key stakeholders Knowledge and experience of the Visa Europe payment system, its governance principles and Visa Europe's compliance framework Visa is an EEO Employer. Qualified applicants will receive consideration for employment without regard to race, color, religion, sex, national origin More ❯
areas such as: v Cyber resilience v Identity & privileged access management v Secure coding practices v Third-party risk management v Cloud security configuration and control frameworks v Threat / vulnerability management v Network security B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Relevant certification is desirable, e.g., CISSP, CISM, CISA, CRISC. … Working knowledge of Risk Management life cycles based on an established framework: NIST CSF, NIST SP 800-53, ORX, ISO27001, SANS, CERT, ENISA, CSA, OACA, ISACA. Proficiency in MS PowerPoint and Excel. Experience in broader MS Office suite, including Project and Visio is a plus Experience with enterprise GRC tools, e.g. Archer is a plus More ❯
with financial platforms (e.g., SAP, Oracle Financials, Bloomberg) and security tools (e.g., Sophos, Arctic Wolf, Egress). Proficiency in cloud platforms (Azure, AWS). Familiarity with compliance frameworks: ISO27001, NIST, GDPR. Customer-focused mindset with a proactive approach to support. Strong organisational and documentation skills. Experience in a fast … paced, multi-site environment. Experience with zero trust architecture, and data loss prevention (DLP). Strong scripting and automation skills. Excellent analytical, communication, and documentation abilities. End user compute / financial & cybersecurity systems This is an exceptional opportunity for a driven individual to join a leading global shipping company at a critical juncture in its growth. At Union Maritime More ❯
developing strategies to mitigate risks ️ Collaborating with engineering teams to integrate security solutions into existing infrastructures ️ Conducting security assessments and audits to ensure compliance with industry standards (e.g., ISO27001, NIST, GDPR) ️ Leading the development of security policies, procedures, and best practices for enterprise systems What We're Looking For: ️ Proven experience as a Security Architect … a similar senior security role ️ In-depth knowledge of network security, cryptography, firewalls, VPNs, and security protocols ️ Familiarity with cloud security solutions (AWS, Azure, GCP) and security technologies (IDS / IPS, SIEM, DLP) ️ Strong experience with risk management, threat modeling, and security architecture frameworks ️ Certifications such as CISSP, CISM, TOGAF, or equivalent are highly preferred More ❯
incident management post-mortems. Infrastructure Automation, Management, and Security: Contribute to automating infrastructure provisioning, configuration, and deployment processes with a focus on security. Assist in implementing and managing CI / CD pipelines to streamline software delivery while adhering to security best practices. Support infrastructure security and compliance efforts. Secrets Management: Assist in the implementation and management of secrets management … Linux environments. Cyber Security: Basic understanding of cyber security principles and best practices. Interest in learning about and working with secrets management solutions. Awareness of security frameworks (NIST, ISO27001). Problem-Solving and Analytical Skills: Good problem-solving and analytical skills to identify and resolve issues. Ability to identify potential security threats and vulnerabilities. Communication More ❯
Information System Security Officer, Senior Clearance Level: Top Secret / SCI Polygraph Type: Counterintelligence Role Title: Information System Security Officer - ITU Responsibilities: • Shall identify and recommend necessary updates based on security policies, standards, guidelines, and procedures to ensure compliance with regulatory requirements and organizational objectives. • Shall conduct risk assessments and vulnerability assessments to identify, evaluate, and prioritize security risks … such as NIST, ISO27001,and CIS Controls. • Shall be able to demonstrate experience and knowledge of security technologies, tools, and methodologies (e.g. firewalls, IDS / IPS, SIEM systems). • Shall be able to demonstrate experience and knowledge with network protocols and architecture. • Shall be able to demonstrate experience and knowledge with data encryption techniques More ❯
more about this opportunity, feel free to reach out and apply today! Responsibilities: Lead full-scope, threat intelligence-led penetration testing across applications, infrastructure, cloud (AWS, Azure), APIs, OT / ICS, and O365. Develop sophisticated test plans and use cases based on emerging threats and attacker TTPs. Produce detailed, high-impact reports with clear technical findings and business-aligned … in threat-informed testing methodologies. Required Skills: 5+ years of professional experience in penetration testing, with a strong emphasis on threat intel and adversary emulation. Deep understanding of OT / IT systems, common vulnerabilities, network protocols, cryptography, and attack vectors. Proficiency in tools and frameworks used in both offensive security and threat intelligence. Proven ability to scope, manage, and … deliver complex engagements with excellent communication across technical and non-technical stakeholders. CREST CRT / CHECK (or higher) certification is essential. Must hold or be eligible for SC Clearance. Desirable Skills: Experience with Breach Attack Simulation tools and vulnerability management processes. Familiarity with ISO27001, risk management frameworks, and compliance-oriented testing. Hands-on knowledge More ❯
strong emphasis on operational security and incident response. Extensive knowledge of IT risk management, threat intelligence, IAM and vulnerability management. Familiarity with key regulatory and compliance frameworks, including ISO27001, GDPR, NIST, and CyberEssentials. Ability to articulate complex technical risks in clear, actionable terms to business stakeholders. This is an exciting opportunity to lead a future More ❯
machine learning, deep learning, and neural networks. Solid understanding of cybersecurity principles, including encryption, authentication, access control, and network security. Experience with security frameworks and standards such as ISO27001, NIST, and GDPR. Demonstrated experience in conducting risk assessments, threat modelling, and security audits. Excellent leadership, communication, and project management skills. Ability to work cross-functionally More ❯