CYBER SECURITY ANALYST jobs in LONDON, United Kingdom #4

stuck into projects involving IT architecture and Cyber Security. The main responsibility of this role is to deliver...Desktop Support Analyst Nigel Frank are partnered with an investment management firm as they are expanding...

Nigel Frank International

management, confidentiality & privacy, cyber security oversight, regulatory, independence & conflicts, and Anti-Corruption..., cyber security, secure SDLC, service management, data protection, privacy, IT risk management, maturity assessments, third...

Deloitte

delivery of the organisation's Cyber Security Strategy. Provide guidance and coaching to other members of the team. Resolving...Our client, a Government Agency, are seeking ICT Operations Analyst to ensure the organisation's virtual infrastructure...

Allen Lane

roles of interconnecting Cyber Security teams and collaboration with each of those (i.e. Forensics / Threat Intelligence... firms' infrastructure. As a SOC analyst, your role will include monitoring alerts triggered from in-house bespoke signatures...

JPMorgan Chase

of comprehensive information security reporting mechanisms for multiple channels and partners such as executive teams, operational... audiences for security awareness level and develop custom engagement strategies to facilitate effective requirements gathering...

WhiteCrow

career development plan, connections with experienced professionals within finance, cyber security and law...

BrighterBox

against cyber attacks. Leading organizations of all sizes, including more than half of the Fortune 1000, rely on Proofpoint... for people-centric security and compliance solutions mitigating their most critical risks across email, the cloud, social media...

Proofpoint

intervention Work closely with the Head of Information and Cyber Security to ensure service processes are reflected in company..., software, licences, warranties etc.) including security, inventory, compliance, usage and disposal. It also provides the ICT...

Charles Stanley

you use (For example: she/her, he/him, they/them, etc). Working within the GRC function of the Information Security department.... You co-ordinate the Information Secuirty contribution to an ERM function by managing all cyber aspects of the risk register...

Bumble

you use (For example: she/her, he/him, they/them, etc). You are the first to respond to security incidents, typically occurring in three... and business administrators to communicate information about security threats and risks, ensure that security controls...

Bumble

, military, defense, or government operations and/or bachelor's degree in security (including cyber security), Political Science.... U.S. Data Security (“USDS”) is a subsidiary of TikTok in the U.S. This new, security-first division was created to bring...

, and surveillance detection to set up high-quality and highly efficient processes to ensure internal security. Also, you will work... operational risk and maximizes security posture Identify, document, and mitigate risk and exposure to emerging threats identified...

JPMorgan Chase

an impactful role at a tech company that provide cyber security products to a range of finance, government, defence, law... Analyst with the ability to troubleshoot and resolve complex security issues You have a strong understanding of SIEM systems...

Client Server

. Already well-established within the cyber-security sector, they have experienced rapid sales in 2023, which has opened up several career... Support / Security Operations Engineer / Security Operations Analyst / Cybersecurity Engineer / Security Analyst / Network...

RedTech Recruitment

monthly Technology Risk and Cyber Security working group. Report regularly on key indicators and overall health of the IT..., and help product owners prioritise IT risk, security and data risk items. Provide consultative advice to technology...

Collinson Group

, energy, marine, financial lines, cyber, transport, political risk, crisis management, kidnap & ransom, contingency, property... working in an analysis capacity on Change projects (i.e. Operations Analyst, Claims Operations Analyst, Process Analyst...

AIG

and Requirements: Essential: 5-10 years of experience in a technical cyber role (e.g., threat and vulnerability analyst, security... targets and desired outcomes. A passion to champion a cyber security culture and continuous learning of latest cyber threat...

Tokio Marine