Cyber Security Engineer

BlueCrest Capital Management
London
1 month ago
Create job alert

Job Title: Cyber Security Engineer
Location: London
Department: Technology Infrastructure
Permanent

Department overview:
Our Technology Infrastructure team operates globally and is responsible for every aspect of the firm's platforms. This ranges from our EUC/Office environments to Trading and Core service Co-Location Data Centres, and extends to Public Cloud, delivering top-tier technology services to a dynamic and demanding Trading organisation.

In addition to meeting the round-the-clock operational demands of the platforms, we continuously evolve and transform our platforms to maintain a competitive edge that our business requires. We innovate to provide valuable solutions and leverage our skilled Technology teams to deliver against rapidly changing business requirements.

Role Overview:
The role is a unique opportunity working as a senior individual contributor within a best in class Cyber team. This role requires working with and supporting stakeholders located globally in a dynamic environment where business and priorities will react to market requirements and trading priorities. Risk assessment, operational effectiveness and a strategic mindset are key whilst maintaining a pragmatic approach to balance security and operational effectiveness.

Responsibilities:

  1. Threat Detection and Response: Manage and monitor security systems, investigate alerts, and conduct threat hunting/root cause analysis to identify and respond to threats.
  2. Security Assessments and Compliance: Perform vulnerability assessments, penetration testing, and security audits to ensure compliance and mitigate risks.
  3. Security Engineering and Architecture: Design and implement security solutions and review security architectures to improve overall security posture.
  4. Security Awareness and Training: Develop and deliver security awareness programs to promote a security-conscious culture.
  5. Incident Response: Develop and maintain incident response plans to effectively handle security incidents.
  6. Third-Party Risk Management: Assess and manage risks associated with third-party vendors to protect the organization.


Experience required:
Technical Knowledge:

  1. Endpoint: Experience with EPP, EDR/XDR solutions, and related tools (e.g., Defender, Cortex XDR).
  2. Network: Proficiency with firewalls, IDS/IPS, VPNs, web proxies, and network monitoring tools (e.g., Palo Alto NGFW, Cisco IOS).
  3. Application: Experience in integrating security practices within DevOps pipelines, including automated security testing, CI/CD security, SAST/DAST, and secure coding practices.
  4. Identity: Proficiency with identity and IAM tools and best practices, such as MFA, RBAC, and PAM, (e.g., AAD, SSO, Okta).
  5. Data: Knowledge of data protection practices, such as encryption, key management, and DLP.


Industry Knowledge:

  1. Frameworks: Ability to apply security best practices to the design and implement of secure systems following cybersecurity standards and frameworks such as NIST, CIS Controls, and MITRE ATT&CK.
  2. Automation: Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate security tasks, streamline workflows, and integrate security tools.
  3. Foundational: Expertise in fundamental network and system protocols.


BlueCrest is committed to providing an inclusive environment for its workforce. As an employer, we provide equal opportunities to all people regardless of their gender, marital or civil partnership status, race, religion or ethnicity, disability, age, sexual orientation or nationality.#J-18808-Ljbffr

Related Jobs

View all jobs

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Cyber Security Engineer

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

BAE Systems Cybersecurity Jobs in 2025: Your Complete UK Guide to Protecting Governments, Businesses and Critical Infrastructure

From securing the Royal Navy’s new Dreadnought submarines to foiling multimillion‑pound fraud rings, BAE Systems Digital Intelligence (DI)—formerly Detica—sits at the sharp end of global cyber defence. Head‑quartered in Guildford with hubs in Gloucester, Leeds and London, the 5,500‑strong DI business delivers threat‑intelligence platforms, secure‑by‑design software and 24/7 SOC services to government and commercial clients worldwide. With escalating ransomware, AI‑driven disinformation and complex supply‑chain threats, BAE plans to expand its UK cyber workforce by 20 % in 2025. Whether you’re a graduate passionate about reverse engineering, a DevSecOps engineer who loves IaC, or an incident‑response pro comfortable in high‑side environments, this guide explains how to land a BAE Systems cybersecurity job in 2025.

Cyber Security vs. Ethical Hacking vs. Security Analysis Jobs: Which Path Should You Choose?

In an era where data breaches, ransomware attacks, and sophisticated digital threats dominate headlines, the demand for skilled cyber security professionals has never been higher. From global corporations to small businesses, organisations are scrambling to protect their systems, networks, and data from malicious actors. If you’ve been exploring cyber security jobs on www.cybersecurityjobs.tech, you’ve likely encountered various specialised roles—Ethical Hacking (often termed Penetration Testing), Security Analysis, Security Architecture, Incident Response, and more. Yet many job seekers and technology enthusiasts are unsure how these fields overlap or which one is right for them. In this in-depth guide, we’ll demystify three core disciplines—Cyber Security, Ethical Hacking, and Security Analysis—outlining the skills each requires, the responsibilities you can expect, salary ranges in the UK, and typical day-to-day activities. By the end, you’ll have a clearer understanding of these roles, helping you decide which path to pursue in this fast-growing industry. And when you’re ready to take the next step, head over to www.cybersecurityjobs.tech to explore the latest openings and find your perfect match.

Cyber Security Programming Languages for Job Seekers: Which Should You Learn First to Launch Your Security Career?

Cyber security has become a top priority for companies of all sizes, public institutions, and governments. As cyber threats evolve—from sophisticated ransomware attacks to large-scale data breaches—employers are eager to recruit talent with the skills to detect, prevent, and respond to security incidents. If you’re exploring roles on www.cybersecurityjobs.tech, a key question inevitably arises: Which programming language should you learn first for a career in cybersecurity? Cyber security is a multifaceted domain encompassing network security, application security, reverse engineering, digital forensics, ethical hacking (penetration testing), and more. Each niche may have unique language preferences—like Python for scripting tasks, C/C++ for exploit development, or Rust for building secure low-level tools. In this article, we’ll: Highlight the top programming languages used across cyber security. Break down pros, cons, and key use cases for each language. Present a simple beginner’s project for hands-on learning. Share essential resources and tips, so you can stand out in the competitive cybersecurity job market.