Cyber Security Engineer

shefsolutionsllc
London
3 weeks ago
Applications closed

Related Jobs

View all jobs

Cyber Security Engineer

Cyber Security Engineer

Network Security Engineer

Cloud Security Engineer

Cyber Security Engineer (we have office locations in Cambridge, Leeds & London)

Cyber Security Engineer

Are you looking for a Security role within a dynamic, innovative financial technology organisation? If so, we are recruiting for a Cyber Security Engineer to join our cyber security team!

Working alongside the team you will help to design, develop, and mature the company’s cybersecurity capability, including the selection, implementation, and management of security tools/technologies, focused on detection, prevention, and analysis of security threats.

This role offers a great opportunity to help define and shape the security function within a collaborative IT department, ensuring the protection of customer assets.

Responsibilities include:

  • Work with technology and business teams to deliver security processes, technologies and controls, acting as the authority on security related queries.
  • Define, design, implement, and maintain security solutions appropriate to the business’ needs.
  • Support the definition, execution and continuous improvement of key cybersecurity processes including vulnerability & patch management, security incident response, security monitoring, endpoint security, identity and access management, network security, and cryptography.
  • Assist with developing and maintaining security policies, processes and incident response management plans and playbooks.
  • Prepare and document standard operating procedures and protocols.
  • Provide expertise on security requirements into core technology processes like asset management, change management, third-party management, technology development & acquisition, configuration management, etc.
  • Contribute as a team member in projects and change initiatives aimed at increasing enterprise security capabilities e.g., identity and access management, log aggregation, etc.

Required experience:

  • Minimum of 2 years’ experience in a Security Engineer/Analyst role focusing on designing and implementing security solutions and managing security infrastructure.
  • Previous experience working within a financial services environment and a working understanding of relevant regulations.
  • Experience and in-depth technical knowledge of deploying, maintaining, and configuring a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetration testing tools, etc.)
  • Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, DNS, HTTP, SNMP, VPN etc., and accompanying protocol/packet analysis/manipulation tools.
  • Understanding of key operating systems and network appliances and the ability to assess their security posture based on their configuration/deployment.
  • Experience of working effectively with a variety of stakeholders from different technology and business teams.
  • Strong verbal and written communication skills.
  • Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM).
  • Strong knowledge of Operating System security and system hardening concepts such as CIS Benchmarks.
  • Experience in working with information security frameworks and regulatory requirements including ISO27001, NIST, PCI DSS, GDPR, Cyber Essentials.
  • Experience of general IT Audit processes and conducting risk assessments.

You will be a proactive self-starter with strong communication skills and be comfortable interacting with stakeholders at all levels. You will have a strong technical background with previous experience of implementing security solutions. You will have the ability to tailor your approach and translate requirements to non-technical members of staff.

We offer a competitive remuneration package, including company discretionary bonus, excellent pension contributions, an attractive staff share scheme, BUPA health insurance, buying and selling of annual leave and sponsorship of relevant professional qualifications.

The role is based in our central London office, working a minimum of two days a week in the office and three days a week from home.

#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Best UK Universities for Cyber Security Degrees (2025 Guide)

Discover ten of the strongest UK universities for Cyber Security degrees in 2025. Compare entry requirements, course content, research strength and industry links to choose the right programme for you. Cyber Security has moved from IT back-room concern to critical national infrastructure. With growing threats from ransomware, state-sponsored attacks and supply-chain compromise, demand for well-trained cyber professionals has never been higher. The UK is home to a clutch of universities recognised globally for excellence in this field. Below, we profile ten institutions offering robust undergraduate or postgraduate cyber-security pathways. While league tables shift year on year, these universities have a consistent record of first-class teaching, research and industry collaboration.

How to Write a Winning Cover Letter for Cyber Security Jobs: Proven 4-Paragraph Structure

Learn how to craft the perfect cover letter for cyber security jobs with this proven 4-paragraph structure. Ideal for entry-level candidates, career switchers, and professionals looking to advance in the cyber security sector. When applying for a cyber security job, your cover letter is an essential component of your application. The cyber security industry is continuously evolving, and organisations are always seeking professionals who can protect their networks, systems, and data. Your cover letter provides an opportunity to demonstrate your technical expertise, your enthusiasm for cyber security, and your ability to contribute to the protection of sensitive information. Whether you're just entering the field, transitioning from another career, or looking to advance in cyber security, this article will guide you through a proven four-paragraph structure to create a compelling cover letter. We’ll provide sample lines and tips to help you stand out in the competitive cyber security job market.

Quantum-Enhanced AI in Cyber Security: Guarding the Digital Frontier

The cyber security landscape has evolved dramatically over the past decade. Long gone are the days when businesses primarily worried about simplistic phishing or basic website defacements. Today’s threats include nation-state attacks, sophisticated ransomware, AI-generated phishing campaigns, and a wide array of stealthy intrusion methods. Organisations must defend vast digital ecosystems that include cloud infrastructure, IoT devices, and critical operational technology—any of which can become high-value targets for malicious actors. Amid these escalating challenges, a new technological wave is emerging: quantum computing. Although still in its infancy, quantum computing promises capabilities that could surpass even the most advanced classical supercomputers for specific tasks. Simultaneously, in the world of Artificial Intelligence (AI)—where data volumes and model complexity are exploding—quantum’s parallelism could significantly boost analysis, training, and decision-making. What unfolds when quantum computing and AI converge in the realm of cyber security? On one hand, quantum technologies could introduce stronger encryption and faster threat detection. On the other, adversaries armed with quantum power might break today’s cryptographic protocols or develop more potent attacks at unimaginable speeds. This article explores the phenomenon of quantum-enhanced AI for cyber security: the possibilities it unlocks, the challenges it poses, and the reasons it could reshape both defensive and offensive operations in the digital world.