Senior Security Consultant - London (Hybrid, 2-3 days per week in office) - Up to £75,000 About the Role An opportunity to join an innovative cyber security consultancy focused on creating great security outcomes for their clients. This company is delivering cutting-edge solutions, and helping clients strengthen their security posture, grow great process, and prepare … some great projects, working with an exciting team with a good range of solutions, championing 'best for client' delivery, trust, transparency, and great outcomes. Key Responsibilities As a Senior Security Consultant, you will work within a dynamic, client-facing team, managing the security needs of high-growth clients through consultancy and managed services. You will collaborate with a … include: Client Delivery - Serve as the main point of contact for clients, managing relationships and communication, Identifying and mitigate cyber risks, oversee certification audits, and support incident response. Leading security awareness initiatives, including training, phishing simulations, and governance meetings. Scope, plan, and coordinate penetration tests and managing third-party security assessments Capability Development - Enhance internal processes, implement automation More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
leonardo company
We have an exciting opportunity for a Site Security Manager based at our Southampton site. The Site Security Manager will lead the day to day direction, control and planning of Physical, Personnel and InformationSecurity delivery. You will be responsible for the protection of company employees, assets, infrastructure and capability in alignment with internal and external … compliance requirements. Reporting to the Security Operations Manager, you will use your knowledge and experience in Security to operate at all levels in the business in order to deliver functional and business requirements. The role is site based in Southampton and will additionally require occasional travel to other Leonardo UK sites. You do need to be eligible for … DV clearance What you'll do as a Site Security Manager: Lead all Business Security day to day operational requirements in the delivery of current and future business objectives. Ensuring compliance to policy, process, and procedure adherence to achieve operational objectives. Implementation of Security policies and procedures in a consistent manner. Manage, monitor and report on securityMore ❯
Hedge End, Hampshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: The opportunity: We have an exciting opportunity for a Site Security Manager based at our Southampton site. The Site Security Manager will lead the day to day direction, control and planning of Physical, Personnel and InformationSecurity delivery. You will be responsible for the protection of company employees, assets, infrastructure and capability in alignment … with internal and external compliance requirements. Reporting to the Security Operations Manager, you will use your knowledge and experience in Security to operate at all levels in the business in order to deliver functional and business requirements. The role is site based in Southampton and will additionally require occasional travel to other Leonardo UK sites. You do need … to be eligible for DV clearance What you'll do as a Site Security Manager: Lead all Business Security day to day operational requirements in the delivery of current and future business objectives. Ensuring compliance to policy, process, and procedure adherence to achieve operational objectives. Implementation of Security policies and procedures in a consistent manner. Manage, monitor More ❯
Cohere is seeking a DevOps Engineer. The duties of this position include: Serving as a member of the team supporting the installation, optimization, integration, troubleshooting, backup, recovery, modification, security, and upgrading of IT systems and components Architect and design CI/CD support systems that will be used by all application within the organization Designing and implementing systems that … versions of supported software, as they become available Working with other staff to recommend and design system architectures and topologies from both general and specific perspectives Work with organization InformationSecurity personnel to ensure that security best practices are adopted and implemented within the code deliver and deployment processes Reviewing and confirming application code conforms to Enterprise … own company too. We offer mentoring opportunities to learn from experienced leaders on creating and growing your own contracting business. If you have a background in coding and computer security and want to take your career to the next level, with the ability to learn from senior engineers invested in your success, apply today More ❯
of similar scope, type, and complexity. DoD 8570 compliance with IAM Level II or IAT Level III (i.e., CASP, CISSP, or Associate) Bachelor of Science degree in Computer Science, Information Assurance, InformationSecurity, or related discipline and 12 or more years of related experience. More ❯
Government in the design, development, implementation, and/or integration of IA architectures, systems, or system components • Provides the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity • Performs system or network designs that encompass multiple enclaves, to include … recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's … Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD InformationSecurity regulations, publications, and policy Must meet specified certification requirements defined and documented by DOD 8570 - IASAE Level III a must have More ❯
Washington, Washington DC, United States Hybrid / WFH Options
OMW Consulting
Role: Information System Security Engineer Location: Washington, D.C. - Hybrid with some travel Clearance: Secret minimum, ideally TS Salary: $150K-$185K + Equity My client, a leading defense tech company, is looking to hire an experienced ISSE to join their team based in Washington, D.C. You must have an active Secret clearance or higher and a solid background in … informationsecurity fundamentals and core technologies (e.g., authentication, encryption, firewalls, vulnerability scanning, SIEM/SOAR, audit logs). Your main responsibilities in this position will include: Achieving ATOs for the company's software across multiple government customers with minimal oversight. Providing outstanding customer service, policy expertise, and high-quality documentation. Partnering with engineers to interpret security requirements … and plan effective control implementations. Translating and synthesizing complex concepts and architectures into clear body-of-evidence artifacts, including System Security Plans (SSPs) and architecture diagrams. Representing the company and providing credible cybersecurity expertise in government assessments and audits. If you are interested in learning more about this opportunity, please apply below, and I will contact you to discuss More ❯
This is a contingent opportunity The ISSO is responsible for the administration and management of the InformationSecurity program for Headquarters United States Space Force (HQ USSF) Staff Security Office. Duties: Provide Information Systems Security Officer duties for USSF, to include coordination of software and hardware change/problem resolution, account access, data transfers, scanning … and copying data to/from external media; Attend required technical and security training (e.g. Operating system, networking, security management) relative to assigned duties; Maintain compliance for designated HQSF locations throughout HQSF Area of Responsibility (AOR) IAW AF, DoD and IC guidance; Conduct annual Cyber Assurance self-assessments and program reviews for all assigned SCI and/or … SAP facilities; Provide AF Joint Worldwide Intelligence Communications System (JWICS) account and Public Key Infrastructure (PKI) certificate support and troubleshooting assistance; Process information technology (IT) and asset requirements and purchases; Oversee IT disposal and destruction IAW DoD policies and agency procedures; Conduct annual hardware inventories and maintainrecords of IT systems within facilities overseen by DSZ; Oversee the identifying and More ❯
U.S. Government clients in the metropolitan Washington D.C area. We are committed to meeting our customer's needs with a dedicated and highly qualified workforce. We are seeking an Information Systems Security Engineer to join our growing team. Requirements 14+ years experience as an ISSE on programs/contracts of similar scope, type and complexity. Bachelor's degree … in Computer Science, Information Assurance, InformationSecurity System Engineering or related discipline. DoD 8570.01-M compliance with IASAE Level 2 CISSP Certification 4 years of ISSE experience may be substituted for a bachelor's degree. TS/SCI Clearance Required Please check out our amazing benefits and generous PTO plan on our website at White Sky Technologies More ❯
Not Just a Job - It's a Mission Secured by Your Expertise: Join us as an Information Systems Security Engineer! Are you ready to protect the nation's most critical systems with cutting-edge security solutions? At Adaptic, we engineer the future of secure technology. Join a high-impact team where your expertise shapes resilient systems, your … bold ideas are encouraged, and your dedication to mission success truly matters. What You'll Do: As an Information Systems Security Engineer (ISSE), you'll be at the forefront of securing enterprise and mission systems. You will: • Perform or review technical security assessments of complex computing environments • Participate as a security engineering lead and representative on … enclave architectures • Apply IA policy, risk frameworks, and best practices to build secure solutions • Support the development and enforcement of trusted relationships among external systems • Contribute to risk assessments, security planning, and mitigation strategies • Support the development, review, and implementation of C&A/A&A documentation (RMF, DIACAP, NISCAP) • Recommend system-level solutions to security requirements • Interact More ❯
all open jobs by clicking here or use the following search form to find jobs that suit your specific career interests. Deputy Managing Director, Technology Job Number: 7 Category: Information Technology Location: Shrewsbury, MA Shift: Day Exempt/Non-Exempt: Exempt Business Unit: ForHealth Consulting Department: ForHealth Consulting - Digital Transformation Solutions - W401600 Job Type: Full-Time Salary Grade … The DMD is responsible for the day-to-day operations of digital health technology services, managing solution engineering, data design, testing, and integration while ensuring alignment with operations and informationsecurity protocols. This role has responsibilities, as assigned by the MD, in strategy, finance, human resources, portfolio … and project management, asset and vendor management, and compliance with privacy and security laws. The DMD will coordinate with internal and external partners, including UMass Chan IT and Infosec, and manage relationships with development partners as appropriate. Technology Management & Support: Lead and support the management of the department's technology infrastructure, ensuring all systems function optimally and align with More ❯
a varied and interesting workload, but we can nurture your inquisitive nature and help you create change in the workplace - making it better for all. Logiq Consulting are Cyber Security and Information Assurance experts. We specialise in providing leading edge consultancy to high-threat clients, as well as delivering a range of security services and products throughout … Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our InformationSecurity Lead and sit within our InformationSecurity Team. The ideal candidate will have current or recent experience working in a SOC environment and/or … respond to emerging threats and vulnerabilities in company IT systems. Review configuration dashboards, identifying deployment issues and misconfigurations that may lead to vulnerabilities to Logiq platforms. Collaborate with other InfoSec team members to ensure that the client has the correct procedures in place to continue to operate safely and securely. Conduct the daily and weekly checks to identify vulnerabilities, providing More ❯
Reliance High-Tech is the UK's largest independent integrator/installer of security solutions. We are trusted by leading brands and organisations to protect their people, assets and reputations through innovative technology and specialist expertise. Unique in the industry, Reliance High-Tech combines the capability and footprint of a large organisation, with the agility and customer focus of … role for a technically strong IT professional ready to move into formal leadership. As Head of IT & Digital Services, you'll lead three growing teams IT, Software Development, and InformationSecurity while remaining hands-on in delivery, automation, and systems improvement. This hybrid doer-manager role offers the opportunity to drive internal change, enhance service delivery, and shape … Responsibilities Drive improvements across internal IT systems, infrastructure, and support processes Contribute hands-on to technology projects, especially in automation and service optimisation Shape and grow the internal IT, InfoSec, and software development capabilities Work closely with stakeholders to identify inefficiencies and deliver practical, tech-enabled solutions Support the development and delivery of internal business intelligence and reporting tools Maintain More ❯
M17, Eccles, City and Borough of Salford, Greater Manchester, United Kingdom
Reliance High Tech
Reliance High-Tech is the UK's largest independent integrator/installer of security solutions. We are trusted by leading brands and organisations to protect their people, assets and reputations through innovative technology and specialist expertise. Unique in the industry, Reliance High-Tech combines the capability and footprint of a large organisation, with the agility and customer focus of … role for a technically strong IT professional ready to move into formal leadership. As Head of IT & Digital Services, you'll lead three growing teams—IT, Software Development, and InformationSecurity—while remaining hands-on in delivery, automation, and systems improvement. This hybrid “doer-manager” role offers the opportunity to drive internal change, enhance service delivery, and shape … Responsibilities Drive improvements across internal IT systems, infrastructure, and support processes Contribute hands-on to technology projects, especially in automation and service optimisation Shape and grow the internal IT, InfoSec, and software development capabilities Work closely with stakeholders to identify inefficiencies and deliver practical, tech-enabled solutions Support the development and delivery of internal business intelligence and reporting tools Maintain More ❯
yourself and further develop your skills to enable you to grow within the company and industry. You will be involved in: Effective Tier 1 to 2 alert triage of security events Monitoring of Cyber Security tools Monitoring the SOC email notification mailboxes Assists with … the maintenance of Security technologies Assisting the SOC Solutions Lead with project activity Assist proactive threat hunting in collaboration with the CTI function Assist IR in HR and InfoSec related investigations Ensure the timely triage and remediation of any incident or request tickets raised to the SOC Participate in the activity of adding/removing URLs from the AcceptList … and BlockList Conduct activities in line with SOC Maturity and continuous improvement Your skillset may include: Background in Cyber SecuritySecurity awareness Experience in Network Security, Infrastructure, and Operating Systems & Applications Knowledge of IT Security standard methodologies Demonstrable understanding of the OSI Reference Model and the network communication protocols, including but not limited to DNS, HTTP More ❯
working with risk owners to support risk-informed decision-making in Sportradar. Lead in the design and implementation of Enterprise risk management processes across Sportradar. Specific focus on Technology, InformationSecurity and Operational risks Support all elements of the risk management process as required : Conduct independently regular risk identification, assessment and evaluation with management across technology, security … via Key Risk Indicators (KRIs); Challenge risk owners in their prioritization of mitigating actions to effectively manage the risks identified; Drive maturity of the risk management process, ensuring risk information is used to effectively support … decision making; Provide support, education and training to the business to build risk awareness and to promote the right risk culture within the organisation. Sit on the Engineering and InfoSec risk councils, driving fulsome considerations of risk vs. reward Interrogate our data looking for themes, oddities and quality enhancements. Deliver on specific risk related projects in response to business needs. More ❯
company. Battling threat actors as The World's First Civilian Cybersecurity Force , Fenix24 delivers cybersecurity services through its four battalions: Fenix24 for ransomware recovery and restoration; Athena7 for IT security assessments, strategy and planning; Grypho5 for ongoing security-based management; and Argos99 for expert insights into data, assets and infrastructure. Under its Securitas Summa program, Fenix24 ensures organizations … intelligence software and/or MS Office tools. Previous experience working with technology partners selling products in an MSP Space. Administer contracts in a service delivery environment Understanding of information technology and managed services best practices Experience … with service level agreement and contract management Experience with service delivery in a managed services practice organization Server, network, storage, and or security support experience Practical application of InfoSec principles Why work for us? We offer a dynamic, innovative work environment with rewarding work - help save our clients from disaster! We truly value our employees and provide an extraordinary More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … it made me realize how much I enjoyed the challenge of solving complex problems related to cybersecurity. The decision to pursue a PG diploma in IT Infrastructure and System Security at CDAC ACTS Pune was another significant moment in my journey. I wanted to specialize in an area that I found both challenging and rewarding. This program was intense … Qualys, an Enterprise Cyber Risk & Security Platform . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is More ❯
East London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
are invested into technological innovation and the adoption of new cutting edge practices. Our client is looking for a Cyber Defence Assistant Manager to play a vital role in information security. As a Cyber Defence Assistant Manager you will be in the frontier of unique and specialised government and commercial contracts that will allow you develop and grow your … will be contributing to proposals and pitches and will have an active role in client presentations As a Cyber Defence Assistant Manager you should; Possess a Bachelor degree in InformationSecurity, Computer Science, Engineering or any other similar degree Have at least 3 years' experience within the field Have SC clearance or the ability to go through SC … clearance Any SecOps related certification (including security vendor certificates) A understanding and demonstration of penetration testing and red-tanning (NCSC and CREST accredited schemes) Strong technical background in computing, networks and programming Excellent communication skills A genuine interest to work for multi-national clients in the security field. Further desirables, but not essentials for this role; A CISSP More ❯
Ready to utilise your skills and experience in Azure Cloud, Data, and Security best practices? Are you passionate about designing, implementing, and managing data loss prevention strategies and technologies? Join our clients team as a Senior DLP Architect and make an impact that matters. You will be working with some of their clietns that include some of the biggest … support business change processes. Provide end-user support for DLP policies and procedures. Contribute to the development and enhancement of DLP processes. Configure and deploy Zscaler components, including web security, DLP, cloud application security, and SSL inspection. Establish and maintain a robust CI/CD pipeline for deploying Zscaler updates and configurations. Configure role-based access control using … role privileges for admins. Skills/Must have: Expertise in the implementation and configuration of DLP technologies, particularly Microsoft Purview and Zscaler. Experience with Zscaler components such as web security, DLP, cloud application security, and SSL inspection. Good understanding of informationsecurity fundamentals. Excellent communication and interpersonal skills. Azure security certification is a plus. Benefits More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Capital One (Europe) plc
technology risk. Cybersecurity Risk professionals at Capital One are trusted expert advisers who shape decisions, challenge activities to ensure they meet our standards, and generally oversee technology, cybersecurity, and informationsecurity risk across the business and the central technology organisation. Cybersecurity is a strategic priority at Capital One, with heavy engagement from the Board, the Chief Executive Officer … strategic decision-making for Cyber and Technology leadership Take the lead in evaluating and recommending standardized risk sloping & scoring methods across Tech and Cyber domains, including Vulnerability Management, Data Security, and Network Security across the enterprise Serve as a point of contact for ISO Assurance Team service offerings and assist with onboarding junior team members. Standardize the review … risk reduction activities in order to allow teams to focus on the areas of the greatest impact Work cross-functionally with Advisory, Assessment, and Risk Operations functions within the InformationSecurity Office to measure cybersecurity and technology risk Act as a key contributor to the InformationSecurity Office leadership team on senior leader initiatives, providing insights More ❯
Title and Summary Manager, Product Management The Services team and solutions fuel growth for partners globally by providing cutting edge services in the areas of Customer Acquisition and Engagement, Security Solutions, Business and Market Insights, and Open Banking. Focused on thinking big and scaling fast, our agile sales team is responsible for end-to-end solutions for a diverse … the online application process or during the recruitment process, please contact and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes … with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or More ❯
London, England, United Kingdom Hybrid / WFH Options
itecopeople
Governance, Risk and Compliance Manager. (GRC Manager) About the Role: The GRC Manager is a senior role within the InformationSecurity team, responsible for maintaining and improving governance and risk frameworks for IT Services. You will define risk and governance processes, including how process owners are identified and the activities to ensure that the process is governed effectively … to ensure that IT systems and information assets are adequately protected. You will be responsible for identifying, evaluating and reporting on governance and compliance risks and issues in a manner that meets the clients regulatory and legal requirements. The GRC Manager works proactively with the various departments, business units and suppliers to implement practices that meet the clients defined … policies and standards for information risk management, governance and compliance. About You: You will have a significant level of specialist expertise in IT Governance, Risk and Compliance, with proven responsibility for, and experience of, executing a robust risk and governance process and frameworks in a complex environment. You will be successful at delivering high quality, robust, resilient, responsive and More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
INTEC SELECT LIMITED
global and UK strategies, and recognize system limitations Hybrid Work Environment: This role offers a blend of working from their London HQ and remote locations Essential Skills and Experience: InformationSecurity: Strong understanding of security best practices in all aspects of informationsecurity, with attention to detail and a commitment to thorough documentation. Cloud Hosting More ❯
strengths, views, and experiences. We believe that our differences enable us to be a better team - one that makes better decisions, drives innovation, and delivers better business results Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected informationsecurity violation or breach, and • Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯