it job board logo
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
  • Recruiting? Post a job
  • Sign in
  • Sign up
  • Home
  • Find IT Jobs
  • Register CV
  • Career Advice
  • Contact us
  • Employers
    • Register as Employer
    • Pricing Plans
Sorry, that job is no longer available. Here are some results that may be similar to the job you were looking for.

92 jobs found

Email me jobs like this
Refine Search
Current Search
senior detection and response engineer
La Fosse Associates Limited
Senior Security Analyst
La Fosse Associates Limited Leicester, Leicestershire
I'm partnering with a well-established, global organisation looking for a Senior Security Analyst to play a key role in strengthening their detection and response capability across a large and diverse environment. This position sits at the intersection of incident response, automation and detection engineering, which means its ideal for someone who enjoys solving problems and building security processes. Key Areas include: Build and refine detection logic across SIEM, EDR and related tooling Create automated SOAR workflows and playbooks to streamline response Lead investigations into complex or high severity incidents Carry out deep-dive forensic work Track and evolve security metrics to demonstrate improvements in detection and automation Work closely with engineering teams and external partners to expand monitoring coverage Support and mentor the development of Junior Analysts Key details: Salary: Up to £65,000 Location: Hybrid - 3 days onsite (East Midlands) Benefits: Pension & wider package If this sounds like something you'd be interested in, please apply now or email your CV to (see below) :)
21/05/2026
Full time
I'm partnering with a well-established, global organisation looking for a Senior Security Analyst to play a key role in strengthening their detection and response capability across a large and diverse environment. This position sits at the intersection of incident response, automation and detection engineering, which means its ideal for someone who enjoys solving problems and building security processes. Key Areas include: Build and refine detection logic across SIEM, EDR and related tooling Create automated SOAR workflows and playbooks to streamline response Lead investigations into complex or high severity incidents Carry out deep-dive forensic work Track and evolve security metrics to demonstrate improvements in detection and automation Work closely with engineering teams and external partners to expand monitoring coverage Support and mentor the development of Junior Analysts Key details: Salary: Up to £65,000 Location: Hybrid - 3 days onsite (East Midlands) Benefits: Pension & wider package If this sounds like something you'd be interested in, please apply now or email your CV to (see below) :)
Technical Specialist - Detection, Engineering and Automation
Fidelity International
Technical Specialist - Detection, Engineering and Automation申请locations: Kingswood Fields Officetime type: Full timeposted on: 今天发布time left to apply: 结束日期:2026年7月31日 (申请时间还剩 30+ 天)job requisition id: J67604# About the Opportunity Job Type: PermanentApplication Deadline: 31 July 2026 Job Description Title Technical Specialist -Detection, Engineering and Automation Department FIL - Global Cybersecurity Operations Location Kingswood, Surrey Reports To Senior Manager - Detection, Engineering and Automation Level 4 We share a commitment to making things better for clients and each other. We continually explore new technology and different ways of working to put our clients first. So bring your boldest ideas to our Cyber Defense Operations team and feel like you're making progress. About your team Technology function across FIL is responsible for all global aspects of Technology, Digital, Cybersecurity, and Innovation. Fidelity is a value-driven, customer-obsessed organization and in Technology we are fortunate to play a direct role in helping our clients with one of the most important aspects of their lives - their financial well-being. Within the Technology function is our Global Cyber & Information Security (GCIS) that operates enterprise security services and controls. These are designed to mitigate Cyber and Information Security risks ensuring that Fidelity's business operates securely. The Technical Cybersecurity teams monitor both the internal and external threat environment, responding to security alerts and events in close to real time, as well as providing security assurance and access management services across the enterprise technology and business environment. Our global innovative Cyber Defence Operations team sits within GCIS and provides proactive, cutting-edge solutions to protect clients' digital assets and infrastructure against evolving cyber threats. The Detection Engineering & Automation team within our Global Cybersecurity Operations focuses on the development of automated detection capabilities to reduce manual effort of the Global Cybersecurity Operations team freeing up time to focus on real cyber threats. They ensure that security controls are performing effectively and efficiently and that they are feeding into automation technologies allowing the organisation to make intelligent correlated decisions. About your role The Detection Engineering & Automation Specialist plays a critical hands on role in strengthening the Global Cybersecurity Operations capability by building, maintaining and enhancing the security tooling that underpins our detection and response functions. The ideal candidate will work deeply across technologies including SIEM, SOAR, EDR, email security and cloud security platforms, contributing engineering expertise to ensure these controls operate effectively and deliver high quality telemetry. You will be responsible for developing and improving detections, building CI/CD pipelines, onboarding new log sources, implementing automation and supporting technical investigations during security incidents. The ideal candidate has experience using a wide range of security technologies to enhance detection coverage, streamline analyst workflows and support the ongoing maintenance and optimisation of critical security controls. This role is essential in supporting engineering maturity and ensuring our cyber defence capabilities remain modern, integrated and responsive to evolving threats. About you Key Responsibilities The Detection, Automation and Engineering Specialist will be responsible to: Build, maintain and enhance security detections using Sentinel as Code, ensuring accurate and high quality analytics. Develop and maintain CI/CD pipelines to automate deployment of detections, automation playbooks and configuration updates. Engineer and optimise SOAR automation and integrations to reduce manual analyst workload and streamline response processes. Onboard high value security logs into the SIEM from the backlog, ensuring quality, normalisation and integration into detection logic. Support SOC and CIRT during incidents by providing engineering expertise, rapid telemetry onboarding, and timely detection and automation enhancements. Maintain and improve security controls across SIEM, SOAR, EDR, email security and network detection tooling. Assess and implement tool updates, new features and product enhancements, ensuring their secure and effective adoption across the environment. Manage tooling related incidents with vendors and internal teams, ensuring business impact is known, communicated and minimised. Work with global engineering teams to deliver high priority backlog items and operational improvements. Collaborate with front line analysts to identify quick win improvements for detections, automation and tooling integrations. Produce clear documentation, reporting and quality checks to support engineering delivery and continuous improvement. Experience and Skills Required At least 4 years of experience working in a Detection Engineering function, or a combination of Detection Engineering and hands on engineering responsibilities within a SOC environment. Experience focusing on automation, engineering maturity and continuous improvement within security operations. Experience managing and maintaining security tools within a global environment, preferably within Financial Services. Hands on experience developing detections in Microsoft Sentinel, including strong KQL and detection as code practices. Proven ability to build and maintain CI/CD pipelines (Azure DevOps, GitHub Actions) for detection, automation and configuration deployments. Experience onboarding and operationalising new log sources into a SIEM, ensuring data quality, enrichment and alignment with detection logic. Practical experience engineering SIEM, SOAR or EDR platforms and improving their operational effectiveness. Experience supporting security incidents from an engineering perspective by enabling telemetry, building detections and enhancing automation under time pressure. Strong experience with cloud platforms, particularly AWS and Azure, including their native security telemetry and integrations. Experience with email security solutions (such as Proofpoint, Microsoft Defender for Office 365, or equivalent), with a solid understanding of how email telemetry can be used in detection engineering. Strong scripting skills (PowerShell, Python, Bash or JavaScript) for automation, integration and tooling improvements. Familiarity with YAML/JSON, IaC principles and modern automation frameworks. Knowledge of Azure and/or AWS cloud environments and their native security telemetry. Strong communication skills with the ability to take technical feedback from SOC/CIRT and translate it into meaningful engineering improvements. Analytical mindset with a passion for cybersecurity, process improvement and challenging inefficient workflows. Preferred Certifications: Microsoft SC 200, AZ 500, AWS Security Specialty, CySA+, SSCP, OSCP. Feel rewarded For starters, we'll offer you a comprehensive benefits package. We'll value your wellbeing and support your development. And we'll be as flexible as we can about where and when you work - finding a balance that works for all of us. It's all part of our commitment to making you feel motivated by the work you do and happy to be part of our team. For more about our work, our approach to dynamic working and how you could build your future here, visit For more about our work, our approach to dynamic working and how you could build your future here, visit As an international financial services organisation, we are in-scope of international regulations in the way that we carry out our work. This position is involved in work that is regulated by the FCA and/or the PRA and their Individual Conduct Rules (COCON) apply to it, along with any other regulation. We provide training on COCON and how it affects our employees. More information about COCON can be found in the Employment Handbook.
21/05/2026
Full time
Technical Specialist - Detection, Engineering and Automation申请locations: Kingswood Fields Officetime type: Full timeposted on: 今天发布time left to apply: 结束日期:2026年7月31日 (申请时间还剩 30+ 天)job requisition id: J67604# About the Opportunity Job Type: PermanentApplication Deadline: 31 July 2026 Job Description Title Technical Specialist -Detection, Engineering and Automation Department FIL - Global Cybersecurity Operations Location Kingswood, Surrey Reports To Senior Manager - Detection, Engineering and Automation Level 4 We share a commitment to making things better for clients and each other. We continually explore new technology and different ways of working to put our clients first. So bring your boldest ideas to our Cyber Defense Operations team and feel like you're making progress. About your team Technology function across FIL is responsible for all global aspects of Technology, Digital, Cybersecurity, and Innovation. Fidelity is a value-driven, customer-obsessed organization and in Technology we are fortunate to play a direct role in helping our clients with one of the most important aspects of their lives - their financial well-being. Within the Technology function is our Global Cyber & Information Security (GCIS) that operates enterprise security services and controls. These are designed to mitigate Cyber and Information Security risks ensuring that Fidelity's business operates securely. The Technical Cybersecurity teams monitor both the internal and external threat environment, responding to security alerts and events in close to real time, as well as providing security assurance and access management services across the enterprise technology and business environment. Our global innovative Cyber Defence Operations team sits within GCIS and provides proactive, cutting-edge solutions to protect clients' digital assets and infrastructure against evolving cyber threats. The Detection Engineering & Automation team within our Global Cybersecurity Operations focuses on the development of automated detection capabilities to reduce manual effort of the Global Cybersecurity Operations team freeing up time to focus on real cyber threats. They ensure that security controls are performing effectively and efficiently and that they are feeding into automation technologies allowing the organisation to make intelligent correlated decisions. About your role The Detection Engineering & Automation Specialist plays a critical hands on role in strengthening the Global Cybersecurity Operations capability by building, maintaining and enhancing the security tooling that underpins our detection and response functions. The ideal candidate will work deeply across technologies including SIEM, SOAR, EDR, email security and cloud security platforms, contributing engineering expertise to ensure these controls operate effectively and deliver high quality telemetry. You will be responsible for developing and improving detections, building CI/CD pipelines, onboarding new log sources, implementing automation and supporting technical investigations during security incidents. The ideal candidate has experience using a wide range of security technologies to enhance detection coverage, streamline analyst workflows and support the ongoing maintenance and optimisation of critical security controls. This role is essential in supporting engineering maturity and ensuring our cyber defence capabilities remain modern, integrated and responsive to evolving threats. About you Key Responsibilities The Detection, Automation and Engineering Specialist will be responsible to: Build, maintain and enhance security detections using Sentinel as Code, ensuring accurate and high quality analytics. Develop and maintain CI/CD pipelines to automate deployment of detections, automation playbooks and configuration updates. Engineer and optimise SOAR automation and integrations to reduce manual analyst workload and streamline response processes. Onboard high value security logs into the SIEM from the backlog, ensuring quality, normalisation and integration into detection logic. Support SOC and CIRT during incidents by providing engineering expertise, rapid telemetry onboarding, and timely detection and automation enhancements. Maintain and improve security controls across SIEM, SOAR, EDR, email security and network detection tooling. Assess and implement tool updates, new features and product enhancements, ensuring their secure and effective adoption across the environment. Manage tooling related incidents with vendors and internal teams, ensuring business impact is known, communicated and minimised. Work with global engineering teams to deliver high priority backlog items and operational improvements. Collaborate with front line analysts to identify quick win improvements for detections, automation and tooling integrations. Produce clear documentation, reporting and quality checks to support engineering delivery and continuous improvement. Experience and Skills Required At least 4 years of experience working in a Detection Engineering function, or a combination of Detection Engineering and hands on engineering responsibilities within a SOC environment. Experience focusing on automation, engineering maturity and continuous improvement within security operations. Experience managing and maintaining security tools within a global environment, preferably within Financial Services. Hands on experience developing detections in Microsoft Sentinel, including strong KQL and detection as code practices. Proven ability to build and maintain CI/CD pipelines (Azure DevOps, GitHub Actions) for detection, automation and configuration deployments. Experience onboarding and operationalising new log sources into a SIEM, ensuring data quality, enrichment and alignment with detection logic. Practical experience engineering SIEM, SOAR or EDR platforms and improving their operational effectiveness. Experience supporting security incidents from an engineering perspective by enabling telemetry, building detections and enhancing automation under time pressure. Strong experience with cloud platforms, particularly AWS and Azure, including their native security telemetry and integrations. Experience with email security solutions (such as Proofpoint, Microsoft Defender for Office 365, or equivalent), with a solid understanding of how email telemetry can be used in detection engineering. Strong scripting skills (PowerShell, Python, Bash or JavaScript) for automation, integration and tooling improvements. Familiarity with YAML/JSON, IaC principles and modern automation frameworks. Knowledge of Azure and/or AWS cloud environments and their native security telemetry. Strong communication skills with the ability to take technical feedback from SOC/CIRT and translate it into meaningful engineering improvements. Analytical mindset with a passion for cybersecurity, process improvement and challenging inefficient workflows. Preferred Certifications: Microsoft SC 200, AZ 500, AWS Security Specialty, CySA+, SSCP, OSCP. Feel rewarded For starters, we'll offer you a comprehensive benefits package. We'll value your wellbeing and support your development. And we'll be as flexible as we can about where and when you work - finding a balance that works for all of us. It's all part of our commitment to making you feel motivated by the work you do and happy to be part of our team. For more about our work, our approach to dynamic working and how you could build your future here, visit For more about our work, our approach to dynamic working and how you could build your future here, visit As an international financial services organisation, we are in-scope of international regulations in the way that we carry out our work. This position is involved in work that is regulated by the FCA and/or the PRA and their Individual Conduct Rules (COCON) apply to it, along with any other regulation. We provide training on COCON and how it affects our employees. More information about COCON can be found in the Employment Handbook.
Technical Support Engineer Intern (fix term contract)
Exabeam Maidenhead, Berkshire
Technical Support Engineer Intern (fixed term contract) Exabeam is the leader in behaviour intelligence for the agentic enterprise. As organisations deploy digital workers and confront machine-speed adversaries, Exabeam delivers flexible, industry proven solutions for insider threat coverage of humans and agents and faster, more accurate threat detection, investigation, and response (TDIR). Exabeam is proud to be an equal opportunity employer. We are seeking a Technical Support Engineer Intern to help customers successfully operate Exabeam's cutting edge security solutions. In this customer facing role, you will provide hands on technical troubleshooting, own support cases from intake to resolution, and collaborate with senior engineers and Engineering/Product teams to resolve complex issues. This role offers strong opportunities to build technical depth, expand responsibility and grow your career within a global Support organisation. Responsibilities Provide technical troubleshooting and resolution for customer issues across Exabeam's on premise and cloud native security platforms. Support cases, including investigation, documentation, customer communication, and follow through to resolution. Analyse logs, configurations, and system behaviour to identify root causes and recommend solutions or workarounds. Communicate clearly and professionally with customers, providing timely updates and managing expectations. Escalate issues appropriately to senior engineers or Engineering teams with clear summaries and supporting evidence. Contribute to internal knowledge bases and documentation to improve team efficiency and consistency. Preferred Qualifications Willingness to learn and support both on premise and cloud native architectures. Troubleshooting fundamentals and a structured, methodical approach to problem solving. Good written and verbal communication skills, with the ability to explain technical issues clearly. Exposure to security platforms (SIEM, UEBA, SOAR) or adjacent areas such as logging, monitoring, and observability. Familiarity with Linux or Windows fundamentals, networking basics, and log analysis. Location & Work Model Hybrid (UK) - a combination of remote work and onsite collaboration at our Maidenhead area office. Exabeam is committed to equal opportunity regardless of race, colour, ancestry, religion, gender, gender identity, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or Veteran status.
21/05/2026
Full time
Technical Support Engineer Intern (fixed term contract) Exabeam is the leader in behaviour intelligence for the agentic enterprise. As organisations deploy digital workers and confront machine-speed adversaries, Exabeam delivers flexible, industry proven solutions for insider threat coverage of humans and agents and faster, more accurate threat detection, investigation, and response (TDIR). Exabeam is proud to be an equal opportunity employer. We are seeking a Technical Support Engineer Intern to help customers successfully operate Exabeam's cutting edge security solutions. In this customer facing role, you will provide hands on technical troubleshooting, own support cases from intake to resolution, and collaborate with senior engineers and Engineering/Product teams to resolve complex issues. This role offers strong opportunities to build technical depth, expand responsibility and grow your career within a global Support organisation. Responsibilities Provide technical troubleshooting and resolution for customer issues across Exabeam's on premise and cloud native security platforms. Support cases, including investigation, documentation, customer communication, and follow through to resolution. Analyse logs, configurations, and system behaviour to identify root causes and recommend solutions or workarounds. Communicate clearly and professionally with customers, providing timely updates and managing expectations. Escalate issues appropriately to senior engineers or Engineering teams with clear summaries and supporting evidence. Contribute to internal knowledge bases and documentation to improve team efficiency and consistency. Preferred Qualifications Willingness to learn and support both on premise and cloud native architectures. Troubleshooting fundamentals and a structured, methodical approach to problem solving. Good written and verbal communication skills, with the ability to explain technical issues clearly. Exposure to security platforms (SIEM, UEBA, SOAR) or adjacent areas such as logging, monitoring, and observability. Familiarity with Linux or Windows fundamentals, networking basics, and log analysis. Location & Work Model Hybrid (UK) - a combination of remote work and onsite collaboration at our Maidenhead area office. Exabeam is committed to equal opportunity regardless of race, colour, ancestry, religion, gender, gender identity, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or Veteran status.
Technical Support Engineer
Exabeam Maidenhead, Berkshire
Exabeam is the leader in behaviour intelligence for the agentic enterprise. As organisations deploy digital workers and confront machine speed adversaries, Exabeam delivers flexible, industry proven solutions for insider threat coverage of humans and agents and faster, more accurate threat detection, investigation, and response (TDIR). Learn more at . Exabeam: Stop Insider Threats. Human or AI. We are seeking a junior Technical Support Engineer (TSE) with 1-3 years of technical support experience to help customers successfully operate Exabeam's cutting edge security solutions. In this customer facing role, you will provide hands on technical troubleshooting, own support cases from intake to resolution, and collaborate with senior engineers and Engineering/Product teams to resolve complex issues. This role offers strong opportunities to build technical depth, expand responsibility, and grow your career within a global Support organisation. Responsibilities Provide technical troubleshooting and resolution for customer issues across Exabeam's on premise and cloud native security platforms Own support cases end to end, including investigation, documentation, customer communication, and follow through to resolution Analyse logs, configurations, and system behaviour to identify root causes and recommend solutions or workarounds Communicate clearly and professionally with customers, providing timely updates and managing expectations Escalate issues appropriately to senior engineers or Engineering teams with clear summaries and supporting evidence Contribute to internal knowledge bases and documentation to improve team efficiency and consistency Career Growth & Development At Exabeam, we actively encourage growth and skill development. As a Technical Support Engineer, you'll gain hands on experience supporting modern security platforms, learn from experienced engineers and subject matter experts, and have opportunities to progress and broaden your impact within the support organisation as your skills, confidence, and experience grow. Requirements 1-3 years' experience in a Technical Support, Helpdesk, NOC, or Customer Support Engineering role supporting enterprise software Strong troubleshooting fundamentals and a structured, methodical approach to problem solving Good written and verbal communication skills, with the ability to explain technical issues clearly Ability to manage multiple cases and priorities in a ticket based support environment Willingness to learn and support both on premise and cloud native architectures Preferred Qualifications Exposure to security platforms (SIEM, UEBA, SOAR) or adjacent areas such as logging, monitoring, or observability Familiarity with Linux or Windows fundamentals, networking basics, and log analysis Experience contributing to knowledge articles, runbooks, or internal documentation Location & Work Model Hybrid (UK) - a combination of remote work and onsite collaboration at our Maidenhead area office. Bring your Whole Self to Work! Diversity, equity, and inclusion are at the core of who we are. We hire the best of the best and do not discriminate based on race, gender, age, religion, sexual orientation, identity, or other personal factors. Exabeam is proud to be an equal opportunity employer. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status.
21/05/2026
Full time
Exabeam is the leader in behaviour intelligence for the agentic enterprise. As organisations deploy digital workers and confront machine speed adversaries, Exabeam delivers flexible, industry proven solutions for insider threat coverage of humans and agents and faster, more accurate threat detection, investigation, and response (TDIR). Learn more at . Exabeam: Stop Insider Threats. Human or AI. We are seeking a junior Technical Support Engineer (TSE) with 1-3 years of technical support experience to help customers successfully operate Exabeam's cutting edge security solutions. In this customer facing role, you will provide hands on technical troubleshooting, own support cases from intake to resolution, and collaborate with senior engineers and Engineering/Product teams to resolve complex issues. This role offers strong opportunities to build technical depth, expand responsibility, and grow your career within a global Support organisation. Responsibilities Provide technical troubleshooting and resolution for customer issues across Exabeam's on premise and cloud native security platforms Own support cases end to end, including investigation, documentation, customer communication, and follow through to resolution Analyse logs, configurations, and system behaviour to identify root causes and recommend solutions or workarounds Communicate clearly and professionally with customers, providing timely updates and managing expectations Escalate issues appropriately to senior engineers or Engineering teams with clear summaries and supporting evidence Contribute to internal knowledge bases and documentation to improve team efficiency and consistency Career Growth & Development At Exabeam, we actively encourage growth and skill development. As a Technical Support Engineer, you'll gain hands on experience supporting modern security platforms, learn from experienced engineers and subject matter experts, and have opportunities to progress and broaden your impact within the support organisation as your skills, confidence, and experience grow. Requirements 1-3 years' experience in a Technical Support, Helpdesk, NOC, or Customer Support Engineering role supporting enterprise software Strong troubleshooting fundamentals and a structured, methodical approach to problem solving Good written and verbal communication skills, with the ability to explain technical issues clearly Ability to manage multiple cases and priorities in a ticket based support environment Willingness to learn and support both on premise and cloud native architectures Preferred Qualifications Exposure to security platforms (SIEM, UEBA, SOAR) or adjacent areas such as logging, monitoring, or observability Familiarity with Linux or Windows fundamentals, networking basics, and log analysis Experience contributing to knowledge articles, runbooks, or internal documentation Location & Work Model Hybrid (UK) - a combination of remote work and onsite collaboration at our Maidenhead area office. Bring your Whole Self to Work! Diversity, equity, and inclusion are at the core of who we are. We hire the best of the best and do not discriminate based on race, gender, age, religion, sexual orientation, identity, or other personal factors. Exabeam is proud to be an equal opportunity employer. We are committed to equal opportunity regardless of race, color, ancestry, religion, gender, gender identity, genetic information, parental or pregnancy status, national origin, sexual orientation, age, citizenship, marital status, disability, or veteran status.
Senior Cloud Security Engineer (London or Bristol)
HealthHero Services Ltd
Senior Cloud Security Engineer (London or Bristol) HealthHero is Europe's largest digital clinic. As a Senior Cloud Security Engineer on an initial 12 month fixed term contract, you will help shape security for our fast growing, AI driven digital healthcare platform. As the role is based in either our London or Bristol office, you will work onsite two days per week. About the role This role is a key member of the growing Platform Security team, covering application security, cloud security, security operations, culture and risk management. You will work closely with Infrastructure, Data Governance and Engineering leads, focusing on infrastructure and cloud networking to secure our AWS and Azure estates and drive cloud security with an international scope. Responsibilities DevSecOps & SDLC Champion integration of security testing into CI/CD pipelines across all development teams, using automated security gates such as SAST, DAST, dependency scanning and secrets detection. Enable self serve security tooling for development teams. Set up secure development environments. Cloud Security Own cloud security posture management using a CSPM solution (e.g., Wiz) and define enforceable cloud security baselines, guardrails, and policies in AWS. Implement and maintain IaC security scanning for Terraform. Manage IAM policies, network segmentation and secrets management. Configure and tune SIEM or similar for cloud focused detection. Establish logging, monitoring and alerting requirements based on threat modelling. Investigate and respond to cloud security events. Risk & Compliance Identify, articulate and escalates security risks to senior leadership with mitigation plans. Track and remediate vulnerabilities across the infrastructure. Manage customer due diligence initiatives when required. Support and develop an annual penetration testing programme and associated remediations. Stakeholder Engagement Partner with internal teams to support security related governance and accreditation requirements across different countries. Provide expertise on emerging threats and vulnerabilities. Support response to customer due diligence requests with timely and accurate information regarding vulnerability exposure. Qualifications Essential Proven experience in application security, DevSecOps or cloud security. Strong understanding of cloud networking. Experience securing cloud environments (AWS, Azure). Ability to read and write IaC (Terraform) code and understand IaC lifecycles. Familiarity with container security and Kubernetes. Understanding of secure coding, penetration testing techniques, SIEM and vulnerability management. Strong technical skills relevant to Information Security such as secure coding standards, ethical hacking techniques, network security and risk analysis. Experience managing secure development lifecycles and vulnerability management. Practical experience of ISO 27001:2022 controls and audit processes. Desirable AWS Security Specialty or equivalent certification. Experience in regulated environments (healthcare, financial services). Familiarity with NHS DSPT. Technical knowledge of GDPR and data protection requirements. Hands on experience with CI/CD security tooling and pipeline integration. Interest in learning other countries' health and security regulations (France, UK, IR, DE). Benefits A full induction training programme via Microsoft Teams. Opportunity to work with an experienced, diverse and supportive team. 25 days annual leave. Bank holidays and birthday off as leave. Regular one to one meetings with your line manager. 24/7 on call staff support. Auto enrolment pension scheme. Health scheme and access to an Employee Assistance Programme. Life insurance scheme. Equal Opportunity Statement HealthHero is a certified Disability Confident Employer and we are committed to offering equal opportunities to all candidates, irrespective of age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex or sexual orientation. If you require any reasonable adjustments during the application process, please contact us.
21/05/2026
Full time
Senior Cloud Security Engineer (London or Bristol) HealthHero is Europe's largest digital clinic. As a Senior Cloud Security Engineer on an initial 12 month fixed term contract, you will help shape security for our fast growing, AI driven digital healthcare platform. As the role is based in either our London or Bristol office, you will work onsite two days per week. About the role This role is a key member of the growing Platform Security team, covering application security, cloud security, security operations, culture and risk management. You will work closely with Infrastructure, Data Governance and Engineering leads, focusing on infrastructure and cloud networking to secure our AWS and Azure estates and drive cloud security with an international scope. Responsibilities DevSecOps & SDLC Champion integration of security testing into CI/CD pipelines across all development teams, using automated security gates such as SAST, DAST, dependency scanning and secrets detection. Enable self serve security tooling for development teams. Set up secure development environments. Cloud Security Own cloud security posture management using a CSPM solution (e.g., Wiz) and define enforceable cloud security baselines, guardrails, and policies in AWS. Implement and maintain IaC security scanning for Terraform. Manage IAM policies, network segmentation and secrets management. Configure and tune SIEM or similar for cloud focused detection. Establish logging, monitoring and alerting requirements based on threat modelling. Investigate and respond to cloud security events. Risk & Compliance Identify, articulate and escalates security risks to senior leadership with mitigation plans. Track and remediate vulnerabilities across the infrastructure. Manage customer due diligence initiatives when required. Support and develop an annual penetration testing programme and associated remediations. Stakeholder Engagement Partner with internal teams to support security related governance and accreditation requirements across different countries. Provide expertise on emerging threats and vulnerabilities. Support response to customer due diligence requests with timely and accurate information regarding vulnerability exposure. Qualifications Essential Proven experience in application security, DevSecOps or cloud security. Strong understanding of cloud networking. Experience securing cloud environments (AWS, Azure). Ability to read and write IaC (Terraform) code and understand IaC lifecycles. Familiarity with container security and Kubernetes. Understanding of secure coding, penetration testing techniques, SIEM and vulnerability management. Strong technical skills relevant to Information Security such as secure coding standards, ethical hacking techniques, network security and risk analysis. Experience managing secure development lifecycles and vulnerability management. Practical experience of ISO 27001:2022 controls and audit processes. Desirable AWS Security Specialty or equivalent certification. Experience in regulated environments (healthcare, financial services). Familiarity with NHS DSPT. Technical knowledge of GDPR and data protection requirements. Hands on experience with CI/CD security tooling and pipeline integration. Interest in learning other countries' health and security regulations (France, UK, IR, DE). Benefits A full induction training programme via Microsoft Teams. Opportunity to work with an experienced, diverse and supportive team. 25 days annual leave. Bank holidays and birthday off as leave. Regular one to one meetings with your line manager. 24/7 on call staff support. Auto enrolment pension scheme. Health scheme and access to an Employee Assistance Programme. Life insurance scheme. Equal Opportunity Statement HealthHero is a certified Disability Confident Employer and we are committed to offering equal opportunities to all candidates, irrespective of age, disability, gender reassignment, marriage and civil partnership, pregnancy and maternity, race, religion or belief, sex or sexual orientation. If you require any reasonable adjustments during the application process, please contact us.
Senior Security Engineer - Detection & Response - EU/UK
Marqeta, Inc.
Senior Security Engineer - Detection & Response - EU/UK Remote, UK We are seeking a UK-based Senior Security Engineer to join our Security Operations and Response Team as a senior individual contributor. In this role, you will investigate and respond to security incidents across Marqeta's environment, proactively monitor for cyber threats, and serve as incident commander during security events of varying severity. You will contribute to the development and improvement of response methodologies aligned with the NIST Incident Response Lifecycle and help maintain cybersecurity incident response documentation. This position requires strong expertise in incident response, digital forensics, threat hunting, and security monitoring technologies. You will collaborate across teams, contribute to detection engineering efforts, and participate in 24x7 on call rotations. The role reports to the Manager of Security Operations and Response. This role can be performed remotely anywhere in the UK, or from our London, UK office. We'd love for you to join us! Impact You'll Have Proactively monitor Marqeta's environment for cyber threat activity and manage day to day security alerts through timely analysis, triage, and appropriate response actions Serve as incident commander during security events, directing investigation strategies and coordinating cross functional response efforts Execute incident response activities aligned with the NIST Incident Response Lifecycle to detect, contain, eradicate, recover, and learn from cybersecurity incidents Contribute to the maintenance and improvement of the Cybersecurity Incident Response Plan (CIRP), playbooks, runbooks, and standard operating procedures to ensure consistent and effective response operations Participate in 24x7x365 on call rotations, providing skilled guidance during security incidents and contributing to thorough post incident reviews Research threat intelligence sources and contribute to hypothesis driven threat hunting initiatives to uncover threats in corporate and production environments Work closely with Security Engineering to tune security solutions, enhance detection capabilities, and leverage business knowledge to improve security monitoring Design, develop, and maintain detection logic using a detections as code approach, collaborating with Security Solution Engineering to deploy detections through CI/CD pipelines into our SIEM and EDR platforms Contribute to detection coverage mapped to MITRE ATT&CK framework, identifying gaps in visibility and supporting detection development prioritization based on threat intelligence and business risk Coordinate with HR, law enforcement, response retainers, and cyber insurers as required, including support on cyber crime financial fraud use cases Support the development of less experienced security team members through knowledge sharing, pair investigations, and leading by example Partner with Fraud, Compliance, and Risk teams on security events involving payment systems, cardholder data, or regulatory reporting obligations under PCI DSS and related frameworks Who You Are 5+ years of hands on experience in security operations with strong expertise in incident response, digital forensics, and threat hunting Experience serving as an incident commander or leading incident response workstreams, with the ability to make sound decisions under pressure Strong knowledge of the NIST Incident Response Lifecycle and experience contributing to incident response documentation and procedures Proficiency with security monitoring and forensic tools including EDR, SIEM, and SOAR systems Experience developing detections as code, including familiarity with version control, CI/CD pipelines, and detection testing frameworks Working knowledge of MITRE ATT&CK and experience using it to assess detection coverage and map threat actor TTPs Experience contributing to post incident reviews and implementing security improvements based on lessons learned Solid understanding of threat actor TTPs and ability to apply threat intelligence to enhance detection and response capabilities Experience tuning security solutions and developing automation workflows to improve monitoring effectiveness and response efficiency Working knowledge of AWS cloud services and securing cloud environments Ability to effectively communicate with technical and non technical stakeholders during security incidents and investigations Experience in payment processing, fintech, or other highly regulated environments; familiarity with PCI DSS incident handling requirements a plus Proven ability to work independently while demonstrating sound judgment about when to engage team members or elevate issues Willingness to mentor and support the growth of junior security professionals in incident response techniques Benefits Premium Private Medical and Dental coverage Generous time off program with additional "Floating Holiday days" Retirement savings program with company contribution Equity in a publicly traded company and an Employee Stock Purchase Program Monthly stipend to support our remote work model Annual development stipend to support our people's growth and development Family forming benefits and up to 20 weeks of Parental Leave Wellbeing programs (e.g., Modern Health, HealthKick and more) Marqeta is an equal opportunity employer committed to an inclusive workplace that fosters belonging. We do not discriminate based on race, color, religion, sex (including pregnancy, lactation, childbirth, or related medical conditions), veteran status or uniformed service member status, age, national origin or ancestry, citizenship or immigration status, physical or mental disability, gender identity, gender expression, sexual orientation, genetic information (including testing or characteristics) or any other characteristic protected by applicable law. We also consider qualified applicants with criminal histories, consistent with legal requirements. Marqeta endeavors to make reasonable accommodations for applicants with disabilities. Individuals requiring accommodation to submit this application, complete any pre employment testing, or otherwise participate in the selection process should submit a request detailing the specific accommodations needed.
21/05/2026
Full time
Senior Security Engineer - Detection & Response - EU/UK Remote, UK We are seeking a UK-based Senior Security Engineer to join our Security Operations and Response Team as a senior individual contributor. In this role, you will investigate and respond to security incidents across Marqeta's environment, proactively monitor for cyber threats, and serve as incident commander during security events of varying severity. You will contribute to the development and improvement of response methodologies aligned with the NIST Incident Response Lifecycle and help maintain cybersecurity incident response documentation. This position requires strong expertise in incident response, digital forensics, threat hunting, and security monitoring technologies. You will collaborate across teams, contribute to detection engineering efforts, and participate in 24x7 on call rotations. The role reports to the Manager of Security Operations and Response. This role can be performed remotely anywhere in the UK, or from our London, UK office. We'd love for you to join us! Impact You'll Have Proactively monitor Marqeta's environment for cyber threat activity and manage day to day security alerts through timely analysis, triage, and appropriate response actions Serve as incident commander during security events, directing investigation strategies and coordinating cross functional response efforts Execute incident response activities aligned with the NIST Incident Response Lifecycle to detect, contain, eradicate, recover, and learn from cybersecurity incidents Contribute to the maintenance and improvement of the Cybersecurity Incident Response Plan (CIRP), playbooks, runbooks, and standard operating procedures to ensure consistent and effective response operations Participate in 24x7x365 on call rotations, providing skilled guidance during security incidents and contributing to thorough post incident reviews Research threat intelligence sources and contribute to hypothesis driven threat hunting initiatives to uncover threats in corporate and production environments Work closely with Security Engineering to tune security solutions, enhance detection capabilities, and leverage business knowledge to improve security monitoring Design, develop, and maintain detection logic using a detections as code approach, collaborating with Security Solution Engineering to deploy detections through CI/CD pipelines into our SIEM and EDR platforms Contribute to detection coverage mapped to MITRE ATT&CK framework, identifying gaps in visibility and supporting detection development prioritization based on threat intelligence and business risk Coordinate with HR, law enforcement, response retainers, and cyber insurers as required, including support on cyber crime financial fraud use cases Support the development of less experienced security team members through knowledge sharing, pair investigations, and leading by example Partner with Fraud, Compliance, and Risk teams on security events involving payment systems, cardholder data, or regulatory reporting obligations under PCI DSS and related frameworks Who You Are 5+ years of hands on experience in security operations with strong expertise in incident response, digital forensics, and threat hunting Experience serving as an incident commander or leading incident response workstreams, with the ability to make sound decisions under pressure Strong knowledge of the NIST Incident Response Lifecycle and experience contributing to incident response documentation and procedures Proficiency with security monitoring and forensic tools including EDR, SIEM, and SOAR systems Experience developing detections as code, including familiarity with version control, CI/CD pipelines, and detection testing frameworks Working knowledge of MITRE ATT&CK and experience using it to assess detection coverage and map threat actor TTPs Experience contributing to post incident reviews and implementing security improvements based on lessons learned Solid understanding of threat actor TTPs and ability to apply threat intelligence to enhance detection and response capabilities Experience tuning security solutions and developing automation workflows to improve monitoring effectiveness and response efficiency Working knowledge of AWS cloud services and securing cloud environments Ability to effectively communicate with technical and non technical stakeholders during security incidents and investigations Experience in payment processing, fintech, or other highly regulated environments; familiarity with PCI DSS incident handling requirements a plus Proven ability to work independently while demonstrating sound judgment about when to engage team members or elevate issues Willingness to mentor and support the growth of junior security professionals in incident response techniques Benefits Premium Private Medical and Dental coverage Generous time off program with additional "Floating Holiday days" Retirement savings program with company contribution Equity in a publicly traded company and an Employee Stock Purchase Program Monthly stipend to support our remote work model Annual development stipend to support our people's growth and development Family forming benefits and up to 20 weeks of Parental Leave Wellbeing programs (e.g., Modern Health, HealthKick and more) Marqeta is an equal opportunity employer committed to an inclusive workplace that fosters belonging. We do not discriminate based on race, color, religion, sex (including pregnancy, lactation, childbirth, or related medical conditions), veteran status or uniformed service member status, age, national origin or ancestry, citizenship or immigration status, physical or mental disability, gender identity, gender expression, sexual orientation, genetic information (including testing or characteristics) or any other characteristic protected by applicable law. We also consider qualified applicants with criminal histories, consistent with legal requirements. Marqeta endeavors to make reasonable accommodations for applicants with disabilities. Individuals requiring accommodation to submit this application, complete any pre employment testing, or otherwise participate in the selection process should submit a request detailing the specific accommodations needed.
Senior Security Engineer - Detection & Response (Remote UK)
Marqeta, Inc.
Marqeta, Inc. is seeking a Senior Security Engineer to join the Security Operations and Response Team. This position can be performed remotely or from our London office. You will investigate security incidents, lead response efforts, and develop methodologies aligned with industry standards. The ideal candidate should have over 5 years of security operations experience, particularly in incident response and threat hunting. Benefits include premium medical coverage, generous time off, and equity in a publicly traded company.
21/05/2026
Full time
Marqeta, Inc. is seeking a Senior Security Engineer to join the Security Operations and Response Team. This position can be performed remotely or from our London office. You will investigate security incidents, lead response efforts, and develop methodologies aligned with industry standards. The ideal candidate should have over 5 years of security operations experience, particularly in incident response and threat hunting. Benefits include premium medical coverage, generous time off, and equity in a publicly traded company.
Focus Group
Senior SOC Analyst
Focus Group Manchester, Lancashire
Senior SOC Analyst UK - 3 days a week in our Manchester office (Suite B, Maple Court, M60 Office Park, Wynne Ave, Swinton, Clifton, Manchester, M27 8FF) £50-£55k (Dependent on experience) + benefits Focus Group is looking for a Senior SOC Analyst to play a key role within our Managed Security Services team. This is a dual focused position combining hands on technical expertise with day to day operational leadership, ensuring high quality delivery of managed detection and response services across a diverse customer base. You'll lead SOC operations, act as the escalation point for complex security incidents, and mentor junior analysts-driving both service excellence and team development. What you'll do Lead day to day SOC operations, ensuring effective triage, escalation, and communication workflows Act as the primary escalation point for complex security investigations and incidents Conduct advanced threat investigations across endpoints, networks, and cloud environments Perform proactive threat hunting and detection tuning to improve coverage and reduce noise Manage and mentor Tier 1-2 analysts, supporting development and technical growth Ensure ticket quality, SLA adherence, and high service standards across SOC operations Support onboarding of new customers into monitoring and detection platforms Collaborate with Cyber Security leadership to improve detection strategy and SOC maturity Analyse logs and security data to identify malicious or suspicious activity Develop and maintain playbooks, runbooks, and knowledge base content Produce clear, actionable incident reports for internal and customer stakeholders Engage directly with customers during escalations, incident reviews, and briefings Identify opportunities for automation, process improvement, and enhanced detection capabilities Stay up to date with emerging threats, attack techniques, and MITRE ATT&CK developments What you'll bring 4-6 years' experience in a SOC or MSSP environment at Tier 2-3 or Lead level Strong hands on experience with SIEM platforms (e.g. Microsoft Sentinel, Splunk, Elastic, LogPoint) Experience with EDR tools such as Microsoft Defender, SentinelOne, or Bitdefender Deep understanding of MITRE ATT&CK and modern threat detection methodologies Strong incident response, investigation, and log analysis capability across multiple data sources Ability to lead during high pressure incidents with calm, confident decision making Strong communication skills, including producing clear incident reports and updates Proven ability to mentor, coach, and support junior analysts Organised approach with the ability to manage multiple concurrent incidents Proactive mindset focused on continuous improvement and service optimisation Nice to have Certifications such as SC 200, GCIH, GCIA, Security+, or BTL1 Experience in an MSSP or multi customer environment Microsoft security stack experience (Defender XDR, Sentinel, M365 security) Knowledge of cloud security, email security, and vulnerability management Experience with KQL or other query languages Scripting skills (PowerShell, Python) Familiarity with SOAR and threat intelligence platforms Understanding of compliance frameworks (ISO 27001, NIST, Cyber Essentials) Future opportunities SOC Manager / Head of Security Operations Cyber Security Technical Lead Detection Engineering Lead Threat Intelligence LeadIncident Response Manager Security Consultant / Advisory
21/05/2026
Full time
Senior SOC Analyst UK - 3 days a week in our Manchester office (Suite B, Maple Court, M60 Office Park, Wynne Ave, Swinton, Clifton, Manchester, M27 8FF) £50-£55k (Dependent on experience) + benefits Focus Group is looking for a Senior SOC Analyst to play a key role within our Managed Security Services team. This is a dual focused position combining hands on technical expertise with day to day operational leadership, ensuring high quality delivery of managed detection and response services across a diverse customer base. You'll lead SOC operations, act as the escalation point for complex security incidents, and mentor junior analysts-driving both service excellence and team development. What you'll do Lead day to day SOC operations, ensuring effective triage, escalation, and communication workflows Act as the primary escalation point for complex security investigations and incidents Conduct advanced threat investigations across endpoints, networks, and cloud environments Perform proactive threat hunting and detection tuning to improve coverage and reduce noise Manage and mentor Tier 1-2 analysts, supporting development and technical growth Ensure ticket quality, SLA adherence, and high service standards across SOC operations Support onboarding of new customers into monitoring and detection platforms Collaborate with Cyber Security leadership to improve detection strategy and SOC maturity Analyse logs and security data to identify malicious or suspicious activity Develop and maintain playbooks, runbooks, and knowledge base content Produce clear, actionable incident reports for internal and customer stakeholders Engage directly with customers during escalations, incident reviews, and briefings Identify opportunities for automation, process improvement, and enhanced detection capabilities Stay up to date with emerging threats, attack techniques, and MITRE ATT&CK developments What you'll bring 4-6 years' experience in a SOC or MSSP environment at Tier 2-3 or Lead level Strong hands on experience with SIEM platforms (e.g. Microsoft Sentinel, Splunk, Elastic, LogPoint) Experience with EDR tools such as Microsoft Defender, SentinelOne, or Bitdefender Deep understanding of MITRE ATT&CK and modern threat detection methodologies Strong incident response, investigation, and log analysis capability across multiple data sources Ability to lead during high pressure incidents with calm, confident decision making Strong communication skills, including producing clear incident reports and updates Proven ability to mentor, coach, and support junior analysts Organised approach with the ability to manage multiple concurrent incidents Proactive mindset focused on continuous improvement and service optimisation Nice to have Certifications such as SC 200, GCIH, GCIA, Security+, or BTL1 Experience in an MSSP or multi customer environment Microsoft security stack experience (Defender XDR, Sentinel, M365 security) Knowledge of cloud security, email security, and vulnerability management Experience with KQL or other query languages Scripting skills (PowerShell, Python) Familiarity with SOAR and threat intelligence platforms Understanding of compliance frameworks (ISO 27001, NIST, Cyber Essentials) Future opportunities SOC Manager / Head of Security Operations Cyber Security Technical Lead Detection Engineering Lead Threat Intelligence LeadIncident Response Manager Security Consultant / Advisory
Senior Machine Learning Scientist
Monzo
You'll play a key role by: This role sits as part of a multidisciplinary squad, collaborating with other Machine Learning Scientists, Data Scientists, Backend Engineers, Operations specialists, Product managers, and Risk managers. You'll play a key role by leveraging your deep experience of developing and deploying advanced Machine Learning models as to: Automatically and accurately detect suspicious user behaviours while minimising impact to genuine customers and operational costs. Adapt quickly and appropriately to changing fraud and financial crime trends, ensuring our detection systems remain performant through time. Design machine learning solutions that scale globally. The technical approaches you take to solve these problems will be very much in your hands and we'll strongly encourage and support experimentation and innovation. We'll be expecting you to justify and demonstrate effectiveness along the way, making sure the approach meets our business and customer needs. You should apply if: What we're doing here at Monzo excites you! You have a track record of deploying advanced Machine Learning models tackling real business problems with demonstrable impact, preferably in a fast moving tech company. You are impact driven and excited to own the end to end journey that starts with a business problem and ends with your solution having a measurable impact in production. You have a passion for sharing knowledge and raising the technical bar across the team. You have a self-starter mindset; you proactively identify the most impactful issues and opportunities and collaboratively tackle them without being told to do so. Using advanced ML techniques to ensure Monzo's customers money stays safe, even if their card, phone or account is compromised, sounds exciting to you. You have extensive experience writing production Python code and a strong command of SQL. You are comfortable using them every day, and keen to learn Go lang which is used in many of our backend microservices. You have experience developing and shipping deep learning, graph-based, and/or sequence-based ML architectures to production and delivering business impact. You thrive working on ambiguous problems and have a track record of helping your team and stakeholders resolve that ambiguity. You have strong communication skills and are able to explain complex technical concepts to non-technical stakeholders. You want to be involved in building a product that you and the people you know use every day, with a product mindset that prioritises customer outcomes and data-informed decisions. You're excited about fast-moving developments in Machine Learning and can communicate those ideas to colleagues who are not familiar with the domain. You're adaptable, curious and enjoy learning new technologies and ideas. Nice to haves: Experience in supporting your team in shaping the ML strategy of your area Experience working with financial crime, operations and in regulated institutions Commercial experience writing critical production code and working with microservices Experience in evaluating ML models in live environments such as through A/B tests What's in it for you We'll help you relocate to the UK. We can sponsor your visa. This role can be based in our London office, but we're open to distributed working within the UK (with ad hoc meetings in London). We offer flexible working hours and trust you to work enough hours to do your job well, and at times that suit you and your team. £1,000 learning budget each year to use on books, training courses and conferences. We will set you up to work from home; all employees are given Macbooks and for fully remote workers we will provide extra support for your work-from-home setup. Our interview process involves 3 main stages. We promise not to ask you any brain teasers or trick questions! 30 minute recruiter call 45 minute call with hiring manager 1 take home task 2 x 1-hour video calls with various team members Our average process takes around 3-4 weeks but we will always work around your availability. Our goal at Monzo is to make money work for everyone. To do that, working at Monzo must work for everyone. We want to create an equitable, engaged and innovative workplace which gives people from all backgrounds the support they need to thrive and grow. Making Monzo work for everyone starts right at the beginning of every Monzonaut's journey: when they apply to work here. This demographic survey will help us better understand the people who apply to work at Monzo. It'll help us see how different groups progress through our hiring process, and where we need to make improvements to be more inclusive. If you choose to fill it out, all of the information you give us is voluntary. We have included a "prefer not to say" option for every question. It'd be helpful if you still fill out the survey even if you choose "prefer not to say" for every question, as it's useful for us to understand & record this. We won't know if you choose to fill this survey in or not. Anonymous to Monzo. We can't tie your responses to you and they won't make a difference to the outcome of your application. We'll only use grouped responses for equal opportunities monitoring in our hiring process. By filling out this survey, you agree that we can use your responses for the purposes we've mentioned above. You are not letting us know if we need to make any adjustments to the hiring process because of disability or neurodiversity - to do this please email us.
21/05/2026
Full time
You'll play a key role by: This role sits as part of a multidisciplinary squad, collaborating with other Machine Learning Scientists, Data Scientists, Backend Engineers, Operations specialists, Product managers, and Risk managers. You'll play a key role by leveraging your deep experience of developing and deploying advanced Machine Learning models as to: Automatically and accurately detect suspicious user behaviours while minimising impact to genuine customers and operational costs. Adapt quickly and appropriately to changing fraud and financial crime trends, ensuring our detection systems remain performant through time. Design machine learning solutions that scale globally. The technical approaches you take to solve these problems will be very much in your hands and we'll strongly encourage and support experimentation and innovation. We'll be expecting you to justify and demonstrate effectiveness along the way, making sure the approach meets our business and customer needs. You should apply if: What we're doing here at Monzo excites you! You have a track record of deploying advanced Machine Learning models tackling real business problems with demonstrable impact, preferably in a fast moving tech company. You are impact driven and excited to own the end to end journey that starts with a business problem and ends with your solution having a measurable impact in production. You have a passion for sharing knowledge and raising the technical bar across the team. You have a self-starter mindset; you proactively identify the most impactful issues and opportunities and collaboratively tackle them without being told to do so. Using advanced ML techniques to ensure Monzo's customers money stays safe, even if their card, phone or account is compromised, sounds exciting to you. You have extensive experience writing production Python code and a strong command of SQL. You are comfortable using them every day, and keen to learn Go lang which is used in many of our backend microservices. You have experience developing and shipping deep learning, graph-based, and/or sequence-based ML architectures to production and delivering business impact. You thrive working on ambiguous problems and have a track record of helping your team and stakeholders resolve that ambiguity. You have strong communication skills and are able to explain complex technical concepts to non-technical stakeholders. You want to be involved in building a product that you and the people you know use every day, with a product mindset that prioritises customer outcomes and data-informed decisions. You're excited about fast-moving developments in Machine Learning and can communicate those ideas to colleagues who are not familiar with the domain. You're adaptable, curious and enjoy learning new technologies and ideas. Nice to haves: Experience in supporting your team in shaping the ML strategy of your area Experience working with financial crime, operations and in regulated institutions Commercial experience writing critical production code and working with microservices Experience in evaluating ML models in live environments such as through A/B tests What's in it for you We'll help you relocate to the UK. We can sponsor your visa. This role can be based in our London office, but we're open to distributed working within the UK (with ad hoc meetings in London). We offer flexible working hours and trust you to work enough hours to do your job well, and at times that suit you and your team. £1,000 learning budget each year to use on books, training courses and conferences. We will set you up to work from home; all employees are given Macbooks and for fully remote workers we will provide extra support for your work-from-home setup. Our interview process involves 3 main stages. We promise not to ask you any brain teasers or trick questions! 30 minute recruiter call 45 minute call with hiring manager 1 take home task 2 x 1-hour video calls with various team members Our average process takes around 3-4 weeks but we will always work around your availability. Our goal at Monzo is to make money work for everyone. To do that, working at Monzo must work for everyone. We want to create an equitable, engaged and innovative workplace which gives people from all backgrounds the support they need to thrive and grow. Making Monzo work for everyone starts right at the beginning of every Monzonaut's journey: when they apply to work here. This demographic survey will help us better understand the people who apply to work at Monzo. It'll help us see how different groups progress through our hiring process, and where we need to make improvements to be more inclusive. If you choose to fill it out, all of the information you give us is voluntary. We have included a "prefer not to say" option for every question. It'd be helpful if you still fill out the survey even if you choose "prefer not to say" for every question, as it's useful for us to understand & record this. We won't know if you choose to fill this survey in or not. Anonymous to Monzo. We can't tie your responses to you and they won't make a difference to the outcome of your application. We'll only use grouped responses for equal opportunities monitoring in our hiring process. By filling out this survey, you agree that we can use your responses for the purposes we've mentioned above. You are not letting us know if we need to make any adjustments to the hiring process because of disability or neurodiversity - to do this please email us.
Senior Machine Learning Scientist
Monzo Cardiff, South Glamorgan
You'll play a key role by: This role sits as part of a multidisciplinary squad, collaborating with other Machine Learning Scientists, Data Scientists, Backend Engineers, Operations specialists, Product managers, and Risk managers. You'll play a key role by leveraging your deep experience of developing and deploying advanced Machine Learning models as to: Automatically and accurately detect suspicious user behaviours while minimising impact to genuine customers and operational costs. Adapt quickly and appropriately to changing fraud and financial crime trends, ensuring our detection systems remain performant through time. Design machine learning solutions that scale globally. The technical approaches you take to solve these problems will be very much in your hands and we'll strongly encourage and support experimentation and innovation. We'll be expecting you to justify and demonstrate effectiveness along the way, making sure the approach meets our business and customer needs. You should apply if: What we're doing here at Monzo excites you! You have a track record of deploying advanced Machine Learning models tackling real business problems with demonstrable impact, preferably in a fast moving tech company. You are impact driven and excited to own the end to end journey that starts with a business problem and ends with your solution having a measurable impact in production. You have a passion for sharing knowledge and raising the technical bar across the team. You have a self-starter mindset; you proactively identify the most impactful issues and opportunities and collaboratively tackle them without being told to do so. Using advanced ML techniques to ensure Monzo's customers money stays safe, even if their card, phone or account is compromised, sounds exciting to you. You have extensive experience writing production Python code and a strong command of SQL. You are comfortable using them every day, and keen to learn Go lang which is used in many of our backend microservices. You have experience developing and shipping deep learning, graph-based, and/or sequence-based ML architectures to production and delivering business impact. You thrive working on ambiguous problems and have a track record of helping your team and stakeholders resolve that ambiguity. You have strong communication skills and are able to explain complex technical concepts to non-technical stakeholders. You want to be involved in building a product that you and the people you know use every day, with a product mindset that prioritises customer outcomes and data-informed decisions. You're excited about fast-moving developments in Machine Learning and can communicate those ideas to colleagues who are not familiar with the domain. You're adaptable, curious and enjoy learning new technologies and ideas. Nice to haves: Experience in supporting your team in shaping the ML strategy of your area Experience working with financial crime, operations and in regulated institutions Commercial experience writing critical production code and working with microservices Experience in evaluating ML models in live environments such as through A/B tests What's in it for you We'll help you relocate to the UK. We can sponsor your visa. This role can be based in our London office, but we're open to distributed working within the UK (with ad hoc meetings in London). We offer flexible working hours and trust you to work enough hours to do your job well, and at times that suit you and your team. £1,000 learning budget each year to use on books, training courses and conferences. We will set you up to work from home; all employees are given Macbooks and for fully remote workers we will provide extra support for your work-from-home setup. Our interview process involves 3 main stages. We promise not to ask you any brain teasers or trick questions! 30 minute recruiter call 45 minute call with hiring manager 1 take home task 2 x 1-hour video calls with various team members Our average process takes around 3-4 weeks but we will always work around your availability. Our goal at Monzo is to make money work for everyone. To do that, working at Monzo must work for everyone. We want to create an equitable, engaged and innovative workplace which gives people from all backgrounds the support they need to thrive and grow. Making Monzo work for everyone starts right at the beginning of every Monzonaut's journey: when they apply to work here. This demographic survey will help us better understand the people who apply to work at Monzo. It'll help us see how different groups progress through our hiring process, and where we need to make improvements to be more inclusive. If you choose to fill it out, all of the information you give us is voluntary. We have included a "prefer not to say" option for every question. It'd be helpful if you still fill out the survey even if you choose "prefer not to say" for every question, as it's useful for us to understand & record this. We won't know if you choose to fill this survey in or not. Anonymous to Monzo. We can't tie your responses to you and they won't make a difference to the outcome of your application. We'll only use grouped responses for equal opportunities monitoring in our hiring process. By filling out this survey, you agree that we can use your responses for the purposes we've mentioned above. You are not letting us know if we need to make any adjustments to the hiring process because of disability or neurodiversity - to do this please email us.
21/05/2026
Full time
You'll play a key role by: This role sits as part of a multidisciplinary squad, collaborating with other Machine Learning Scientists, Data Scientists, Backend Engineers, Operations specialists, Product managers, and Risk managers. You'll play a key role by leveraging your deep experience of developing and deploying advanced Machine Learning models as to: Automatically and accurately detect suspicious user behaviours while minimising impact to genuine customers and operational costs. Adapt quickly and appropriately to changing fraud and financial crime trends, ensuring our detection systems remain performant through time. Design machine learning solutions that scale globally. The technical approaches you take to solve these problems will be very much in your hands and we'll strongly encourage and support experimentation and innovation. We'll be expecting you to justify and demonstrate effectiveness along the way, making sure the approach meets our business and customer needs. You should apply if: What we're doing here at Monzo excites you! You have a track record of deploying advanced Machine Learning models tackling real business problems with demonstrable impact, preferably in a fast moving tech company. You are impact driven and excited to own the end to end journey that starts with a business problem and ends with your solution having a measurable impact in production. You have a passion for sharing knowledge and raising the technical bar across the team. You have a self-starter mindset; you proactively identify the most impactful issues and opportunities and collaboratively tackle them without being told to do so. Using advanced ML techniques to ensure Monzo's customers money stays safe, even if their card, phone or account is compromised, sounds exciting to you. You have extensive experience writing production Python code and a strong command of SQL. You are comfortable using them every day, and keen to learn Go lang which is used in many of our backend microservices. You have experience developing and shipping deep learning, graph-based, and/or sequence-based ML architectures to production and delivering business impact. You thrive working on ambiguous problems and have a track record of helping your team and stakeholders resolve that ambiguity. You have strong communication skills and are able to explain complex technical concepts to non-technical stakeholders. You want to be involved in building a product that you and the people you know use every day, with a product mindset that prioritises customer outcomes and data-informed decisions. You're excited about fast-moving developments in Machine Learning and can communicate those ideas to colleagues who are not familiar with the domain. You're adaptable, curious and enjoy learning new technologies and ideas. Nice to haves: Experience in supporting your team in shaping the ML strategy of your area Experience working with financial crime, operations and in regulated institutions Commercial experience writing critical production code and working with microservices Experience in evaluating ML models in live environments such as through A/B tests What's in it for you We'll help you relocate to the UK. We can sponsor your visa. This role can be based in our London office, but we're open to distributed working within the UK (with ad hoc meetings in London). We offer flexible working hours and trust you to work enough hours to do your job well, and at times that suit you and your team. £1,000 learning budget each year to use on books, training courses and conferences. We will set you up to work from home; all employees are given Macbooks and for fully remote workers we will provide extra support for your work-from-home setup. Our interview process involves 3 main stages. We promise not to ask you any brain teasers or trick questions! 30 minute recruiter call 45 minute call with hiring manager 1 take home task 2 x 1-hour video calls with various team members Our average process takes around 3-4 weeks but we will always work around your availability. Our goal at Monzo is to make money work for everyone. To do that, working at Monzo must work for everyone. We want to create an equitable, engaged and innovative workplace which gives people from all backgrounds the support they need to thrive and grow. Making Monzo work for everyone starts right at the beginning of every Monzonaut's journey: when they apply to work here. This demographic survey will help us better understand the people who apply to work at Monzo. It'll help us see how different groups progress through our hiring process, and where we need to make improvements to be more inclusive. If you choose to fill it out, all of the information you give us is voluntary. We have included a "prefer not to say" option for every question. It'd be helpful if you still fill out the survey even if you choose "prefer not to say" for every question, as it's useful for us to understand & record this. We won't know if you choose to fill this survey in or not. Anonymous to Monzo. We can't tie your responses to you and they won't make a difference to the outcome of your application. We'll only use grouped responses for equal opportunities monitoring in our hiring process. By filling out this survey, you agree that we can use your responses for the purposes we've mentioned above. You are not letting us know if we need to make any adjustments to the hiring process because of disability or neurodiversity - to do this please email us.
Lloyd Recruitment - Epsom
Senior Cyber Security & Network Analyst
Lloyd Recruitment - Epsom Epsom, Surrey
Senior Cyber Security & Network Analyst What's On Offer: Hybrid (2 days onsite; full-time in office for the first month) Enterprise-scale, highly regulated environment Hands-on cyber security & network projects Strong focus on development and progression Competitive salary + excellent benefits Permanent, full time (Flexibility is required for occasional weekend work when needed) We are pleased to be working with a highly regarded financial services organisation based just outside of Epsom, who are looking for a Senior Cyber Security & Network Analyst to join its growing technology function. It's a hands-on role within a strong team, focused on keeping systems secure while improving the wider network and security setup. This role offers the chance to operate at the intersection of cyber security and network engineering, supporting both day to day operations and strategic projects, so you'll play a vital role in protecting the organisation's infrastructure while contributing to ongoing transformation initiatives. Key Responsibilities: Own day to day cyber security operations, keeping systems and data secure Support and improve security tooling (firewalls, SIEM, endpoint, encryption) Monitor, investigate and respond to security incidents Look after core network infrastructure (LAN/WAN, Wi-Fi, L2/3, remote access, load balancing) Run vulnerability checks and ensure patching is up to date Use SIEM tools to spot and act on potential threats early Support audits, access controls and compliance requirements Get involved in (and lead) security and infrastructure projects Keep documentation and processes up to date Work with third-party suppliers where needed Support disaster recovery and business continuity planning What We're Looking For: 5 - 7+ years' experience in network engineering with strong cyber security exposure Proven experience with: Next-generation firewalls (e.g. Palo Alto) Endpoint detection and response tools SIEM platforms Vulnerability management tools (e.g. Qualys) Cisco switching (Layer 2/3) and enterprise networking Wireless technologies (e.g. Aruba) Network load balancing Strong incident management and threat analysis capabilities Experience working in regulated or compliance driven environments is advantageous Demonstrable experience delivering infrastructure or security projects About You: Strong analytical and problem solving mindset Excellent communication skills, both written and verbal Highly organised with strong attention to detail Proactive, self-motivated and able to work independently Collaborative approach with the ability to work across technical and non-technical teams Refer a friend and earn a retail voucher worth up to 500! Unfortunately, due to high numbers of applications, we are only able to respond to shortlisted applicants. If you have not heard from us within 5 days, please assume that you have not been shortlisted on this occasion. By applying for this vacancy, you accept Lloyd Recruitment Services Privacy and GDPR Policy which can be found on our website and therefore gives us consent to contact you. Lloyd Recruitment Services are acting as a recruitment agency in relation to this vacancy and are an equal opportunities employer.
21/05/2026
Full time
Senior Cyber Security & Network Analyst What's On Offer: Hybrid (2 days onsite; full-time in office for the first month) Enterprise-scale, highly regulated environment Hands-on cyber security & network projects Strong focus on development and progression Competitive salary + excellent benefits Permanent, full time (Flexibility is required for occasional weekend work when needed) We are pleased to be working with a highly regarded financial services organisation based just outside of Epsom, who are looking for a Senior Cyber Security & Network Analyst to join its growing technology function. It's a hands-on role within a strong team, focused on keeping systems secure while improving the wider network and security setup. This role offers the chance to operate at the intersection of cyber security and network engineering, supporting both day to day operations and strategic projects, so you'll play a vital role in protecting the organisation's infrastructure while contributing to ongoing transformation initiatives. Key Responsibilities: Own day to day cyber security operations, keeping systems and data secure Support and improve security tooling (firewalls, SIEM, endpoint, encryption) Monitor, investigate and respond to security incidents Look after core network infrastructure (LAN/WAN, Wi-Fi, L2/3, remote access, load balancing) Run vulnerability checks and ensure patching is up to date Use SIEM tools to spot and act on potential threats early Support audits, access controls and compliance requirements Get involved in (and lead) security and infrastructure projects Keep documentation and processes up to date Work with third-party suppliers where needed Support disaster recovery and business continuity planning What We're Looking For: 5 - 7+ years' experience in network engineering with strong cyber security exposure Proven experience with: Next-generation firewalls (e.g. Palo Alto) Endpoint detection and response tools SIEM platforms Vulnerability management tools (e.g. Qualys) Cisco switching (Layer 2/3) and enterprise networking Wireless technologies (e.g. Aruba) Network load balancing Strong incident management and threat analysis capabilities Experience working in regulated or compliance driven environments is advantageous Demonstrable experience delivering infrastructure or security projects About You: Strong analytical and problem solving mindset Excellent communication skills, both written and verbal Highly organised with strong attention to detail Proactive, self-motivated and able to work independently Collaborative approach with the ability to work across technical and non-technical teams Refer a friend and earn a retail voucher worth up to 500! Unfortunately, due to high numbers of applications, we are only able to respond to shortlisted applicants. If you have not heard from us within 5 days, please assume that you have not been shortlisted on this occasion. By applying for this vacancy, you accept Lloyd Recruitment Services Privacy and GDPR Policy which can be found on our website and therefore gives us consent to contact you. Lloyd Recruitment Services are acting as a recruitment agency in relation to this vacancy and are an equal opportunities employer.
Oscar Technology
Technical Product Owner
Oscar Technology Manchester, Lancashire
Technical Product Onwer Manchester £560 p/d Inside IR35 6 month contract 3 days on site Role Summary We are seeking an experienced Technical Product Owner. This senior contractor position will play a key role in driving strategic cyber initiatives, enhancing operational models, and delivering transformation programmes that improve cyber resilience, threat detection, incident response, and risk intelligence capabilities. The role sits at the convergence of technology, operational process, and stakeholder engagement. You will work closely with cross-functional delivery teams and third-party partners to ensure products and programmes are aligned to business objectives, user expectations, and established governance standards. Key Responsibilities Lead the delivery of product initiatives, operational model enhancements, and transformation programmes using Agile methodologies and continuous improvement practices. Collaborate with business and technical stakeholders to translate strategic priorities into practical product roadmaps and deliverable outcomes. Define and oversee product vision, design, implementation, and adoption strategies while balancing commercial priorities, technical feasibility, and user experience. Coordinate dependencies, risks, and delivery impacts across multiple teams and concurrent workstreams. Proactively manage issues, assumptions, blockers, and risks, escalating where necessary and providing clear recommendations to support informed decision-making and value realisation. Support effective collaboration between engineering, delivery, cybersecurity, and business functions to ensure successful programme execution. Skills & Experience Strong experience working as a Product Owner, Technical Product Manager, or similar product leadership role within Agile delivery environments. Proven track record delivering operating model improvements and driving enhancements to organisational processes and ways of working. Excellent stakeholder management and client engagement capabilities, with the ability to navigate competing priorities and influence senior audiences. Experience converting business and technical requirements into clearly defined user stories, delivery plans, and prioritised product backlogs. Solid understanding of software development lifecycles and experience working closely with engineering and technical delivery teams. Knowledge of cybersecurity risk management, threat landscapes, controls, and regulatory considerations within enterprise environments. Exposure to enterprise-scale data and analytics platforms, including technologies supporting reporting, insights, and decision intelligence. Adaptable mindset with a willingness to learn new technologies, frameworks, and cybersecurity domains. Technical Environment Agile delivery methodologies and backlog management platforms. Enterprise software engineering and product delivery practices. Cybersecurity risk, governance, and analytics solutions. Large-scale data and analytics technologies supporting operational and strategic reporting. If thia sounds like a fit, APPLY NOW! Technical Product Onwer Manchester £560 p/d Inside IR35 6 month contract 3 days on site Oscar Associates (UK) Limited is acting as an Employment Business in relation to this vacancy. To understand more about what we do with your data please review our privacy policy in the privacy section of the Oscar website.
20/05/2026
Contractor
Technical Product Onwer Manchester £560 p/d Inside IR35 6 month contract 3 days on site Role Summary We are seeking an experienced Technical Product Owner. This senior contractor position will play a key role in driving strategic cyber initiatives, enhancing operational models, and delivering transformation programmes that improve cyber resilience, threat detection, incident response, and risk intelligence capabilities. The role sits at the convergence of technology, operational process, and stakeholder engagement. You will work closely with cross-functional delivery teams and third-party partners to ensure products and programmes are aligned to business objectives, user expectations, and established governance standards. Key Responsibilities Lead the delivery of product initiatives, operational model enhancements, and transformation programmes using Agile methodologies and continuous improvement practices. Collaborate with business and technical stakeholders to translate strategic priorities into practical product roadmaps and deliverable outcomes. Define and oversee product vision, design, implementation, and adoption strategies while balancing commercial priorities, technical feasibility, and user experience. Coordinate dependencies, risks, and delivery impacts across multiple teams and concurrent workstreams. Proactively manage issues, assumptions, blockers, and risks, escalating where necessary and providing clear recommendations to support informed decision-making and value realisation. Support effective collaboration between engineering, delivery, cybersecurity, and business functions to ensure successful programme execution. Skills & Experience Strong experience working as a Product Owner, Technical Product Manager, or similar product leadership role within Agile delivery environments. Proven track record delivering operating model improvements and driving enhancements to organisational processes and ways of working. Excellent stakeholder management and client engagement capabilities, with the ability to navigate competing priorities and influence senior audiences. Experience converting business and technical requirements into clearly defined user stories, delivery plans, and prioritised product backlogs. Solid understanding of software development lifecycles and experience working closely with engineering and technical delivery teams. Knowledge of cybersecurity risk management, threat landscapes, controls, and regulatory considerations within enterprise environments. Exposure to enterprise-scale data and analytics platforms, including technologies supporting reporting, insights, and decision intelligence. Adaptable mindset with a willingness to learn new technologies, frameworks, and cybersecurity domains. Technical Environment Agile delivery methodologies and backlog management platforms. Enterprise software engineering and product delivery practices. Cybersecurity risk, governance, and analytics solutions. Large-scale data and analytics technologies supporting operational and strategic reporting. If thia sounds like a fit, APPLY NOW! Technical Product Onwer Manchester £560 p/d Inside IR35 6 month contract 3 days on site Oscar Associates (UK) Limited is acting as an Employment Business in relation to this vacancy. To understand more about what we do with your data please review our privacy policy in the privacy section of the Oscar website.
Lloyd Recruitment Services Ltd
Senior Cyber Security & Network Analyst
Lloyd Recruitment Services Ltd Epsom, Surrey
Senior Cyber Security & Network Analyst What's On Offer: Hybrid (2 days onsite; full-time in office for the first month) Enterprise-scale, highly regulated environment Hands-on cyber security & network projects Strong focus on development and progression Competitive salary + excellent benefits Permanent, full time (Flexibility is required for occasional weekend work when needed) We are pleased to be working with a highly regarded financial services organisation based just outside of Epsom, who are looking for a Senior Cyber Security & Network Analyst to join its growing technology function. It's a hands-on role within a strong team, focused on keeping systems secure while improving the wider network and security setup. This role offers the chance to operate at the intersection of cyber security and network engineering, supporting both day to day operations and strategic projects, so you'll play a vital role in protecting the organisation's infrastructure while contributing to ongoing transformation initiatives. Key Responsibilities: Own day to day cyber security operations, keeping systems and data secure Support and improve security tooling (firewalls, SIEM, endpoint, encryption) Monitor, investigate and respond to security incidents Look after core network infrastructure (LAN/WAN, Wi-Fi, L2/3, remote access, load balancing) Run vulnerability checks and ensure patching is up to date Use SIEM tools to spot and act on potential threats early Support audits, access controls and compliance requirements Get involved in (and lead) security and infrastructure projects Keep documentation and processes up to date Work with third-party suppliers where needed Support disaster recovery and business continuity planning What We're Looking For: 5 - 7+ years' experience in network engineering with strong cyber security exposure Proven experience with: Next-generation firewalls (e.g. Palo Alto) Endpoint detection and response tools SIEM platforms Vulnerability management tools (e.g. Qualys) Cisco switching (Layer 2/3) and enterprise networking Wireless technologies (e.g. Aruba) Network load balancing Strong incident management and threat analysis capabilities Experience working in regulated or compliance driven environments is advantageous Demonstrable experience delivering infrastructure or security projects About You: Strong analytical and problem solving mindset Excellent communication skills, both written and verbal Highly organised with strong attention to detail Proactive, self-motivated and able to work independently Collaborative approach with the ability to work across technical and non-technical teams Refer a friend and earn a retail voucher worth up to £500! Unfortunately, due to high numbers of applications, we are only able to respond to shortlisted applicants. If you have not heard from us within 5 days, please assume that you have not been shortlisted on this occasion. By applying for this vacancy, you accept Lloyd Recruitment Services Privacy and GDPR Policy which can be found on our website and therefore gives us consent to contact you. Lloyd Recruitment Services are acting as a recruitment agency in relation to this vacancy and are an equal opportunities employer.
20/05/2026
Full time
Senior Cyber Security & Network Analyst What's On Offer: Hybrid (2 days onsite; full-time in office for the first month) Enterprise-scale, highly regulated environment Hands-on cyber security & network projects Strong focus on development and progression Competitive salary + excellent benefits Permanent, full time (Flexibility is required for occasional weekend work when needed) We are pleased to be working with a highly regarded financial services organisation based just outside of Epsom, who are looking for a Senior Cyber Security & Network Analyst to join its growing technology function. It's a hands-on role within a strong team, focused on keeping systems secure while improving the wider network and security setup. This role offers the chance to operate at the intersection of cyber security and network engineering, supporting both day to day operations and strategic projects, so you'll play a vital role in protecting the organisation's infrastructure while contributing to ongoing transformation initiatives. Key Responsibilities: Own day to day cyber security operations, keeping systems and data secure Support and improve security tooling (firewalls, SIEM, endpoint, encryption) Monitor, investigate and respond to security incidents Look after core network infrastructure (LAN/WAN, Wi-Fi, L2/3, remote access, load balancing) Run vulnerability checks and ensure patching is up to date Use SIEM tools to spot and act on potential threats early Support audits, access controls and compliance requirements Get involved in (and lead) security and infrastructure projects Keep documentation and processes up to date Work with third-party suppliers where needed Support disaster recovery and business continuity planning What We're Looking For: 5 - 7+ years' experience in network engineering with strong cyber security exposure Proven experience with: Next-generation firewalls (e.g. Palo Alto) Endpoint detection and response tools SIEM platforms Vulnerability management tools (e.g. Qualys) Cisco switching (Layer 2/3) and enterprise networking Wireless technologies (e.g. Aruba) Network load balancing Strong incident management and threat analysis capabilities Experience working in regulated or compliance driven environments is advantageous Demonstrable experience delivering infrastructure or security projects About You: Strong analytical and problem solving mindset Excellent communication skills, both written and verbal Highly organised with strong attention to detail Proactive, self-motivated and able to work independently Collaborative approach with the ability to work across technical and non-technical teams Refer a friend and earn a retail voucher worth up to £500! Unfortunately, due to high numbers of applications, we are only able to respond to shortlisted applicants. If you have not heard from us within 5 days, please assume that you have not been shortlisted on this occasion. By applying for this vacancy, you accept Lloyd Recruitment Services Privacy and GDPR Policy which can be found on our website and therefore gives us consent to contact you. Lloyd Recruitment Services are acting as a recruitment agency in relation to this vacancy and are an equal opportunities employer.
Conde Nast
Security Engineer III
Conde Nast
Condé Nast is a global media company producing the highest quality content with a footprint of more than 1 billion consumers in 32 territories through print, digital, video and social platforms. The company's portfolio includes many of the world's most respected and influential media properties including Vogue, Vanity Fair, Glamour, Self, GQ, The New Yorker, Condé Nast Traveler/Traveller, Allure, AD, Bon Appétit and Wired, among others.# Job Description Location:London, GB Condé Nast is a global media company, home to iconic brands including and , among many others. We are headquartered in New York and London and operate in 32 markets worldwide, with a footprint of more than 1 billion consumers across print, digital, video and social platforms.Condé Nast thrives on collaboration, and our teams come together in the office four days a week (Monday - Thursday).We value diversity of background, views and cultures. We celebrate people for their personal qualities, skills and contributions, recognising the power our brands have to influence and shape culture. The Role Condé Nast is looking for a Security Engineer to join our global Cyber Security team. This is a high-visibility role designed for a technical lead who can bridge the gap between complex project delivery and long-term security engineering excellence.The successful candidate would have worked predominantly in the Identity and Access Management (IAM) space, specialising as an SME in the area of Privilege Access Management (PAM). As such you will have extensive knowledge of PAM solutions across multi-cloud and hybrid-on-premises environments, additionally you will have experience with identity lifecycle management as a whole and federated authentication protocols such as SAML, OIDC, and OAuth 2.0.As our SME within the PAM space, your journey will begin working on our global Privileged Access Management (PAM) project, where you will be responsible for the end-to-end implementation and delivery of our Privileged Access Management (PAM) solution into the organisation. As such, the successful candidate will have proven experience delivering end-to-end PAM solutions, including multiple CyberArk Privileged Cloud implementations, for medium to large organisations and would have worked in a professional services role or consultancy capacity previously.Following the successful deployment of the PAM platform, you will maintain end-to-end technical ownership as the platform's SME. As part of your role, you will collaborate strategically with the Identity team to harmonise our PAM and IAM architectures, ensuring both privileged and standard identities are hardened against modern threats through optimal configuration and policy alignment.This role reports to the Senior Security Architecture Manager, but will work closely with the Security Architect to ensure our PAM and IAM solutions are deployed effectively throughout the organisation. As the technical owner for key security platforms you will own the lifecycle management of these, ensuring they are delivering optimal security performance, automated lifecycle workflows, and a seamless user experience that aligns with our global security architecture. Act as the primary SME and technical owner for CyberArk Privilege Cloud throughout the project lifecycle; spearheading the design, implementation and onboarding phases, orchestrating the transition to Business-As-Usual (BAU), and providing technical support and platform governance post-delivery. Provide other team members with knowledge transfer and upskilling on PAM. Integrate SaaS, Cloud and on-premises applications with CyberArk as needed. Establish and maintain ongoing processes and procedures needed as part of the overarching PAM program, including the PAM standard. Act as the senior escalation point for complex PAM tooling issues, working with internal teams (Infrastructure, Support, Networking, Identity) and vendors to escalate and resolve issues. Collaborate with the Identity team to evaluate emerging platform features and roadmap enhancements, ensuring that new capabilities are architected and integrated into the global security stack with a focus on scalability and resilience. Create, maintain and update design documentation, technical documentation, service guides and administrative guides for security tooling. Provide administrative and overall support of the PAM platform, assisting with upgrades, maintenance, DR testing and management of the platform as a whole. Ensure the platform is integrated with on-prem SIEM solutions and work with the SOC team to define identity and privilege use cases and setup alerting as needed. Support the security engineering team with the management of detection and response tooling when required. Who you are: Senior PAM Engineer/Consultant with 4+ years' experience designing and implementing CyberArk Privilege Cloud in complex enterprise environments Certified as a CyberArk Sentry - Privilege Cloud Engineer or CyberArk Certified Delivery Engineer (CDE) Strong understanding of privileged identity lifecycle management, including onboarding Active Directory users and local Windows/Linux administrator accounts. Experience integrating CyberArk with Okta for identity lifecycle management and deploying core components such as SIA. Broad technical knowledge of Active Directory (including GPO), databases, application servers, operating systems (Windows, Linux, macOS), and network infrastructure Advanced experience in configuring and troubleshooting privileged applications, privileged identity management, and API integrations. Experience integrating PAM solutions across hybrid environments including AWS for key and secrets management, SSH and API key management, and reporting Familiarity with integrating load balancing technologies with CyberArk. Experience integrating PAM solutions with SIEM solutions, Experience of having implemented and worked with identity access management solutions such as Okta, Ping, OneLogin. Knowledge of federated authentication protocols such as SAML, OIDC, and OAuth 2.0. Strong knowledge of identity access governance tools and processes, security policy, and governance. Experience working in geographically dispersed environments Strong communication, presentation, and written skills Strong data analysis skills with intermediate to advanced proficiency in Google Sheets or Excel Experience of using SIEM, XDR/EDR, and Vulnerability Management solutions desirable. Scripting experience is essential (Python, Powershell) Please upload your CV and cover letter/portfolio, which highlights why you'd love to take on this role and why you're a great match for what we're looking for.We value the time and effort behind every application. All submissions are reviewed by a member of our talent team - we don't use AI-assisted technology to review applications. 25 days holiday (plus bank holidays) and extra days of annual leave if you move house or want to volunteer. You'll have access to a competitive pension scheme, Bupa Private Healthcare, Season ticket loans and eye tests. We offer a range of tools to support your wellbeing, including core hours, 10 remote days (from home or a country with a Condé Nast office location), access to our Employee Assistance Programme, corporate gym membership and cycle to work scheme. We're a dog friendly office, plus you'll enjoy discounts and magazine subscriptions, keeping you up to date with all things Condé Nast. We encourage personal and professional growth through the Condé Nast Learning Hub where you'll find an extensive portfolio of learning courses and training, available in local languages. Our Employee Resource Groups provide a platform for employees to identify shared objectives, exchange ideas, and work on community priorities for our global workforce.If you are interested in this opportunity,
20/05/2026
Full time
Condé Nast is a global media company producing the highest quality content with a footprint of more than 1 billion consumers in 32 territories through print, digital, video and social platforms. The company's portfolio includes many of the world's most respected and influential media properties including Vogue, Vanity Fair, Glamour, Self, GQ, The New Yorker, Condé Nast Traveler/Traveller, Allure, AD, Bon Appétit and Wired, among others.# Job Description Location:London, GB Condé Nast is a global media company, home to iconic brands including and , among many others. We are headquartered in New York and London and operate in 32 markets worldwide, with a footprint of more than 1 billion consumers across print, digital, video and social platforms.Condé Nast thrives on collaboration, and our teams come together in the office four days a week (Monday - Thursday).We value diversity of background, views and cultures. We celebrate people for their personal qualities, skills and contributions, recognising the power our brands have to influence and shape culture. The Role Condé Nast is looking for a Security Engineer to join our global Cyber Security team. This is a high-visibility role designed for a technical lead who can bridge the gap between complex project delivery and long-term security engineering excellence.The successful candidate would have worked predominantly in the Identity and Access Management (IAM) space, specialising as an SME in the area of Privilege Access Management (PAM). As such you will have extensive knowledge of PAM solutions across multi-cloud and hybrid-on-premises environments, additionally you will have experience with identity lifecycle management as a whole and federated authentication protocols such as SAML, OIDC, and OAuth 2.0.As our SME within the PAM space, your journey will begin working on our global Privileged Access Management (PAM) project, where you will be responsible for the end-to-end implementation and delivery of our Privileged Access Management (PAM) solution into the organisation. As such, the successful candidate will have proven experience delivering end-to-end PAM solutions, including multiple CyberArk Privileged Cloud implementations, for medium to large organisations and would have worked in a professional services role or consultancy capacity previously.Following the successful deployment of the PAM platform, you will maintain end-to-end technical ownership as the platform's SME. As part of your role, you will collaborate strategically with the Identity team to harmonise our PAM and IAM architectures, ensuring both privileged and standard identities are hardened against modern threats through optimal configuration and policy alignment.This role reports to the Senior Security Architecture Manager, but will work closely with the Security Architect to ensure our PAM and IAM solutions are deployed effectively throughout the organisation. As the technical owner for key security platforms you will own the lifecycle management of these, ensuring they are delivering optimal security performance, automated lifecycle workflows, and a seamless user experience that aligns with our global security architecture. Act as the primary SME and technical owner for CyberArk Privilege Cloud throughout the project lifecycle; spearheading the design, implementation and onboarding phases, orchestrating the transition to Business-As-Usual (BAU), and providing technical support and platform governance post-delivery. Provide other team members with knowledge transfer and upskilling on PAM. Integrate SaaS, Cloud and on-premises applications with CyberArk as needed. Establish and maintain ongoing processes and procedures needed as part of the overarching PAM program, including the PAM standard. Act as the senior escalation point for complex PAM tooling issues, working with internal teams (Infrastructure, Support, Networking, Identity) and vendors to escalate and resolve issues. Collaborate with the Identity team to evaluate emerging platform features and roadmap enhancements, ensuring that new capabilities are architected and integrated into the global security stack with a focus on scalability and resilience. Create, maintain and update design documentation, technical documentation, service guides and administrative guides for security tooling. Provide administrative and overall support of the PAM platform, assisting with upgrades, maintenance, DR testing and management of the platform as a whole. Ensure the platform is integrated with on-prem SIEM solutions and work with the SOC team to define identity and privilege use cases and setup alerting as needed. Support the security engineering team with the management of detection and response tooling when required. Who you are: Senior PAM Engineer/Consultant with 4+ years' experience designing and implementing CyberArk Privilege Cloud in complex enterprise environments Certified as a CyberArk Sentry - Privilege Cloud Engineer or CyberArk Certified Delivery Engineer (CDE) Strong understanding of privileged identity lifecycle management, including onboarding Active Directory users and local Windows/Linux administrator accounts. Experience integrating CyberArk with Okta for identity lifecycle management and deploying core components such as SIA. Broad technical knowledge of Active Directory (including GPO), databases, application servers, operating systems (Windows, Linux, macOS), and network infrastructure Advanced experience in configuring and troubleshooting privileged applications, privileged identity management, and API integrations. Experience integrating PAM solutions across hybrid environments including AWS for key and secrets management, SSH and API key management, and reporting Familiarity with integrating load balancing technologies with CyberArk. Experience integrating PAM solutions with SIEM solutions, Experience of having implemented and worked with identity access management solutions such as Okta, Ping, OneLogin. Knowledge of federated authentication protocols such as SAML, OIDC, and OAuth 2.0. Strong knowledge of identity access governance tools and processes, security policy, and governance. Experience working in geographically dispersed environments Strong communication, presentation, and written skills Strong data analysis skills with intermediate to advanced proficiency in Google Sheets or Excel Experience of using SIEM, XDR/EDR, and Vulnerability Management solutions desirable. Scripting experience is essential (Python, Powershell) Please upload your CV and cover letter/portfolio, which highlights why you'd love to take on this role and why you're a great match for what we're looking for.We value the time and effort behind every application. All submissions are reviewed by a member of our talent team - we don't use AI-assisted technology to review applications. 25 days holiday (plus bank holidays) and extra days of annual leave if you move house or want to volunteer. You'll have access to a competitive pension scheme, Bupa Private Healthcare, Season ticket loans and eye tests. We offer a range of tools to support your wellbeing, including core hours, 10 remote days (from home or a country with a Condé Nast office location), access to our Employee Assistance Programme, corporate gym membership and cycle to work scheme. We're a dog friendly office, plus you'll enjoy discounts and magazine subscriptions, keeping you up to date with all things Condé Nast. We encourage personal and professional growth through the Condé Nast Learning Hub where you'll find an extensive portfolio of learning courses and training, available in local languages. Our Employee Resource Groups provide a platform for employees to identify shared objectives, exchange ideas, and work on community priorities for our global workforce.If you are interested in this opportunity,
Senior Backend Engineer - Monetization
Feeld
At Feeld, we are creating a world where where everyone is more intimately connected to each other and themselves. We are building an inclusive, human-centred product and are looking for a Senior Backend Monetization Engineer to become part of our remote team and our mission to elevate the human experience of sexuality and relationships. You will be responsible for designing, building, and operating scalable, secure backend systems that power the company's revenue-generating experiences to ensure monetisation flows are reliable, compliant, observable, and performant at scale. To be right for this role, you should have extensive experience in Backend development with some specific experience with in-app purchases, pricing, and other revenue-related services. What you will do: Drive outcomes, not just features. You'll own the health of our monetisation funnel and be responsible for the reliability and performance of the systems that keep Feeld sustainable. Design and maintain scalable backend systems that support integrations related to subscriptions, billing, entitlements, pricing logic, and promotional mechanics as the user base grows. Ensure high reliability and correctness of monetisation flows, minimising revenue-impacting incidents and reducing time-to-detection and resolution. Enable faster experimentation by supporting feature flags, testing, and analytics instrumentation across monetisation systems. In partnership with the Data team, build and maintain analytics and reporting capabilities that provide insight into revenue performance, user behavior, and system health. How you will grow: Deepen your expertise in designing and operating revenue-critical systems at scale. Develop advanced skills in system observability, monitoring, and incident response for high-throughput financial workloads. Expand your knowledge of analytics infrastructure, experimentation frameworks, and data-driven product development. Improve your collaborating skills with non-technical partners by translating complex technical concepts into clear business insights About you: You have experience designing, building, and maintaining backend services that handle high-throughput, business-critical workloads such as payments, subscriptions, or financial systems. You are comfortable working with databases, APIs, and ensuring data integrity and security in production environments. You are skilled at communicating technical concepts clearly to non-technical cross-functional partners. You approach problems with curiosity and systems thinking, balancing technical excellence with business impact and user experience. Bonus points: You have experience building or maintaining subscription platforms, billing systems, or working directly with payment providers like Adapty, Stripe, RevenueCat, or Apple/Google in-app purchase APIs. You have worked with analytics pipelines, experimentation frameworks, or feature flagging systems to support data-driven product decisions. You have mentored other engineers or led technical initiatives that improved system reliability, performance, or developer experience. You have experience with mobile backend integration or supporting cross-platform monetisation flows across iOS, Android, and web. About us: Feeld is an independent, experimental and fully remote organisation reshaping the dialogue on dating and sexuality. The company was founded in 2014 and has evolved since to become the open, distributed structure it is now. We have a naturally agile and fluid culture. The whole team is fully remote, which means you work where and when helps you perform at your best. We regard autonomy highly and treat our organisation as a product - we iterate, improve and test things internally to see what works best for everyone. Our culture: We believe in creating a safe work environment through humanity, fluidity, safety, transparency and progressiveness. When hiring, we look for culture add rather than culture fit. Because we are a fully remote team, it's especially important that we create an environment where our colleagues feel included and connected as humans. Diversity, equity, inclusion and belonging at Feeld: Feeld promotes open-mindedness, inclusion, diversity and kindness, both in the world and among our own workforce. We encourage and welcome applications from people with a history of marginalisation, whether because of race, gender expression or identity, sexual orientation, neurodivergence, national origin, disability (seen or unseen) or any confluence of intersectional identities. Our goal is a barrier-free application process and working environment. If you require further details or assistance or have any questions about this process, please let us know at . Compensation and perks: We are conscious of how our work and decisions impact other humans and the environment. We design our product and organisation with consideration for the wellbeing of our Members and colleagues. Feeld's way of working is designed to proactively prevent burnout and an "always on" culture. We believe in technology and working environments that enable people to live a meaningful, fulfilled life. Therefore, we offer our staff: Flexible working hours Unlimited paid time off A fully remote working situation Home office budget Learning & development budget On demand therapy sessions and mental health support via Spill In-person meet ups Our compensation system is one of the ways we work to uphold equity and inclusion at Feeld. Just as we strive to enable honest expression on our platform, we strive for openness of information within the organization. Internally, we keep decision-making transparent to keep each other accountable and make sure all voices are heard. That is why we offer a compensation system that is transparent, honest, and equitable. Additionally, we believe all humans deserve to earn a competitive wage, so we offer a Baseline Freedom Salary of £60,000 GBP per year for any role that indexes below £60,000 GBP per year. Estimated compensation for this role: The total cash compensation for this role is dependent on Level and Step, as well as geographic location, but we estimate that the competitive market compensation for this role is between £75,000 - £110,000 GBP based on the requirements listed in this job description. Our interview process: Your first conversation with Feeld will be a screening call with our recruiter, where you'll be able to ask - and receive answers - regarding any general questions you have and to confirm the role is a fit for what you're seeking. Your second conversation will connect you directly with the hiring manager for the role you're applying to. Here, you'll have a chance to ask more questions about the work you'll be doing. This conversation will also focus on your past work experiences. The next step for most of our roles is a candidate challenge. This is an evaluation of the skills relevant to be successful in this role and generally takes about an hour to complete. Your third conversation allows you the opportunity to meet the team members you might be working with on a daily basis. Here, you'll be able to ask questions about team processes, workflow, and the employee experience at Feeld. We generally make an offer within 2 weeks of our final call, and offer a flexible start date that can begin as early as the next Monday after you sign our offer documentation. Of note: all of our interviews are conducted remotely, and our interviewers will work with you to find an agreeable interview time based on mutual availability. We understand we're asking you to invest your time and best efforts in our process, and are appreciative of getting the chance to better know who you are as a person and candidate. In return, we're committed to offering transparent communication and prompt feedback as you navigate this application with us. To find out more about Feeld, download our app (available on iOS and Android).
20/05/2026
Full time
At Feeld, we are creating a world where where everyone is more intimately connected to each other and themselves. We are building an inclusive, human-centred product and are looking for a Senior Backend Monetization Engineer to become part of our remote team and our mission to elevate the human experience of sexuality and relationships. You will be responsible for designing, building, and operating scalable, secure backend systems that power the company's revenue-generating experiences to ensure monetisation flows are reliable, compliant, observable, and performant at scale. To be right for this role, you should have extensive experience in Backend development with some specific experience with in-app purchases, pricing, and other revenue-related services. What you will do: Drive outcomes, not just features. You'll own the health of our monetisation funnel and be responsible for the reliability and performance of the systems that keep Feeld sustainable. Design and maintain scalable backend systems that support integrations related to subscriptions, billing, entitlements, pricing logic, and promotional mechanics as the user base grows. Ensure high reliability and correctness of monetisation flows, minimising revenue-impacting incidents and reducing time-to-detection and resolution. Enable faster experimentation by supporting feature flags, testing, and analytics instrumentation across monetisation systems. In partnership with the Data team, build and maintain analytics and reporting capabilities that provide insight into revenue performance, user behavior, and system health. How you will grow: Deepen your expertise in designing and operating revenue-critical systems at scale. Develop advanced skills in system observability, monitoring, and incident response for high-throughput financial workloads. Expand your knowledge of analytics infrastructure, experimentation frameworks, and data-driven product development. Improve your collaborating skills with non-technical partners by translating complex technical concepts into clear business insights About you: You have experience designing, building, and maintaining backend services that handle high-throughput, business-critical workloads such as payments, subscriptions, or financial systems. You are comfortable working with databases, APIs, and ensuring data integrity and security in production environments. You are skilled at communicating technical concepts clearly to non-technical cross-functional partners. You approach problems with curiosity and systems thinking, balancing technical excellence with business impact and user experience. Bonus points: You have experience building or maintaining subscription platforms, billing systems, or working directly with payment providers like Adapty, Stripe, RevenueCat, or Apple/Google in-app purchase APIs. You have worked with analytics pipelines, experimentation frameworks, or feature flagging systems to support data-driven product decisions. You have mentored other engineers or led technical initiatives that improved system reliability, performance, or developer experience. You have experience with mobile backend integration or supporting cross-platform monetisation flows across iOS, Android, and web. About us: Feeld is an independent, experimental and fully remote organisation reshaping the dialogue on dating and sexuality. The company was founded in 2014 and has evolved since to become the open, distributed structure it is now. We have a naturally agile and fluid culture. The whole team is fully remote, which means you work where and when helps you perform at your best. We regard autonomy highly and treat our organisation as a product - we iterate, improve and test things internally to see what works best for everyone. Our culture: We believe in creating a safe work environment through humanity, fluidity, safety, transparency and progressiveness. When hiring, we look for culture add rather than culture fit. Because we are a fully remote team, it's especially important that we create an environment where our colleagues feel included and connected as humans. Diversity, equity, inclusion and belonging at Feeld: Feeld promotes open-mindedness, inclusion, diversity and kindness, both in the world and among our own workforce. We encourage and welcome applications from people with a history of marginalisation, whether because of race, gender expression or identity, sexual orientation, neurodivergence, national origin, disability (seen or unseen) or any confluence of intersectional identities. Our goal is a barrier-free application process and working environment. If you require further details or assistance or have any questions about this process, please let us know at . Compensation and perks: We are conscious of how our work and decisions impact other humans and the environment. We design our product and organisation with consideration for the wellbeing of our Members and colleagues. Feeld's way of working is designed to proactively prevent burnout and an "always on" culture. We believe in technology and working environments that enable people to live a meaningful, fulfilled life. Therefore, we offer our staff: Flexible working hours Unlimited paid time off A fully remote working situation Home office budget Learning & development budget On demand therapy sessions and mental health support via Spill In-person meet ups Our compensation system is one of the ways we work to uphold equity and inclusion at Feeld. Just as we strive to enable honest expression on our platform, we strive for openness of information within the organization. Internally, we keep decision-making transparent to keep each other accountable and make sure all voices are heard. That is why we offer a compensation system that is transparent, honest, and equitable. Additionally, we believe all humans deserve to earn a competitive wage, so we offer a Baseline Freedom Salary of £60,000 GBP per year for any role that indexes below £60,000 GBP per year. Estimated compensation for this role: The total cash compensation for this role is dependent on Level and Step, as well as geographic location, but we estimate that the competitive market compensation for this role is between £75,000 - £110,000 GBP based on the requirements listed in this job description. Our interview process: Your first conversation with Feeld will be a screening call with our recruiter, where you'll be able to ask - and receive answers - regarding any general questions you have and to confirm the role is a fit for what you're seeking. Your second conversation will connect you directly with the hiring manager for the role you're applying to. Here, you'll have a chance to ask more questions about the work you'll be doing. This conversation will also focus on your past work experiences. The next step for most of our roles is a candidate challenge. This is an evaluation of the skills relevant to be successful in this role and generally takes about an hour to complete. Your third conversation allows you the opportunity to meet the team members you might be working with on a daily basis. Here, you'll be able to ask questions about team processes, workflow, and the employee experience at Feeld. We generally make an offer within 2 weeks of our final call, and offer a flexible start date that can begin as early as the next Monday after you sign our offer documentation. Of note: all of our interviews are conducted remotely, and our interviewers will work with you to find an agreeable interview time based on mutual availability. We understand we're asking you to invest your time and best efforts in our process, and are appreciative of getting the chance to better know who you are as a person and candidate. In return, we're committed to offering transparent communication and prompt feedback as you navigate this application with us. To find out more about Feeld, download our app (available on iOS and Android).
Careerwise
SOC Operations Technical Lead
Careerwise
We are looking for a highly skilled and hands-on SOC Operations Technical Lead to join a leading Managed Security Services Provider (MSSP). This is a senior technical leadership role where you'll lead a team of SOC Analysts operating in a 24/7 environment while remaining deeply involved in threat detection, incident response, threat hunting, and detection engineering across a diverse multi-client portfolio. What You'll Be Doing Lead and mentor SOC Analysts across all shifts Act as the senior technical escalation point for complex security incidents Conduct advanced threat hunting and incident response Develop and tune detection rules, use cases, and correlation logic Drive automation and continuous improvement initiatives Work closely with clients to deliver security reviews and strategic recommendations Collaborate with Threat Intelligence, Engineering, and Incident Response teams What We're Looking For 7+ years in Security Operations 3-4+ years in a senior or lead SOC role MSSP or multi-client environment experience Strong threat hunting and incident response expertise Client-facing consulting skills Relevant certifications such as CISSP, GCIH, GCIA, GREM, SC-200, or SC-300
20/05/2026
Contractor
We are looking for a highly skilled and hands-on SOC Operations Technical Lead to join a leading Managed Security Services Provider (MSSP). This is a senior technical leadership role where you'll lead a team of SOC Analysts operating in a 24/7 environment while remaining deeply involved in threat detection, incident response, threat hunting, and detection engineering across a diverse multi-client portfolio. What You'll Be Doing Lead and mentor SOC Analysts across all shifts Act as the senior technical escalation point for complex security incidents Conduct advanced threat hunting and incident response Develop and tune detection rules, use cases, and correlation logic Drive automation and continuous improvement initiatives Work closely with clients to deliver security reviews and strategic recommendations Collaborate with Threat Intelligence, Engineering, and Incident Response teams What We're Looking For 7+ years in Security Operations 3-4+ years in a senior or lead SOC role MSSP or multi-client environment experience Strong threat hunting and incident response expertise Client-facing consulting skills Relevant certifications such as CISSP, GCIH, GCIA, GREM, SC-200, or SC-300
Regional Information Security Manager - Incident Response
KPMG Careers Birmingham, Staffordshire
Regional Information Security Manager - Incident Response Location: Birmingham, Bristol, Glasgow, London, Manchester, Milton Keynes, Reading, Watford Capability: International Experience Level: Senior Manager Type: Full Time Business Area: KPMG International Contract type: Permanent About the Team Global Information Security Group (GISG) is a domain within KPMG's Global Digital group that provides information protection and technology infrastructure and services to secure KPMG's technology environment and connect its network of member firms. Role Summary Advise member firms on the implementation of KPMG information risk and security standards / requirements related to Incident Management. Recommend and support member firms to enforce defined security policies and global technology standard. Maintain an up-to-date knowledge base following global incident trends, security advisories and alerts, information on global standard and best practices. Vulnerability management and controls validation: evaluate and select vulnerability assessment and other security assessment capabilities, and deploy, operate and maintain these technologies and adjacent processes. Closely follow security trends and vulnerabilities, cyber security threats and provide feedback to Global security. Actively communicate and keep abreast of the latest trends in threat intelligence and incident response. Advise member firms how to best manage local incident response training to ensure readiness across regions. Advise and support member firms in improving the effectiveness of their event and incident management operation. Monitor and report a consolidated regional view of global technology standard adoption status and take action by following up on findings. Lead the assessment and provide recommendations on any exceptions to policies or standards. Lead and oversee regional incident triage activities and tracking of critical cybersecurity incidents from initial detection through final resolution. Lead and oversee incident escalation towards member firms and global teams. Work with Global security on red / blue teaming activities on regional level. Setting up and leading a community with the EMA region with respect to technical trends, vulnerabilities and incidents. Lead and oversee compliance with any applicable regulatory requirements for cyber incident. Key Accountabilities Advise member firms on Global security standards for incident response and issues (adopting, monitoring). Deliver security reporting for incident response, escalations, and opportunities into Regional Information Security Officer (RISO). Facilitate meetings with Member Firms on implementation incident management processing and tools, including best practices. Capture specific Member Firm requirements for services and act as a conduit into RISO to recommend service updates. Provide support into Member Firms on incident management related matters. Support Security Incident Response processes across the Region. Experience, Knowledge & Qualification Bachelor's degree in Computer Science, Information Security, Information Systems, Computer Engineering, or a related field is required. Proven experience developing or managing an enterprise level of security programs (focus on Incident Management). At least one industry certification preferred (e.g. CISSP, CISA, CISM, CRISC, ISAAP). Background working on large-scale international services and the ability to manage multiple processes and service delivery at once while building constructive working relationships across the different teams, functions, cultures, genders and demonstrating KPMG behaviours and values. Security Operations / Incident Management / Managed Security Services experience preferred. Working knowledge of multiple security topics such as threat intelligence, vulnerability management products, firewall management or endpoint protection. Deep knowledge of cyber kill chain and understanding of threat intelligence lifecycle. Strong knowledge of computer networking concepts and protocols (including OSI and TCP/IP layer models) and network security methodologies. Strong knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Experienced in deployment and maintenance of Microsoft products. Keeps abreast of security related technology, practices and regulations in the marketplace and validates tools for use to improve the Managed Security Services offerings. Experience in working in a matrix management environment. Working knowledge of common IT security-related regulations and or standards such as Sarbanes Oxley and ISO highly desired. Strong oral and written communication skills. Must have strong analytical and critical thinking skills. Expertise in conducting incident response activities and seeing incidents through to successful remediation across multiple geographies. Accessibility and Reasonable Adjustments KPMG International is proud to be an inclusive place to work and we are committed to ensuring that you are treated fairly throughout our recruitment process. If you require reasonable adjustments, please discuss them with your recruitment contact. Commitment to Inclusion & Diversity KPMG International recognises that inclusion and diversity are essential for success and strives to attract, retain, and develop diverse talent at all levels, creating a fully inclusive environment that empowers everyone.
20/05/2026
Full time
Regional Information Security Manager - Incident Response Location: Birmingham, Bristol, Glasgow, London, Manchester, Milton Keynes, Reading, Watford Capability: International Experience Level: Senior Manager Type: Full Time Business Area: KPMG International Contract type: Permanent About the Team Global Information Security Group (GISG) is a domain within KPMG's Global Digital group that provides information protection and technology infrastructure and services to secure KPMG's technology environment and connect its network of member firms. Role Summary Advise member firms on the implementation of KPMG information risk and security standards / requirements related to Incident Management. Recommend and support member firms to enforce defined security policies and global technology standard. Maintain an up-to-date knowledge base following global incident trends, security advisories and alerts, information on global standard and best practices. Vulnerability management and controls validation: evaluate and select vulnerability assessment and other security assessment capabilities, and deploy, operate and maintain these technologies and adjacent processes. Closely follow security trends and vulnerabilities, cyber security threats and provide feedback to Global security. Actively communicate and keep abreast of the latest trends in threat intelligence and incident response. Advise member firms how to best manage local incident response training to ensure readiness across regions. Advise and support member firms in improving the effectiveness of their event and incident management operation. Monitor and report a consolidated regional view of global technology standard adoption status and take action by following up on findings. Lead the assessment and provide recommendations on any exceptions to policies or standards. Lead and oversee regional incident triage activities and tracking of critical cybersecurity incidents from initial detection through final resolution. Lead and oversee incident escalation towards member firms and global teams. Work with Global security on red / blue teaming activities on regional level. Setting up and leading a community with the EMA region with respect to technical trends, vulnerabilities and incidents. Lead and oversee compliance with any applicable regulatory requirements for cyber incident. Key Accountabilities Advise member firms on Global security standards for incident response and issues (adopting, monitoring). Deliver security reporting for incident response, escalations, and opportunities into Regional Information Security Officer (RISO). Facilitate meetings with Member Firms on implementation incident management processing and tools, including best practices. Capture specific Member Firm requirements for services and act as a conduit into RISO to recommend service updates. Provide support into Member Firms on incident management related matters. Support Security Incident Response processes across the Region. Experience, Knowledge & Qualification Bachelor's degree in Computer Science, Information Security, Information Systems, Computer Engineering, or a related field is required. Proven experience developing or managing an enterprise level of security programs (focus on Incident Management). At least one industry certification preferred (e.g. CISSP, CISA, CISM, CRISC, ISAAP). Background working on large-scale international services and the ability to manage multiple processes and service delivery at once while building constructive working relationships across the different teams, functions, cultures, genders and demonstrating KPMG behaviours and values. Security Operations / Incident Management / Managed Security Services experience preferred. Working knowledge of multiple security topics such as threat intelligence, vulnerability management products, firewall management or endpoint protection. Deep knowledge of cyber kill chain and understanding of threat intelligence lifecycle. Strong knowledge of computer networking concepts and protocols (including OSI and TCP/IP layer models) and network security methodologies. Strong knowledge of intrusion detection methodologies and techniques for detecting host and network-based intrusions. Experienced in deployment and maintenance of Microsoft products. Keeps abreast of security related technology, practices and regulations in the marketplace and validates tools for use to improve the Managed Security Services offerings. Experience in working in a matrix management environment. Working knowledge of common IT security-related regulations and or standards such as Sarbanes Oxley and ISO highly desired. Strong oral and written communication skills. Must have strong analytical and critical thinking skills. Expertise in conducting incident response activities and seeing incidents through to successful remediation across multiple geographies. Accessibility and Reasonable Adjustments KPMG International is proud to be an inclusive place to work and we are committed to ensuring that you are treated fairly throughout our recruitment process. If you require reasonable adjustments, please discuss them with your recruitment contact. Commitment to Inclusion & Diversity KPMG International recognises that inclusion and diversity are essential for success and strives to attract, retain, and develop diverse talent at all levels, creating a fully inclusive environment that empowers everyone.
SOC Subject Matter Expert (UK)
Detego Global Horsham, Sussex
Detego Global is on the lookout for a SOC Subject Matter Expert to join our Product Management team. We are looking for a mid to senior SOC analyst with extensive operational experience who is ready to transition into a product-focused role. You will be the voice of the SOC development team, translating deep operational security experience into product requirements and strategic direction for advanced SOC command and control tools. You will work closely with product managers, engineers, UX designers, and customers to ensure our products solve real analyst challenges and improve SOC efficiency and effectiveness. This role will provide the right candidate with the opportunity to work on some extremely rewarding projects supporting the development of impactful security operations software while working with a friendly and supportive team. The role has a strong opportunity for growth and will play an integral role in helping shape the future of SOC products and security operations tools. Reports to: Senior Product Manager Place of Work: Hybrid Remote/Office in Horsham Responsibilities and Duties The SOC Subject Matter Expert role requires a professional who combines extensive SOC operational experience with strategic product thinking to bridge the gap between security operations needs and product development. They will be responsible for providing expert SOC operational guidance throughout the product development lifecycle, defining system-level requirements, and ensuring our products genuinely address the challenges faced by SOC analysts in real-world environments. Their primary responsibility lies in translating SOC analyst pain points, workflows, and use cases into actionable product features, with particular focus on alert/incident prioritisation and intelligent playbook execution that helps analysts make critical security decisions. Their responsibilities will include: Providing expert SOC operational guidance to product management and engineering teams throughout the product development lifecycle. Defining and documenting detailed system-level requirements for SOC analyst tools, ensuring alignment with real-world operational needs. Translating SOC analyst pain points, workflows, and use cases into actionable product features and user stories. Designing and validating alert prioritisation algorithms, incident triage workflows, and automated playbook logic based on operational experience. Collaborating with product managers to shape product strategy, roadmap priorities, and feature definitions. Conducting customer discovery sessions, interviews, and workshops with SOC teams to gather requirements and validate concepts. Creating realistic user personas, journey maps, and workflow diagrams that represent authentic SOC analyst experiences. Evaluating competitive SOC tools and industry trends to inform product differentiation and innovation opportunities. Participating in proof-of-concept development to validate new features addressing critical analyst decision-making challenges. Working with UX designers to ensure intuitive interfaces that match SOC analyst mental models and workflow patterns. Providing technical consultation on threat detection logic, MITRE ATT&CK mapping, and security operations best practices. Supporting go-to-market activities by creating technical content, conducting product demonstrations, and engaging with prospective customers. Mentoring and educating internal teams on SOC operations, threat landscapes, and analyst workflows. Ensuring product features align with industry frameworks (MITRE ATT&CK, NIST, ISO 27001) and SOC maturity models. Act as a trusted SOC and cyber defence expert in customer meetings, workshops, and solution design sessions. Support pre-sales engagements by articulating operational value, use cases, and real-world applicability. Deliver product demonstrations and technical briefings tailored to SOC practitioners, security leaders, and decision-makers. Translate complex SOC workflows and technical concepts into clear, compelling narratives for customers and stakeholders. Support go-to-market activities through technical content creation, presentations, and customer engagement. Skills and Experience Minimum 6 years of hands on experience as a SOC Analyst, Senior SOC Analyst, or SOC Team Lead Deep understanding of end to end SOC operations including alert triage, incident response, threat hunting, and case management Extensive experience with SIEM platforms, security orchestration tools, and the broader SOC technology stack Strong knowledge of threat detection methodologies, alert correlation, and incident prioritisation frameworks Expert level understanding of MITRE ATT&CK framework and its practical application in SOC operations Proven ability to identify operational inefficiencies and translate them into product improvement opportunities Experience developing or optimising SOC playbooks, runbooks, and standard operating procedures Excellent communication skills with ability to articulate complex security concepts to both technical and business audiences Strong analytical and strategic thinking capabilities Understanding of common attack patterns, threat actor TTPs, and the evolving threat landscape Ability to balance ideal security outcomes with practical operational constraints and business realities Strong problem solving skills and willingness to roll up one's sleeves to get the job done Skilled at working effectively with cross functional teams in a matrix organisation 8+ years of progressive SOC experience including team leadership or senior analyst responsibilities. Experience in Tier 2 or Tier 3 SOC roles with incident response and threat hunting responsibilities. Previous involvement in SOC tool evaluation, selection, or implementation projects. Experience with security automation, SOAR platforms, or playbook development. Experience working with or partnering with SOC/SIEM/EDR vendors and MSSP (Managed Security Service Provider) vendors. Familiarity with product management principles, agile methodologies, or requirements gathering processes. Experience presenting to executive leadership or external stakeholders. Knowledge of multiple SIEM platforms (Splunk, QRadar, Sentinel, Chronicle, etc.) and their operational strengths/weaknesses. Understanding of SOC metrics, KPIs, and performance measurement frameworks. Security certifications (e.g., GCIH, GCIA, GCFA, CISSP, GMON) demonstrating advanced security operations expertise. Experience working in regulated industries or with compliance driven security operations. Bachelor's degree in cybersecurity, information technology, or related field. "
20/05/2026
Full time
Detego Global is on the lookout for a SOC Subject Matter Expert to join our Product Management team. We are looking for a mid to senior SOC analyst with extensive operational experience who is ready to transition into a product-focused role. You will be the voice of the SOC development team, translating deep operational security experience into product requirements and strategic direction for advanced SOC command and control tools. You will work closely with product managers, engineers, UX designers, and customers to ensure our products solve real analyst challenges and improve SOC efficiency and effectiveness. This role will provide the right candidate with the opportunity to work on some extremely rewarding projects supporting the development of impactful security operations software while working with a friendly and supportive team. The role has a strong opportunity for growth and will play an integral role in helping shape the future of SOC products and security operations tools. Reports to: Senior Product Manager Place of Work: Hybrid Remote/Office in Horsham Responsibilities and Duties The SOC Subject Matter Expert role requires a professional who combines extensive SOC operational experience with strategic product thinking to bridge the gap between security operations needs and product development. They will be responsible for providing expert SOC operational guidance throughout the product development lifecycle, defining system-level requirements, and ensuring our products genuinely address the challenges faced by SOC analysts in real-world environments. Their primary responsibility lies in translating SOC analyst pain points, workflows, and use cases into actionable product features, with particular focus on alert/incident prioritisation and intelligent playbook execution that helps analysts make critical security decisions. Their responsibilities will include: Providing expert SOC operational guidance to product management and engineering teams throughout the product development lifecycle. Defining and documenting detailed system-level requirements for SOC analyst tools, ensuring alignment with real-world operational needs. Translating SOC analyst pain points, workflows, and use cases into actionable product features and user stories. Designing and validating alert prioritisation algorithms, incident triage workflows, and automated playbook logic based on operational experience. Collaborating with product managers to shape product strategy, roadmap priorities, and feature definitions. Conducting customer discovery sessions, interviews, and workshops with SOC teams to gather requirements and validate concepts. Creating realistic user personas, journey maps, and workflow diagrams that represent authentic SOC analyst experiences. Evaluating competitive SOC tools and industry trends to inform product differentiation and innovation opportunities. Participating in proof-of-concept development to validate new features addressing critical analyst decision-making challenges. Working with UX designers to ensure intuitive interfaces that match SOC analyst mental models and workflow patterns. Providing technical consultation on threat detection logic, MITRE ATT&CK mapping, and security operations best practices. Supporting go-to-market activities by creating technical content, conducting product demonstrations, and engaging with prospective customers. Mentoring and educating internal teams on SOC operations, threat landscapes, and analyst workflows. Ensuring product features align with industry frameworks (MITRE ATT&CK, NIST, ISO 27001) and SOC maturity models. Act as a trusted SOC and cyber defence expert in customer meetings, workshops, and solution design sessions. Support pre-sales engagements by articulating operational value, use cases, and real-world applicability. Deliver product demonstrations and technical briefings tailored to SOC practitioners, security leaders, and decision-makers. Translate complex SOC workflows and technical concepts into clear, compelling narratives for customers and stakeholders. Support go-to-market activities through technical content creation, presentations, and customer engagement. Skills and Experience Minimum 6 years of hands on experience as a SOC Analyst, Senior SOC Analyst, or SOC Team Lead Deep understanding of end to end SOC operations including alert triage, incident response, threat hunting, and case management Extensive experience with SIEM platforms, security orchestration tools, and the broader SOC technology stack Strong knowledge of threat detection methodologies, alert correlation, and incident prioritisation frameworks Expert level understanding of MITRE ATT&CK framework and its practical application in SOC operations Proven ability to identify operational inefficiencies and translate them into product improvement opportunities Experience developing or optimising SOC playbooks, runbooks, and standard operating procedures Excellent communication skills with ability to articulate complex security concepts to both technical and business audiences Strong analytical and strategic thinking capabilities Understanding of common attack patterns, threat actor TTPs, and the evolving threat landscape Ability to balance ideal security outcomes with practical operational constraints and business realities Strong problem solving skills and willingness to roll up one's sleeves to get the job done Skilled at working effectively with cross functional teams in a matrix organisation 8+ years of progressive SOC experience including team leadership or senior analyst responsibilities. Experience in Tier 2 or Tier 3 SOC roles with incident response and threat hunting responsibilities. Previous involvement in SOC tool evaluation, selection, or implementation projects. Experience with security automation, SOAR platforms, or playbook development. Experience working with or partnering with SOC/SIEM/EDR vendors and MSSP (Managed Security Service Provider) vendors. Familiarity with product management principles, agile methodologies, or requirements gathering processes. Experience presenting to executive leadership or external stakeholders. Knowledge of multiple SIEM platforms (Splunk, QRadar, Sentinel, Chronicle, etc.) and their operational strengths/weaknesses. Understanding of SOC metrics, KPIs, and performance measurement frameworks. Security certifications (e.g., GCIH, GCIA, GCFA, CISSP, GMON) demonstrating advanced security operations expertise. Experience working in regulated industries or with compliance driven security operations. Bachelor's degree in cybersecurity, information technology, or related field. "
Senior Backend Engineer
Verifymy Limited
Senior Backend Engineer Location: UK (Hybrid) or Brazil (Remote) About Verifymy Verifymy is a rapidly growing Trust & Safety tech business dedicated to safeguarding children and society online. We provide frictionless, trustworthy Age Assurance and Content Moderation solutions to help platforms maintain their integrity, protect their reputation, and safeguard their customers. We have had considerable commercial success already, with marquee clients such as eBay and Google and strong recurring revenues. Following recent investment, we have some exciting product developments on the roadmap and are looking to scale rapidly through 2026. The Opportunity We are seeking an experienced Senior Backend Engineer to join our engineering team and help scale our Age Assurance and Content Moderation platform. You'll work on critical backend systems that handle sensitive identity data, build scalable verification workflows, and contribute to our mission of making digital identity verification seamless and secure. What we offer Subject to location and contract type 25 days holiday plus bank holidays Enhanced sick leave Work-from-Anywhere for up to 20 days per year Gender-Neutral enhanced parental leave Mental wellbeing support Monthly wellbeing allowance Annual learning & development allowance Cycle to work scheme Nursery scheme What We're Looking For Essential 5+ years of software engineering experience with at least 2 years in a senior role Experience with modern backend technologies (Go, Python, Java, Node.js, or similar) Experience building high-availability, high-performance systems at scale Experience with CI/CD pipelines, container orchestration, and CDN management Extensive experience designing and building RESTful APIs and microservices architectures Understanding of encryption, authentication protocols (OAuth, SAML), and secure coding practices Strong problem-solving abilities and analytical thinking Excellent communication skills and ability to work in cross-functional teams Experience mentoring engineers and leading technical initiatives Adaptability and comfort working in a fast-paced startup environment Nice to Have Experience with machine learning frameworks and computer vision technologies Experience with AI development tools including Claude Code, Cursor IDE, and Gemma models Knowledge of identity verification standards and regulations (KYC, AML, eIDAS, UK Digital Identity Standards) Background in cybersecurity or fraud prevention Experience with real-time data processing and event-driven architectures Contributions to open-source projects or technical publications What You'll Work On Technical Leadership Design and implement robust, scalable verification systems and APIs Lead architectural decisions for identity verification workflows and data processing pipelines Mentor junior engineers and contribute to technical standards and best practices Drive code reviews and ensure high-quality, secure code across the platform Platform Development Build and maintain core backend verification services, including document verification, biometric matching, and fraud detection systems Develop backend integrations with third-party identity providers, government databases, and verification services Design and implement scalable data processing pipelines and workflow engines Optimise system performance and reliability to handle high-volume verification requests Implement comprehensive monitoring, logging, and alerting systems for backend services Security & Compliance Ensure all backend systems meet stringent security requirements and compliance standards (SOC 2, GDPR, UK GDPR, etc.) Implement data encryption, secure storage, and privacy-preserving technologies in backend services Collaborate with security teams on threat modelling and vulnerability assessments Stay current with identity verification regulations and industry standards Collaboration & Innovation Work closely with product managers to translate business requirements into robust backend technical solutions Collaborate with ML/AI teams on improving verification accuracy and fraud detection through backend service integration Participate in on-call rotations and backend incident response procedures Contribute to technical roadmap planning and backend technology evaluation Our Tech Stack Languages: Go Python Node.js Infrastructure: Google Cloud Docker Kubernetes Rancher Jenkins CI/CD Edge & CDN: Cloudflare Observability: Grafana Metabase AI/ML: Anthropic Claude Google Gemma Cursor / Warp Equal opportunity declaration: Verifymy is an equal opportunity employer and is committed to providing a workplace that is free from discrimination and harassment. We celebrate diversity and are dedicated to creating an inclusive environment for all employees. Qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or any other protected characteristic under applicable law.
20/05/2026
Full time
Senior Backend Engineer Location: UK (Hybrid) or Brazil (Remote) About Verifymy Verifymy is a rapidly growing Trust & Safety tech business dedicated to safeguarding children and society online. We provide frictionless, trustworthy Age Assurance and Content Moderation solutions to help platforms maintain their integrity, protect their reputation, and safeguard their customers. We have had considerable commercial success already, with marquee clients such as eBay and Google and strong recurring revenues. Following recent investment, we have some exciting product developments on the roadmap and are looking to scale rapidly through 2026. The Opportunity We are seeking an experienced Senior Backend Engineer to join our engineering team and help scale our Age Assurance and Content Moderation platform. You'll work on critical backend systems that handle sensitive identity data, build scalable verification workflows, and contribute to our mission of making digital identity verification seamless and secure. What we offer Subject to location and contract type 25 days holiday plus bank holidays Enhanced sick leave Work-from-Anywhere for up to 20 days per year Gender-Neutral enhanced parental leave Mental wellbeing support Monthly wellbeing allowance Annual learning & development allowance Cycle to work scheme Nursery scheme What We're Looking For Essential 5+ years of software engineering experience with at least 2 years in a senior role Experience with modern backend technologies (Go, Python, Java, Node.js, or similar) Experience building high-availability, high-performance systems at scale Experience with CI/CD pipelines, container orchestration, and CDN management Extensive experience designing and building RESTful APIs and microservices architectures Understanding of encryption, authentication protocols (OAuth, SAML), and secure coding practices Strong problem-solving abilities and analytical thinking Excellent communication skills and ability to work in cross-functional teams Experience mentoring engineers and leading technical initiatives Adaptability and comfort working in a fast-paced startup environment Nice to Have Experience with machine learning frameworks and computer vision technologies Experience with AI development tools including Claude Code, Cursor IDE, and Gemma models Knowledge of identity verification standards and regulations (KYC, AML, eIDAS, UK Digital Identity Standards) Background in cybersecurity or fraud prevention Experience with real-time data processing and event-driven architectures Contributions to open-source projects or technical publications What You'll Work On Technical Leadership Design and implement robust, scalable verification systems and APIs Lead architectural decisions for identity verification workflows and data processing pipelines Mentor junior engineers and contribute to technical standards and best practices Drive code reviews and ensure high-quality, secure code across the platform Platform Development Build and maintain core backend verification services, including document verification, biometric matching, and fraud detection systems Develop backend integrations with third-party identity providers, government databases, and verification services Design and implement scalable data processing pipelines and workflow engines Optimise system performance and reliability to handle high-volume verification requests Implement comprehensive monitoring, logging, and alerting systems for backend services Security & Compliance Ensure all backend systems meet stringent security requirements and compliance standards (SOC 2, GDPR, UK GDPR, etc.) Implement data encryption, secure storage, and privacy-preserving technologies in backend services Collaborate with security teams on threat modelling and vulnerability assessments Stay current with identity verification regulations and industry standards Collaboration & Innovation Work closely with product managers to translate business requirements into robust backend technical solutions Collaborate with ML/AI teams on improving verification accuracy and fraud detection through backend service integration Participate in on-call rotations and backend incident response procedures Contribute to technical roadmap planning and backend technology evaluation Our Tech Stack Languages: Go Python Node.js Infrastructure: Google Cloud Docker Kubernetes Rancher Jenkins CI/CD Edge & CDN: Cloudflare Observability: Grafana Metabase AI/ML: Anthropic Claude Google Gemma Cursor / Warp Equal opportunity declaration: Verifymy is an equal opportunity employer and is committed to providing a workplace that is free from discrimination and harassment. We celebrate diversity and are dedicated to creating an inclusive environment for all employees. Qualified applicants will receive consideration for employment without regard to race, colour, religion, sex, gender identity or expression, sexual orientation, national origin, genetics, disability, age, or any other protected characteristic under applicable law.
VIQU IT Recruitment
Senior Cyber Security Engineer
VIQU IT Recruitment
Senior Cyber Security Engineer Glasgow or London Hybrid 12-Month Fixed-Term Contract Competitive Salary + Benefits No Sponsorship Available VIQU have partnered with an established professional services organisation undergoing a significant cloud transformation programme. They are seeking a Senior Cyber Security Engineer to join their security function on a 12-month FTC, supporting both operational security activities and key business projects. This role combines hands-on security engineering with advisory responsibilities. You'll help maintain and improve security controls across the organisation, while working with project teams to ensure security best practice is embedded into ongoing technology initiatives. Key responsibilities: Provide technical security expertise across BAU and project delivery. Support the improvement of security controls, processes and standards. Advise teams on security best practice and secure-by-design principles. Monitor, investigate and respond to security incidents and threats. Support vulnerability management and remediation activities. Contribute to governance, compliance and risk activity aligned to ISO 27001 and NIST. Requirements: Experience in Security Operations, Cyber Security Engineering or SecOps. Strong knowledge of threat detection, incident response, endpoint security and vulnerability management. Exposure to Microsoft Azure. Experience with tools such as CrowdStrike, Absolute, Sumo Logic, Rapid7 or similar. Understanding of security governance, compliance and frameworks. Strong communication skills across technical and non-technical teams. Apply now to speak with VIQU IT in confidence. Or contact Aaron Chiverton on . Know someone great? Refer them and receive up to £1,000 if successful (terms apply). For more exciting roles and opportunities, follow us on IT Recruitment.
19/05/2026
Full time
Senior Cyber Security Engineer Glasgow or London Hybrid 12-Month Fixed-Term Contract Competitive Salary + Benefits No Sponsorship Available VIQU have partnered with an established professional services organisation undergoing a significant cloud transformation programme. They are seeking a Senior Cyber Security Engineer to join their security function on a 12-month FTC, supporting both operational security activities and key business projects. This role combines hands-on security engineering with advisory responsibilities. You'll help maintain and improve security controls across the organisation, while working with project teams to ensure security best practice is embedded into ongoing technology initiatives. Key responsibilities: Provide technical security expertise across BAU and project delivery. Support the improvement of security controls, processes and standards. Advise teams on security best practice and secure-by-design principles. Monitor, investigate and respond to security incidents and threats. Support vulnerability management and remediation activities. Contribute to governance, compliance and risk activity aligned to ISO 27001 and NIST. Requirements: Experience in Security Operations, Cyber Security Engineering or SecOps. Strong knowledge of threat detection, incident response, endpoint security and vulnerability management. Exposure to Microsoft Azure. Experience with tools such as CrowdStrike, Absolute, Sumo Logic, Rapid7 or similar. Understanding of security governance, compliance and frameworks. Strong communication skills across technical and non-technical teams. Apply now to speak with VIQU IT in confidence. Or contact Aaron Chiverton on . Know someone great? Refer them and receive up to £1,000 if successful (terms apply). For more exciting roles and opportunities, follow us on IT Recruitment.

Modal Window

  • Home
  • Contact
  • About Us
  • FAQs
  • Terms & Conditions
  • Privacy
  • Employer
  • Post a Job
  • Search Resumes
  • Sign in
  • Job Seeker
  • Find Jobs
  • Create Resume
  • Sign in
  • IT blog
  • Facebook
  • Twitter
  • LinkedIn
  • Youtube
© 2008-2026 IT Job Board