into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical
research, code/script analysis, reverse engineering, exploitation, and documentation.- Identifying, testing, and implementing cutting-edge automated tools or enhancing existing ones to optimize vulnerabilitymanagement efficiency and effectiveness.- Developing and refining code/scripts to bolster vulnerability detection, remediation/mitigation, and operational functions.- Integrating vulnerability scanning and configuration hardening in cloud environments (e.g., AWS, Microsoft Azure, Google Cloud Platform).- Conducting vulnerability scanning and reporting in alignment with the application development continuous integration and continuous delivery pipeline, streamlining work efforts through efficient use of security tools.- Spearheading security initiatives and projects with a more »
you. Join them by being a key player in their innovative and forward-thinking team! Responsibilities: Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure products and processes are compliant, resilient, and audit-ready Ensure products comply with GDPR, CFIUS, and … end ownership of Data Controls projects to achieve success with relevant stakeholders Manage current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future strategic requirements, focusing on Process, People, and Technology Strong communication and negotiation skills are essential to ensure that key … Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetration testing, vulnerabilitymanagement, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerabilitymanagement duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerabilitymanagement, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerabilitymanagement You will advise on Security best practices, and act more »
Center (SOC) team. Your role will involve managing both external and internal SOC personnel, overseeing security monitoring and analysis, incident response, threat intelligence, and vulnerabilitymanagement activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC team and a more »
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerabilitymanagement tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Information Security Architecture team in matters of technical security at company Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerabilitymanagement, and responding to technical audits. Supporting the wider Information Security team in promoting security awareness and best practice throughout the company. Liaising … with other technical teams to transfer and share knowledge. Liaising with 3rd party security partners and working with project management teams on key projects. Providing out of hours support for critical/high severity cyber detections, or availability issues with key security systems (uncommon). Awareness of and compliance … relevant rules and regulations in relation to financial crime & conduct. Technical requirements: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of more »
per week in office) Permanent £68,000 – 92,000 per annum + benefits + bonus Information Security – Specialist – Network Security – Cloud Security - Privileged Access Management - Windows Server - Active Directory - SQL Server A great opportunity has arisen for an Information Security Operations Specialist to join a well-respected London Market … timely manner. Assisting the Information Security Architecture team in matters of technical security at. Liaising with 3rd party security partners and working with project management teams on key projects. Supporting the wider Information Security team in building the Internal Control Framework (ICF), vulnerabilitymanagement, and responding to … security awareness and best practice throughout the Group. Required skills/experience: Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. Working knowledge of Privileged Access Management (PAM) best practice, technologies, and procedures. Working knowledge of more »
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerabilitymanagement tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test and Validation process, support Cyber Risk Assessment, and drive the Cyber Assurance programme across the bank. Security Engineering Advice: Advise … regulations not directly supported by our global framework. Security Control Implementation: Work with technology infrastructure teams to implement security controls across various platforms. Incident Management: Investigate, coordinate, and address Information and Cybersecurity incidents, including forensic evidence collection and security event investigation. Incident Analysis and Communication: Analyze infrastructure security incidents … convey technical analysis to management, and act as a liaison during security investigations. Regulatory Response: Respond to regulatory requests, manage engagements with regulators, and coordinate compliance-related investigations. Preferred Qualifications and Experience: Experience: A strong background in Cybersecurity, Systems, Infrastructure, Network, and Cloud. Technical Skills: Proficient in applications deployments more »
vision and align support frameworks to enhance and achieve them.Exceed user expectations and excel at service delivery through statistical analysis, reporting, feedback and service management meetings with colleagues throughout the business.Drive adherence to ensure Service levels are achieved and exceeded, proved through robust and trusted reporting and continuous monitoring …/technology updates.Develop and maintain new support processes.Develop knowledgebase process and educate global support team on best practices.Membership and ownership in the Major incident management framework.Ensure succession, training and development plans are in place with each colleague in the team.Coach and develop the teams daily.Actively encourage, motivate, and support … issues are being addressed in an acceptable timeframe and in compliance with internal SLA’s.Identify, capture, and provide monthly reporting on key service desk management metrics & KPI’s.What we’re looking forKey Skills & ExperienceDeep experience of Service support solutions, processes, and technologiesDemonstrable experience to drive value statements and solutionsDemonstrable more »
SW9, Oval, Greater London, United Kingdom Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerabilitymanagement and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »
technologies. Proficiency in programming and scripting languages, especially Terraform and YAML (PowerShell is a plus). Knowledge of Anti-virus, Endpoint Detection and Response, VulnerabilityManagement, and Patching. Familiarity with Security Information and Event Management (SIEM). Experience with CI tools, such as Azure DevOps or GitHub more »
governance and processes and procedures to support a structured approach to the team’s ways of workingYou’ll be part of a broader Enterprise VulnerabilityManagement team, working among people skilled in scanning, pen testing, data analytics and driving security improvements with other teams. You’ll be part … and report when the control posture is outside of the Group’s appetite and good judgement to call it outExperience of working in technology management, cyber security, engineering, or risk & control management is preferred, including knowledge of relevant frameworks such as NIST and CSA CSM.What You’ll Get more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerability scanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will be … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerabilitymanagement technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT more »
on different aspects such as source/destination addresses, usernames, and process names)Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability managementA sound understanding of TCP/IP and networking conceptsUnderstanding of network design principles with and knowledge of the OSI model.Flexibility around being on more »
Title: Security Engineer Salary: £80,000 to £100,000 We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure. … development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerabilitymanagement, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and … Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (e.g., Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. In addition to your technical prowess, we more »
The worldwide data management software market is massive (According to IDC, the worldwide database software market, which it refers to as the database management systems software market, was forecasted to be approximately $82 billion in 2023 growing to approximately $137 billion in 2027. This represents a 14% compound … reflect the current state of MongoDB’s productsCoordinate responses to high-profile supply chain eventsRequirementsBasic understanding of the following security concepts: encryption, access controls, vulnerabilitymanagement, SSDLC, incident response, and business continuity/disaster recovery as they apply in a cloud environmentBasic understanding of the following cloud networking more »
response exercises. Develop and implement Security Monitoring processes to detect and respond to cyber security incidents Working closely with engineering team to create robust vulnerabilitymanagement processes. The successful Candidate will have: Proven experience with Managed Detection and Response providers (MDR). Hands on experience with Endpoint Detection more »
to contain and remediate security incidents. Threat Intelligence Keep up to date with latest trends in cybersecurity threats, vulnerabilities, and best practices. Security Infrastructure Management Assist with the maintenance of existing security tools and technologies, such as SIEM, EDR and firewalls. Contribute to the selection of new security tools. … Documentation and Reporting Create and maintain detailed documentation of security processes and procedures. Generate regular reports on security metrics, incidents, and trends for management review. Collaboration and Communication Work closely with other IT teams to identify and remediate security vulnerabilities. PROFESSIONAL EXPERIENCE/QUALIFICATIONS/SKILLS Hands on experience … with security tools such as SIEM/EDR and vulnerability Management. Proven experience in a security operations role. In-depth knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience working in a large, multinational, complex company. Good knowledge of infrastructure concepts – such as Windows/Linux, DNS, AD more »
and departments to align infrastructure initiatives with business goals and priorities. Monitor infrastructure performance and capacity, and proactively address any issues or bottlenecks. Manage vulnerabilitymanagement What we’re looking for: Proven experience leading Infrastructure Teams Strong technical skills across a broad range of IT disciplines, including network … administration, system architecture, cybersecurity, and cloud computing. Experience delivering on a migration to Azure cloud Experience with ITIL or other IT service management frameworks is highly desirable. Knowledge of Microsoft Windows server and desktop operating systems PowerShell scripting, process automation using terraform. A good understanding of networking principles as more »
City of London, London, Farringdon, United Kingdom Hybrid / WFH Options
Service Care Solutions
update corporate device builds. Manage end user software technology platforms (O/S, Applications, System Tools/Agents, VPN). Operate end user computing management platforms (Defender for Endpoint, Intune, AzureAD, Sophos Central, PMP, Autopilot). Coordinate activities related to changes within the end user computing environments, including patch … and Architecture Teams to ensure effective security controls. Provide feedback to the Architecture and Infrastructure team on platforms and new solutions. Participate in the VulnerabilityManagement Process to remediate identified vulnerabilities. Support IT Operation Teams, including Service Desk, with technical issues in EUC device deployment or management. Liaise … Manager, Active Directory, and Endpoint/Cloud Apps Security. Proven experience in complex project implementation and ownership of technology projects. Familiarity with other Device Management platforms. Experience working within an ITIL environment. Proficient in desktop image configuration, automation, and management. Experience in implementing and maintaining Microsoft Autopilot environment. If more »