processes. Preferred Qualifications Bachelor's degree in IT, Computer Science, or a related field. Experience in the financial sector. Strong awareness of enterprise and cybersecurity challenges. Excellent judgement in balancing rapid development with long-term maintainability. Commitment to writing automated tests as part of development. Additional Requirements Right to more »
dedicated to educating and entertaining kids during school holidays. Our courses cover everything from the basics of computer programming to robotics, advanced programming, and cybersecurity, designed to prepare children for the digital world. Were looking for tech-savvy undergraduates with a passion for teaching. You should have a good more »
Employment Type: Contract
Rate: From £12.89 to £15.02 per hour + £100 engagement bonus
Senior Cybersecurity Architect - £800 - £1000 Per Day (Rolling Contract) - London/Hybrid Tech Stack - Senior Security Architect, Financial Services, Financial Conduct Authority (FCA) Regulations, IT Risk Management, Network Security, Data Loss Prevention (DLP), Identity Access Management (IAM), Network Access Control (NAC), Next-Generation Firewall (NGFW), Cloud Security (exp. AWS/… Azure/GCP), Endpoint Security (Endpoint Detection and Response Solutions (EDR)), IoT Security, Application Security, URGENT, CISSIP, CISM, SABSA, TOGAF, Senior Cybersecurity Architect). We have several fantastic new roles including a Senior Security Architect position to join a growing global financial giant. This is your chance to work for … objectives. Therefore, it is even more crucial that an organisation protects what it builds. The successful candidate will be an integral part of the Cybersecurity Architecture Team. You will be responsible for the design and implementation of the enterprise-wide security strategy which will be flexible in ensuring current and more »
SOC Tier 2 Cybersecurity Analyst 18 Months - PAYE Contract until DEC 2025 Must have current UK Security Clearance Hybrid working 50/50 You will play a critical role in identifying, analysing, and mitigating complex security incidents and breaches within organizations networks and systems. You will work with a wide … suite. Proficiency in Kusto Query Language (KQL). Experience with the creation, configuration and use of Playbooks, Notebooks and Workbooks. Strong understanding of advanced cybersecurity concepts, threat landscape, and attack methodologies. Demonstrated experience in conducting in-depth incident analysis, threat hunting, and forensic investigations. People Source Consulting Ltd is acting more »
Our client is seeking a dedicated and knowledgeable Security identity access Manager to join their dynamic team. This role sits within the CyberSecurity product group, focusing on Identity & Access platforms for Privileged Access Management and Identity Governance and Administration. The successful candidate will have the opportunity to deliver enterprise … as a subject matter expert in identity and access technologies. This role offers an exciting opportunity to drive forward the Digital Identity function within CyberSecurity, creating a community of inter-departmental identity and access teams. Opportunity to be a subject matter expert in identity and access technologies Drive forward … the Digital Identity function within CyberSecurity Create a community of inter-departmental identity and access teams What you'll do: As a Security identity acess Manager, you will play a pivotal role in shaping our client's cybersecurity landscape. You will be at the forefront of developing and more »
possible, delivering across set responsibilities and role requirements.The Head of GRC is responsible for building and leading the GRC team, in line with the CyberSecurity Strategy. This role requires a deep understanding of: Information Security Risk Management Risk Management Security Policies Assurance Tools Strong background in Cloud Technology This … Culture and Awareness function - enabling GRC to inform about better cyber behaviour Oversee the day-to-day operations of the information security function, encompassing cybersecurity governance, risk management, compliance, and assurance functions Clearance Requirements:The post holder will have to hold active SC clearance - candidates without active SC Clearance more »
Privileged Identity Management, Network Access Control, Secure access service edge) role will join the global PMO for 12 months to support projects within the CyberSecurity/Information Security global space. To be considered for this Business Analyst - Information Security(PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged Identity … Management, Network Access Control, Secure access service edge) role, it's ideal you have: 3-5 years within a similar position Information/CyberSecurity exposure (ideally within an Infosec/CyberSec role Professional services experience Duties, Responsibilities & Person Specification Business process mapping Identify, define and document business requirements and more »