National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Cybersecurity Engineer

KLA
Newport
3 weeks ago
Create job alert

Description

/Preferred Qualifications

We are seeking a Cybersecurity Engineer with shown experience to join our team. This role focuses on representing the cybersecurity body within the organisation and supporting IT and cybersecurity teams in implementing and defining policies to meet organizational standards and harden systems to reduce the attack surface. The ideal candidate will be responsible for maintaining and improving existing cybersecurity systems, ensuring compliance with standards and regulations, and providing hands-on technical expertise.

Your day to day responsibilities will include:

Represent the cybersecurity organization within the KLA corporate. Support IT and cyber teams in implementing and defining policies to meet organizational standards. Harden systems to reduce the attack surface. Support IT teams in adapting sophisticated IAM solutions and Active Directory and Azure Active Directory (ENTRA ID) systems. Develop and implement policies and procedures for identity and access management. Conduct assessments and provide solutions to improve information security gaps. Collaborate closely with IT and cybersecurity teams to ensure compliance. Provide technical training and support to internal teams. Leading identity lifecycle and access management (IDM) and Identity Governance and Administration (IGA) policies working with IT teams Maintain existing systems and ensure their accurate functioning. Review the configuration of different systems to evaluate security controls. Handle daily requests through the corporate IT ticketing system. Conduct vulnerability assessments and security evaluations of complex systems. Develop and maintain comprehensive security testing plans. Automate security testing processes for networks, systems, and applications where possible. Consult with platform managers and systems administrators on security review results and remediation strategies, producing actionable, threat-based reports Install, operate, and maintain various cybersecurity products. Implement routine security reviewing processes.

KLA is proud to be an equal opportunity employer!

For this role we are looking for someone with:

Familiarity with SCIM, CASB, and additional Azure services with demonstrated ability in identity and access management within IT or a similar role in cybersecurity. Practical experience with Active Directory and Azure Active Directory (ENTRA ID). Understanding of security protocols and compliance standards. Ability to analyze complex problems and provide creative solutions. Good interpersonal skills and ability to work in a team. Bachelor's degree in a relevant technological field would be an advantage. Relevant certifications in IT or cybersecurity, such as CISSP, CISM. Experience with IAM tools like Okta, SailPoint, or Ping Identity - an advantage. Understanding of MSA, GMSA, and equivalent technologies. Knowledge of PAM (Privileged Access Management) and Vault solutions. Enjoying working in a dynamic and exciting environment. Hands-on experience working with operating systems. Knowledge of security testing frameworks, such as OWASP. Proficient knowledge of Unix/Linux systems and Mac OS. Knowledge of at least one scripting language (Python, PowerShell, etc.). Experience with Windows client/server environments, VMware/Citrix, and cloud environments and technologies (e.g., AWS, Azure). Certifications such as CCNA, NCSA, Linux Essentials, CompTIA-Security+, (ISC)2-SSCP.

What we will offer you!

Our benefits package includes:

Annual leave starting at 25 days (plus bank holidays), contributory pension scheme, cash health plan, cycle to work scheme, global bonus plan, share scheme, rewards scheme, life assurance, and overtime premiums.

Minimum Qualifications

Be aware of potentially fraudulent job postings or suspicious recruiting activity by persons that are currently posing as KLA employees. KLA never asks for any financial compensation to be considered for an interview, to become an employee, or for equipment. Further, KLA does not work with any recruiters or third parties who charge such fees either directly or on behalf of KLA. Please ensure that you have searched for legitimate job postings. KLA follows a recruiting process that involves multiple interviews in person or on video conferencing with our hiring managers. If you are concerned that a communication, an interview, an offer of employment, or that an employee is not legitimate, please send an email to to confirm the person you are communicating with is an employee. We take your privacy very seriously and confidentially handle your information.

Related Jobs

View all jobs

Cybersecurity Engineer - Threat Modelling

Cybersecurity Engineer - SOAR

Cybersecurity Engineering - Threat Modelling

CyberSecurity Operations Engineer

Cybersecurity Solutions Engineer

Cybersecurity (Infrastructure) Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.