Security Incident Response Engineer, AWS CorpSec Response Job ID: Amazon Development Centre (London) Limited - C26 The Amazon Web Services team is looking for a passionate Security Incident Response Engineer who can lead the response to security issues across the largest cloud provider in the world. You must thrive in dynamic/ambiguous situations, and think like both … an attacker and defender, while working through the entire incident response lifecycle. You'll be working in a global team environment where clear and accurate communication and collaboration on security issues is critical. In this role you'll be conducting security monitoring and response activities for the Amazon internal network. We value broad and deep technical knowledge, specifically … in the fields of operating system security, network security, cryptography, software security, malware analysis, forensics, security operations, incident response, and emergent security intelligence. We don't expect you to be an expert in all of the domains mentioned above, but we do expect you to be excited to learn about them! You'll apply your More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
RogueThink Inc
a lasting impact. Job Description: We are seeking a talented and detail-oriented DevSecOps Engineer II to join our growing team. This mid-level role is responsible for integrating security into every phase of the software development and deployment lifecycle, automating CI/CD pipelines, and managing cloud infrastructure in a secure and scalable way. You will work closely … with development, operations, and security teams to ensure robust, secure, and compliant delivery of applications. Responsibilities: • Design, implement, and manage CI/CD pipelines with integrated security gates and … automation tools. • Develop Infrastructure as Code (IaC) using tools like Terraform, Ansible, or CloudFormation. • Deploy, monitor, and secure containerized applications using Docker and Kubernetes (or OpenShift). • Collaborate with InfoSec to integrate compliance and security scanning tools (e.g., SAST, DAST, SCA) into build pipelines. • Implement and monitor security controls and configurations in cloud platforms (AWS, Azure, or GCP More ❯
Cloud Platform Engineer (DV Security Clearance) Position Description Secure Innovation is part of CGI's Space, Defence, and Intelligence business unit, focused primarily on the delivery of contemporary and innovative technical solutions for the government agencies most challenging problems. Our teams work alongside our clients to help them understand how to exploit technologies to maintain competitive advantage. Our systems … are engineered for performance, security, reliability and scalability; built with modern CI and CD tooling and techniques. We're looking for experienced Platform Architects who can design, build, and maintain the platforms upon which our products and services are developed and/or run. CGI was recognised in the Sunday Times Best Places to Work List 2025 and has … community of experts. We'll train and support you in taking your career wherever you want it to go. Our roles are only available if you hold a UK Security Clearance and are a sole UK National due to the secure nature of the project. You will either hold a higher level clearance or be willing to obtain it. More ❯
Government in the design, development, implementation, and/or integration of IA architectures, systems, or system components • Provides the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity • Performs system or network designs that encompass multiple enclaves, to include … recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise security architecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master's … Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD InformationSecurity regulations, publications, and policy This is a CWIP Billet per DoD Directive 8570-1 and must meet specified certification requirements defined and documented by the TTO COR - IASAE Level III a More ❯
Artificial Intelligence Cloud Information Technology Sales Security Software CybersecurityAs a Software Engineer II, you will develop and maintain secure software solutions, mentor junior engineers, and collaborate with teams to meet customer … Intelligence Cloud Information Technology Sales Security Software CybersecurityAs a Software Engineer II on the Platform Delivery Automation team, you'll improve security through automation, collaboration with InfoSec teams, and maintaining platform reliability. Top Skills: AnsibleAWSDockerGitJenkinsKubernetesPythonTerraformArtificial Intelligence Cloud Information Technology Sales Security Software CybersecurityAs a Senior DevOps Engineer, you will enhance security and reliability in … and services that impact the lives of millions of people each day to make life better, and keep us safer. We innovate across the major industries of Aerospace, Defence, Security and Space. Your health and well-being matters to us and thats why we offer you the flexibility to do whats important to you; whether thats part time hours More ❯
looking to recruit an IT Bid Assistant to support IT aspects of client requests for information. The role involves providing responses to client questionnaires and bid documents from an informationsecurity and IT perspective. We believe this is an excellent opportunity for professionals with a legal, document review, risk or compliance based background who are looking to work … in a fast-paced global business. IT Bid Assistant - Key Duties and Responsibilities Reviewing client requirements to ensure InformationSecurity and technical IT requirements are accurately submitted, using standard responses. Highlighting risks and exceptions using standard responses and processes. Maintaining the InformationSecurity & IT responses template. Other duties as required to support the IT and InformationSecurity teams. Duties will vary and be revised due to the nature of the IT environment. IT Bid Assistant - Qualifications Our client is looking for a confident individual with strong interpersonal skills, able to deal with people at all levels and communicate to users in a clear, non-technical language. Team-player Good attention to detail Good analytical More ❯
countries, UST builds for boundless impact—touching billions of lives in the process. We are looking for a BISO Analyst to play a pivotal role in supporting the Business InformationSecurity Officer (BISO) in shaping and driving the organisation's security programme for one of our key customers, a leading health and beauty retailer and pharmacy chain. … of cybersecurity. You’ll act as the BISO’s trusted representative in meetings, capturing actionable insights and driving follow-ups, while also contributing to the evaluation of cutting-edge security tools and ensuring documentation aligns with policy standards. This is your chance to bring your organizational expertise to a critical and impactful function within a thriving and fast-paced … industry! Your main tasks and accountabilities will be: Provide comprehensive support to the Business InformationSecurity Officer (BISO) in the development and implementation of informationsecurity policies and procedures, driving the organisation's informationsecurity programme development. Collaborate with various departments to ensure compliance with security standards and regulations. Prepare and maintain detailed More ❯
Potters Bar, Hertfordshire, England, United Kingdom
Canada Life
helping teams manage technology risk. Collecting and analysing data on control effectiveness and assess the impact on risk posture including: IT Risk Register Open actions resulting from audits Open security exceptions Risk and control effectiveness Act as a point of contact and SME to ensure the Risk Controls Framework is effectively rolled out across all teams, working and collaborating … develop and implement risk mitigation strategies and controls, and tracking any subsequent action plans Conduct risk analysis to identify potential, or emerging, technology risks and vulnerabilities, gathering and preparing information to the Risk Owner to assist with decision making Responsible for working with key business stakeholders annually to attest to the InformationSecurity Operating Policy Work with … European CSIO and Security function to ensure alignment between functions, to ensure policies are adhered to and reported consistently Skills, Knowledge and Experience 1st Risk Management experience In depth knowledge of Risk Management frameworks and processes including informationsecurity and technology risk controls Excellent communication skills, demonstrating a clear and articulate standard of written and verbal communication More ❯
m currently supporting a forward-thinking organisation that's undergoing a major digital and tech transformation. They're looking for a Security Operations Analyst to join their growing InfoSec team and play a key role in protecting systems, data, and people from the latest cyber threats. This is a fantastic opportunity for someone passionate about cybersecurity to gain real … Scripting and automation Strong foundational IT and networking knowledge Familiarity with patching solutions and email security tools A proactive mindset and good communication skills A genuine passion for InfoSec and making a difference Details: Salary: up to £40,000 Up to 10% bonus Strong pension Location: Leeds - 2x a month in the office If this sounds of interest email More ❯
example with hands-on approaches to demonstrate product management excellence and share best practices • Demonstrate and drive Mastercard Way behaviours through their behaviour, (e.g. customer and stakeholder interactions) Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with … an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected informationsecurity violation or breach, and • Complete all periodic mandatory security training in accordance with More ❯
San Rafael, California, United States Hybrid / WFH Options
LHH Recruitment Solutions
PowerShell Scripting? What's the last thing they has to change or modify in Powershell scripting? Experience with MS Azure 5+ years of applied knowledge of endpoint technologies and security tools. 5+ years of IT security principles and risk mitigation strategies. Knowledge of enterprise networking concepts and Active Directory. including DNS, DHCP, and Group Policy Proficiency with endpoint … management tools - experience with various tools, familiar with MS Intune (would not consider himself as advanced in Intune, just yet). 5+ years of demonstrated knowledge of informationsecurity, compliance, and IT audit requirements. 5+ years of demonstrated intermediate-level proficiency with Microsoft Office products including Word, Excel, PowerPoint, and Outlook. Email your Word doc resume (no PDF … and learn more! Pay Details: $115,000.00 to $130,000.00 per year Search managed by: Heather Allen Equal Opportunity Employer/Veterans/Disabled To read our Candidate Privacy Information Statement, which explains how we will use your information, please navigate to The Company will consider qualified applicants with arrest and conviction records in accordance with federal, state More ❯
The Opportunity We are looking for a Cybersecurity Engineer to join our dynamic team responsible for Cybersecurity applications spanning a global enterprise retail environment. Your Impact You will develop security solutions that align with our goals and industry standards. You will be an important hands-on informationsecurity technical resource and subject matter expert. You will work … with teams and communicate complex technical concepts to all partners. What you will do Provide implementation and operations support for security event and information monitoring, digital certificate and key management processes, endpoint security, and web application security. Perform infrastructure security platform implementation, patching, and lifecycle management. Provide guidance to all lines of business on security related to encryption, PKI, certificates, endpoint security, SEIM, and web application security. Create and update run books, standard operating procedures, and customer-facing instructions. Participate in on-call rotation for Cybersecurity Infrastructure Engineering. What You Bring Bachelor's degree in computer science, InformationSecurity, or equivalent system security engineering experience. 2+ years of experience. More ❯
and ongoing maintenance of Identity and Access Management (IAM) policies and procedures. You will play a key role in identifying, assessing, and mitigating IAM-related risks to ensure the security and compliance of organizational access systems. As an IAM Specialist, you will collaborate with cross-functional teams to deliver global IAM services, streamlining identity and access management across the … to contribute to a secure and efficient IAM framework while supporting a leading organization in the systems integration space. If you have experience in IAM solutions, risk management, and security best practices, apply now! Responsibilities: Provide consultancy on IAM Best Practices (technical, governance & process) to different stakeholders/teams. Overall responsibility for the development and maintenance of IAM policies … Act as a point of escalation for any IAM alerts or issues which has been raised by other departments, or potentially from monitoring systems. Keep abreast of trends in informationsecurity and be able to propose proactive mitigation as appropriate. Skills/Must have: Significant prior experience as a subject matter expert within Identity and Access Management, in More ❯
Effective listener and influencer with a demonstrated ability to create and build strong cross-functional partnerships. Excellent communication, presentation, and writing skills with analytical and problem-solving capabilities. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks come with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
while managing multiple projects. A natural self-starter - analyzing complex issues, identifying opportunities, and developing actionable plans. • Familiarity with Open Banking practices, regulations, and standards is strongly preferred. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
Select how often (in days) to receive an alert: SAP FICO & S/4 HANA Consultant Location: UK - Hatfield Job-ID: 214160 Contract type: Fixed Term Contract Business Unit: Information Technology Life on the team An excellent fixed-term contract opportunity has arisen for a SAP FICO & S/4 Hana Consultant to become part of Computacenter, a large … practice and service offerings to ensure consistency of service Makes decisions which impact on the success of assigned projects i.e. results, deadlines and budget Act in accordance with Computacenter InformationSecurity Policies and report any potential or actual Security events or other Security risks to the organisation What you'll need Strong understanding of finance business More ❯
on them with practical and commercial recommendations Providing advice and training to support Line 1 with managing risks associated with critical issues/incidents that may affect customer, or informationsecurity objectives Providing Line 2 review, challenge and insight into new security products as part of a security risk assessment process Assist with and oversee the … identification of suitable Risk Management solutions (GRC), risk management information (i.e. dashboards) and automation of risk processes The ideal candidate for the role of Technical Risk Specialist will have: In depth knowledge and experience of IT related risks, IT risk change, techniques and implications across platforms Broad commercial experience with experience in the financial services sector preferable, operating in More ❯
Employment Type: Permanent
Salary: £55000 - £70000/annum Plus benefits package
stipulating the required changes, and instigating these. You know how to initiate remedial action. Development process optimisation. You can identify process optimisation opportunities and drive implementation of proposed solutions. Information security. You know about informationsecurity and can design solutions and services with security controls embedded, specifically engineered as mitigation against security threats as a … skills Containerisation and orchestration technologies (Docker & Kubernetes) Good knowledge of internet communication concepts and protocols - TCP/IP, DNS, HTTP Experience of deploying Continuous Integration solutions An awareness of security considerations in web application deployment Monitoring/Logging aka ELK, Prometheus/Grafana etc Strong AWS knowledge - EC2, EKS, RDS, Aurora, networking, cost management. More ❯
stipulating the required changes, and instigating these. You know how to initiate remedial action. Development process optimisation. You can identify process optimisation opportunities and drive implementation of proposed solutions. Information security. You know about informationsecurity and can design solutions and services with security controls embedded, specifically engineered as mitigation against security threats as a … skills Containerisation and orchestration technologies (Docker & Kubernetes) Good knowledge of internet communication concepts and protocols - TCP/IP, DNS, HTTP Experience of deploying Continuous Integration solutions An awareness of security considerations in web application deployment Monitoring/Logging aka ELK, Prometheus/Grafana etc Strong AWS knowledge - EC2, EKS, RDS, Aurora, networking, cost management. More ❯
and our relentless drive to deliver the most successful outcomes, we align our capabilities to our customers' objectives to create a lasting positive impact. We serve the Infrastructure; Nuclear, Security & Environmental; Energy; Mining & Metals, and the Manufacturing and Technology markets. Our services span from initial planning and investment, through start-up and operations. The Kilns 3&4 Project is … providing software training, metrics, and planning. Your work will help ensure efficient and accurate management of documents and records. The Records Management Coordinator will receive supervision from the Project Information Manager. They will provide a service to effectively support activities related to both records and document management and assist in ensuring quality and security aspects are maintained efficiently. … travel between work sites if requested whilst providing support to the Project Major Responsibilities: • Collaborative working with and amongst different stakeholder teams. • Support the recording and management export-controlled information records • Provide guidance to teams on best practice document management, and appropriate use of information systems. • Reconcile data and documents between different systems and identify gaps based on More ❯
Data Quality Analyst for a leading public sector organisation undergoing a significant IT transformation. In this role, you'll focus on data validation, profiling, and cleansing , helping ensure that information across core systems is accurate, complete, and reliable. You'll work across multiple teams to enhance how data is managed and reported, supporting the organisation's operational and strategic … trails What we're looking for: Strong experience in data validation, cleansing, and profiling Confident in writing T-SQL queries for data analysis Awareness of GDPR, data protection, and informationsecurity Ability to communicate complex data issues clearly to technical and non-technical audiences A logical, analytical approach and attention to detail Experience with records management systems is More ❯
Gloucester, Gloucestershire, Quedgeley, United Kingdom
Data Careers Ltd
Data Quality Analyst for a leading public sector organisation undergoing a significant IT transformation. In this role, you'll focus on data validation, profiling, and cleansing , helping ensure that information across core systems is accurate, complete, and reliable. You'll work across multiple teams to enhance how data is managed and reported, supporting the organisation's operational and strategic … trails What we're looking for: Strong experience in data validation, cleansing, and profiling Confident in writing T-SQL queries for data analysis Awareness of GDPR, data protection, and informationsecurity Ability to communicate complex data issues clearly to technical and non-technical audiences A logical, analytical approach and attention to detail Experience with records management systems is More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Data Careers
Data Quality Analyst for a leading public sector organisation undergoing a significant IT transformation. In this role, you'll focus on data validation, profiling, and cleansing , helping ensure that information across core systems is accurate, complete, and reliable. You'll work across multiple teams to enhance how data is managed and reported, supporting the organisation's operational and strategic … trails What we're looking for: Strong experience in data validation, cleansing, and profiling Confident in writing T-SQL queries for data analysis Awareness of GDPR, data protection, and informationsecurity Ability to communicate complex data issues clearly to technical and non-technical audiences A logical, analytical approach and attention to detail Experience with records management systems is More ❯
corporate_fare Google place London, UK Apply Bachelor's degree in Computer Science or a related technical field such as computer networking, informationsecurity or equivalent practical experience. 5 years of experience in security engineering, DevSecOps, or platform engineering roles. Experience with deployment and orchestration technologies (such as Docker, Kubernetes, Mesos, OpenStack, Puppet, Chef, Salt, Ansible, Jenkins … . Experience with Unix/Linux operating systems internals and administration, or networking and debugging/troubleshooting. United Kingdom Security Vetting Developed Vetting (DV) clearance. Preferred qualifications: Experience designing, building, and deploying cloud-based solution architectures. Ability to execute in a customer-focused environment and advocate for partners and customers in a cross-functional organization. Ability to work on … creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See More ❯
Data Quality Analyst for a leading public sector organisation undergoing a significant IT transformation. In this role, you'll focus on data validation, profiling, and cleansing , helping ensure that information across core systems is accurate, complete, and reliable. You'll work across multiple teams to enhance how data is managed and reported, supporting the organisation's operational and strategic … trails What we're looking for: Strong experience in data validation, cleansing, and profiling Confident in writing T-SQL queries for data analysis Awareness of GDPR, data protection, and informationsecurity Ability to communicate complex data issues clearly to technical and non-technical audiences A logical, analytical approach and attention to detail Experience with records management systems is More ❯