independent assurance of the internal control structure within the firm's technology infrastructure and business systems. Leverage knowledge and experience in technology infrastructure, application development, cybersecurity, electronic trading, risk management and anti-financial crime systems. Requires: Master's degree (U.S. or foreign equivalent) in Computer Science, Computer or Electronics Engineering, Business Analytics, Information Systems, or a related field and … to business risks in integrated audits/projects; utilizing concepts related to information systems, networks, system architecture, design, information security, technology resiliency, risk and control governance and metrics, incident management, SDLC, vulnerabilitymanagement, and data protection in audits/projects; and collaborate with partners between first and second lines-of-defense to inform risk evaluation of compliance More ❯
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
City of London, London, United Kingdom Hybrid / WFH Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
MFK Recruitment
and secure core client infrastructure and cloud environments. Ensure centralised security, monitoring, and incident response platforms operate effectively. You will collaborate closely with our Service Desk, Projects and Account Management teams to maintain high standards of service, document solutions and mentor junior engineers in line with cybersecurity best practices and frameworks such as ISO27001, NIST, and Cyber Essentials Plus. … and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerabilitymanagement, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement More ❯
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
City of London, Greater London, UK Hybrid / WFH Options
Travelfusion
and security alerts for suspicious activity and potential security breaches. Incident Response: Act as a first responder to security incidents, investigating breaches, containing threats and helping to restore systems. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration tests to identify weaknesses in systems and implement necessary improvements. Security Implementation: Improve Security measures. Data Protection & Compliance: Ensure that … Mindset: The ability to analyzs large amounts of data to identify anomalies and potential risks. Technical Proficiency: Knowledge of operating systems, firewalls, encryption, VPNs and security information and event management (SIEM) systems. Attention to Detail: Meticulous in reviewing data and systems to catch even minor security flaws. Strong Communication: Ability to clearly communicate findings and recommendations to both technical More ❯
Management Coordinator/Technical Writer Location: Charlotte, NC- Onsite Duration: Long term contract Banking domain exp. is must Candidates who can work independently are more preferred Skills: The ideal candidate will have deep experience identifying, collecting, and organizing large amounts of technical content across many disparate groups, bringing knowledge to bear in automated processes. Experience as curator of technical … procedures, work instructions, job aids, technical manuals) with a large complex organization Ability to perform technical writing as well as guide other tech writers Experience with Industry standard content management and knowledge automation solutions (Confluence, Service Now, or other content management systems (CMS) and content management databases for ECM and WCM) Experience/knowledge with Infrastructure patching … or Security Vulnerabilitymanagement Required Skills: Technical Writing Experience Skilled in organizing large volumes of content across teams and platforms Proficient in CMS tools like Confluence, ServiceNow, ECM/WCM platforms Understands how to automate and optimize knowledge workflows General understanding of server infrastructure, patching, and security operations More ❯
maintain compliance through practical Consulting and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC) delivers an array of services … to maintain or improve the levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of service. Preparation of service delivery … improve levels of service. Monitoring of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio components based on industry trends More ❯
Why we need this role? This role is critical to protecting both internal telecom infrastructure and customer-facing security services. It ensures the secure deployment and management of technologies across backbone, edge, and cloud environments, while supporting the delivery and integration of managed security solutions for customers. The role plays a key part in incident response, vulnerabilitymanagement … to secure IP/MPLS transport, SDN platforms, automation tools, and cloud workloads. Monitor and analyse security events and alerts, responding to incidents and escalating as appropriate. Assist with vulnerability assessments, patch management validation, and configuration hardening. Document and maintain infrastructure security standards, configurations, and runbooks. Support & Collaboration: Participate in security incident response, root cause analysis, and remediation … IP, routing, firewalls, VPN, and network segmentation principles. Hands-on experience with security tools such as firewalls (Fortinet, Palo Alto, etc.), SIEM/SOAR, IDS/IPS, EDR, or vulnerability scanners. Familiarity with Linux, scripting (Python, Bash), and infrastructure-as-code concepts. Knowledge of secure configuration standards (e.g., CIS benchmarks) and common protocols (e.g., BGP, DNS, SNMP). Experience More ❯
Sr. Cloud Security Architect professionals to be part of leading-edge technology projects. Cognizant's Cloud, Infrastructure & Security Services Practice provides end-to-end solutions covering architecture, design, implementation, management, and on-going support across the entire enterprise technology infrastructure. Our services include a spectrum of management, consulting, and systems integration services to help our clients maximize value … Shield Advanced, AWS Secrets Manager, AWS Inspector, AWS Macie, AWS GuardDuty, AWS Detective, AWS CloudTrail, and AWS Security Hub. Ensure cloud environments meet organizational and compliance security standards, Firewall Management Manage, configure, and troubleshoot Checkpoint Firewall to maintain network perimeter security and prevent unauthorized access, Infrastructure as Code (IaC) Develop and maintain IaC using AWS CloudFormation or Terraform for … automated deployment, configuration management, and consistent infrastructure provisioning. Security Configuration and Optimization Configure and optimize security measures, including IAM policies, security groups, network access controls, and encryption protocols. Monitoring and Incident Response Monitor AWS security alerts and incidents using AWS tools. Respond to and mitigate threats in real-time, conducting post-incident analysis and documentation. Risk and Compliance ManagementMore ❯
networks, SSO, and network segregation principles Strong communicator: able to advise IT teams on practical security steps, not just theory Experience mentoring staff or junior analysts (no direct line management required) Adaptability to a medium-sized, SME environment What you’ll be doing: Security oversight: Guide InfoSec operations with practical, hands-on input on incidents and risk mitigation Data … use: Microsoft Purview – Data governance and compliance Azure (and AWS) – IAM, monitoring, encryption Defender, web proxy, CrowdStrike-equivalent – Endpoint & email protection Panorays – Third-party risk Protecht – Enterprise risk & audit management Rapid7/Armis – Vulnerabilitymanagement and threat detection Why this role? Hands-on, high-impact role in a dynamic SME environment Influence across security operations, governance, and … data management Work alongside experienced InfoSec leadership in a culture that values mentoring, collaboration, and ethical practice IT Security Manager | Zero Trust, Azure Security, ISO27001 | Global Payments Company More ❯
networks, SSO, and network segregation principles Strong communicator: able to advise IT teams on practical security steps, not just theory Experience mentoring staff or junior analysts (no direct line management required) Adaptability to a medium-sized, SME environment What you’ll be doing: Security oversight: Guide InfoSec operations with practical, hands-on input on incidents and risk mitigation Data … use: Microsoft Purview – Data governance and compliance Azure (and AWS) – IAM, monitoring, encryption Defender, web proxy, CrowdStrike-equivalent – Endpoint & email protection Panorays – Third-party risk Protecht – Enterprise risk & audit management Rapid7/Armis – Vulnerabilitymanagement and threat detection Why this role? Hands-on, high-impact role in a dynamic SME environment Influence across security operations, governance, and … data management Work alongside experienced InfoSec leadership in a culture that values mentoring, collaboration, and ethical practice IT Security Manager | Zero Trust, Azure Security, ISO27001 | Global Payments Company More ❯
systems proactively for suspicious activity. Maintain and update cyber security procedures and documentation. Provide IT support when required, including first, second, and third line assistance. Attend monthly cyber/vulnerability meetings and contribute expertise as needed. Essential Skills & Experience: Minimum 2 years' experience in an IT security-related role ???. Experience with vulnerabilitymanagement and reporting tools. … verbal communication skills to explain risks to both technical and non-technical stakeholders. CompTIA Security+ or equivalent qualification ??. Desirable: Experience with SIEM systems, EDR, IDS/IPS, and vulnerability scanners. Previous experience in a law firm or professional services environment. Familiarity with Practice Management Systems (PMS) and Document Management Systems (DMS). Personal Attributes: Methodical, thorough More ❯
Microsoft 365, including identity services and end-user devices. As the primary point of contact for security-related matters, the person will manage our external SOC, oversee patch and vulnerabilitymanagement, coordinate penetration tests, and lead the operation of the Microsoft Defender XDR suite including Sentinel. It will also play a key role in incident handling and serve … for all internal and external security-related inquiries. Manage and coordinate with the external Security Operations Center ensuring comprehensive monitoring and timely response to potential threats. Support the Security Management team in the development, validation, and ongoing improvement of security playbooks, ensuring processes remain up to date with evolving threats. Take an active role in incident response efforts, leading … the detection, investigation, and remediation of security incidents. For example, this includes organising post-incident reviews and reporting on root-cause analysis. Lead patch management processes, ensuring that critical vulnerabilities are identified and remediated within agreed service-level timelines. Manage externally conducted penetration testing activities, including planning, oversight, and tracking remediation of findings to closure. Administer and operate the More ❯
Wokingham, Berkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
architect, and maintain network security infrastructure including Firewalls, IDPS, Proxies, Load Balancers, VPNs, and WAFs. Develop and manage firewall policies, network access controls, IAM solutions, MFA, RBAC, and privilege management . Ensure alignment of security measures with compliance standards (GDPR, HIPAA, PCI DSS). Conduct regular security audits and assessments to identify and remediate risks. Apply industry frameworks such … as NIST Cybersecurity Framework, ISO 27001, CIS Controls . Oversee and enhance security technologies: SIEM, vulnerabilitymanagement, cloud security (OCI/Azure/AWS), PKI, cryptography, web/email security, logging and monitoring . Monitor network traffic for anomalies and potential breaches. Collaborate with IT teams (network engineers, sysadmins, developers) to ensure a holistic approach to security. Communicate More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cititec
SecOps Lead , you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You’ll oversee incident management, enhance detection and response processes, and strengthen the company’s overall security posture. Key Responsibilities Serve as the primary contact for the MDR partner, managing the relationship, conducting service … plan (IRP) and playbooks in collaboration with the MDR provider. Translate technical security risks into actionable business recommendations for stakeholders at all levels. Contribute to broader cybersecurity initiatives , including vulnerabilitymanagement, cloud security, data protection, and governance, risk & compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. More ❯
SecOps Lead , you will act as the main liaison between internal security, engineering, and IT teams, and an external Managed Detection and Response (MDR) partner. You’ll oversee incident management, enhance detection and response processes, and strengthen the company’s overall security posture. Key Responsibilities Serve as the primary contact for the MDR partner, managing the relationship, conducting service … plan (IRP) and playbooks in collaboration with the MDR provider. Translate technical security risks into actionable business recommendations for stakeholders at all levels. Contribute to broader cybersecurity initiatives , including vulnerabilitymanagement, cloud security, data protection, and governance, risk & compliance (GRC). Requirements In-depth understanding of the incident response lifecycle — preparation, detection, containment, eradication, recovery, and lessons learned. More ❯
Maidenhead, England, United Kingdom Hybrid / WFH Options
Audit & Risk Recruitment
managing and enhancing the IT and Information Security risk landscape. Reporting directly to the Head of Risk and Assurance, you will play a key role in embedding effective risk management practices across the company's technology and cybersecurity domains. As a Risk & Assurance Manager, you'll be responsible for and have ownership for: Partnering with senior IT, Security, and … business leaders to embed risk management practices into operational processes and strategic initiatives. Owning and maintaining IT Risk and Control Matrices (RCMs) , ensuring they remain current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incident response, vulnerabilitymanagement), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO22301, NIST), ensuring alignment with business objectives and regulatory requirements. Coordinating and representing IT risk in internal, external audits and certification processes (e.g., ISO 27001, Cyber Essentials, ISO22301, etc.), acting as the primary point of More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Advanced Resource Managers
Exceptional written and verbal communication skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CTL certification or higher is essential. Desirable Skills: Experience with Breach Attack Simulation tools … and methodologies. Experience in VulnerabilityManagement processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP environments, incorporating cloud-specific threats. Experience with ISO 27001 auditing/implementation, understanding the role of threat intelligence in compliance. Other advanced cybersecurity More ❯
Exceptional written and verbal communication skills, with the ability to articulate complex technical findings and nuanced threat intelligence insights clearly and concisely to diverse audiences. Strong organizational and time management skills, with a proven ability to effectively manage and prioritize multiple concurrent engagements. Current CREST CTL certification or higher is essential. Desirable Skills: Experience with Breach Attack Simulation tools … and methodologies. Experience in VulnerabilityManagement processes and integrating threat intelligence. Understanding of Risk Management frameworks and how threat intelligence informs risk assessments. Hands-on experience with security reviews of AWS, Azure, and GCP environments, incorporating cloud-specific threats. Experience with ISO 27001 auditing/implementation, understanding the role of threat intelligence in compliance. Other advanced cybersecurity More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
for an Information Security Officer to lead the organisation's security strategy, operations, and compliance efforts. This hands-on role blends strategic security architecture with day-to-day operational management and regulatory compliance oversight. The ideal candidate will establish and maintain security standards across the product portfolio, oversee secure system environments, and act as the primary contact for ISO … for new features and system changes. Evaluate and recommend security technologies and tools. Operational (40%) Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerability remediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerabilitymanagement and penetration testing programs. Maintain strong identity, access, and privilege management controls. Compliance More ❯
years’ experience in cybersecurity operations, ideally within a SOC or incident response environment. Proven expertise with QRadar (key focus), Splunk, or Microsoft Sentinel. Strong grasp of network traffic analysis, vulnerabilitymanagement, and ethical hacking techniques. Solid understanding of DFIR principles and evidence handling. Knowledge of ITIL processes – Incident, Problem, and Change Management. Comfortable working autonomously in a More ❯
matter expert for IT security operations, policies, and risk management. Monitor and respond to security alerts and incidents, working closely with internal SOC and Cyber teams. Conduct security reviews, vulnerability assessments, and compliance checks across infrastructure and cloud platforms. Ensure adherence to security frameworks, policies, and procedures (ISO27001, NCSC guidelines, etc.). Review and enhance access controls, identity management … detection use cases. What You Will Ideally Bring Proven experience in an IT Security Officer or similar role within a complex IT environment. Strong understanding of cybersecurity frameworks, risk management, and compliance. Knowledge of patch and vulnerabilitymanagement processes. Ability to interpret security findings and translate them into actionable recommendations. Excellent communication and stakeholder management skills. More ❯
Richmond, Virginia, United States Hybrid / WFH Options
GENWORTH
and in the future. We are seeking a highly skilled Senior Hybrid Identity and Security Engineer to join our enterprise IT team. This role combines expertise in hybrid identity management, security architecture, advanced access control within Microsoft Entra ID (formerly Azure AD), and role-based access control management in Microsoft Purview. The ideal candidate will design, implement, and … on-premises Active Directory and cloud services. The position requires collaboration with operations, governance, and compliance teams in a large enterprise setting. What you will be doing Hybrid Identity Management: Create, manage, and deploy provisioning configurations from on-premises Active Directory to Microsoft Entra ID using Cloud Provisioning and Azure AD Connect. Configure and troubleshoot pass-through authentication (PTA … password hash synchronization (PHS), seamless single sign-on (SSO), and federation settings. Monitor and resolve identity synchronization issues, including logs, while ensuring secure integration. Role-Based Access Control Management in Purview: Design, implement, and manage Role-Based Access Control (RBAC) policies within Microsoft Purview. Ensure appropriate access controls are in place for data governance, compliance, and privacy requirements. Collaborate More ❯