National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Security Engineer

Maples Group
Leeds
1 week ago
Create job alert

Join to apply for the

Security Engineer

role at

Maples Group .
The Maples Group is a leader in financial and legal services, trusted by major hedge fund managers, private equity firms, and international corporations.
Our success stems from our talented team of over 2,500 professionals known for their tenacity, ethics, and excellence. Operating across key financial centers worldwide, we offer opportunities for career growth and cross-cultural experience. Our integrated financial and legal services foster interdisciplinary learning and development.
The Maples Group is looking to hire a Leeds-based Security Engineer. We are committed to diversity, inclusion, and equal opportunity in attracting, retaining, and developing top talent.
Who We Seek
We value merit and a culture that supports ambitious professionals seeking long-term careers. Ideal team members are collaborative, conscientious, driven, and purposeful in their work.
About the Role
This position involves deploying, maintaining, supporting, and enhancing our Information Security tools and processes. Key responsibilities include:
Implementing and maintaining network, intrusion detection, and prevention systems in hybrid environments (on-premises and cloud).
Staying updated on cybersecurity threats to advise on system protections.
Monitoring threat intelligence feeds and translating them into detection and response actions.
Analyzing security logs to identify attacker tactics, techniques, and procedures (TTPs), investigating suspicious activities, and performing remediation.
Developing and validating security capabilities to identify vulnerabilities and improve detection and response measures.
Supporting active response efforts as a technical resource for the security team.
Tracking and resolving security issues from identification to resolution.
Supporting IAM technologies by monitoring and enhancing identity, access, and data protection activities.
Managing user roles, permissions, and authentication mechanisms (e.g., PAM, SSO, MFA, OAuth).
Designing and enforcing policies on least privilege access, identity governance, and access reviews.
Overseeing identity lifecycle management, including provisioning, de-provisioning, and access modifications.
Monitoring cloud security events, logs, and alerts to detect and respond to threats.
Creating and maintaining automated security playbooks for incident response.
Identifying and remediating vulnerabilities in cloud environments.
Collaborating with cross-functional teams to ensure secure cloud architecture and practices.
Implementing data security policies such as DLP, privileged access management, and insider risk management.
Designing and managing automation to improve security workflows.
Supporting audits, penetration tests, and vulnerability assessments.
Developing and analyzing KPIs, KRIs, and other metrics to inform security decisions and reporting.
Ensuring the safety of company information and IT equipment through appropriate security measures.
Experience & Qualifications
The ideal candidate will demonstrate high ethical standards, autonomy, and possess:
A bachelor’s degree in computer science, information systems, cybersecurity, or related fields.
Security certifications such as GCIA, GCFA, GCFE, CISSP (Associate), CEH, or equivalents.
Experience in areas like IAM, security operations, threat hunting, EDR, detection signatures, and analytics.
Knowledge of open standards such as SAML, OAuth, or OpenID.
Experience with encryption, logging, log analysis, and analytics.
Practical experience with network security architecture and cloud technologies.
Experience with IAM tools like AD, Azure AD, access policies, and privileged access management.
Skills in SIEM content development, security monitoring, incident detection, and response.
Threat hunting and IR experience in Windows/Linux and cloud/hybrid environments.
Proficiency with SIEM, log management, scripting languages (Python, PowerShell, etc.), and automation tools.
Ability to make architectural decisions, troubleshoot, and improve systems and processes.
Benefits & Rewards
We prioritize employee health and wellbeing, offering benefits such as:
Comprehensive health coverage (medical, dental, optical)
Vacation packages
Educational and professional development support
Savings or pension plans
Life and travel insurance
Global mental wellness programs
Sports clubs and social events
About Maples Group
With over 50 years of growth, the Maples Group is a leading provider of fiduciary, fund administration, legal, and compliance services across multiple jurisdictions including the British Virgin Islands, Cayman Islands, Ireland, Jersey, and Luxembourg.
Learn more on our

corporate website , explore our

Careers Page , or visit us on

LinkedIn .
We conduct background checks, including criminal record checks, on all applicants receiving a conditional offer. Disclosure of criminal history is voluntary and will be considered on a case-by-case basis.
All personal data collected during the application process is used solely for recruitment purposes, as detailed in our

privacy notice

at maples.com/privacy.
Additional Information

Seniority level:

Not Applicable
Employment type:

Full-time
Job function:

Information Technology
Industries:

Legal Services

#J-18808-Ljbffr

Related Jobs

View all jobs

Security Engineer

Security Engineer

Security Engineer

Security Engineer

Security Engineer - Ccure, Lenel

Security Engineer

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.

Cyber Security Jobs Employer Hotlist 2025: 50 UK Companies Actively Hiring Right Now

Bookmark this guide—refreshed every quarter—so you always know who’s really expanding their cyber security teams. Ransomware payouts broke records in 2024, the UK’s new Cyber Security Bill imposed mandatory breach disclosure, and the National Cyber Force’s move to Samlesbury has super‑charged the northern skills market. Result? Demand for security architects, SOC analysts, penetration testers, cloud‑security engineers, threat hunters & GRC specialists is at an all‑time high in 2025. Below you’ll find 50 organisations that have posted UK‑based cyber security vacancies or announced head‑count growth during the past eight weeks. They’re organised into five quick‑scan categories. For every employer you’ll see: Main UK hub Example live or recent vacancy Why it’s worth a look (tech stack, culture, mission) Search any company on CyberSecurityJobs.tech to view current ads, or set a free alert so fresh openings land straight in your inbox.

Return-to-Work Pathways: Relaunch Your Cyber Security Career with Returnships, Flexible & Hybrid Roles

Re-entering the workforce after a career break can feel especially challenging in a fast-moving field like cyber security. Whether you stepped away for parenting, caregiving or another life chapter, the UK’s cyber security sector now offers a range of return-to-work pathways—from structured returnships to flexible and hybrid roles. These programmes value the transferable skills and resilience you’ve developed during your break, pairing you with mentorship, upskilling opportunities and supportive networks to ease your transition back into cyber security. In this article, tailored for parents and carers, you’ll discover how to: Understand the growing demand for cyber security talent in the UK Translate your organisational, communication and problem-solving skills into cyber security roles Tackle common re-entry challenges with practical solutions Refresh your technical knowledge through targeted learning Access returnship and re-entry programmes specific to cyber security Find roles that accommodate family commitments—whether hybrid, flexible or full-time Balance your career relaunch with caring responsibilities Master applications, interviews and networking in cyber security Draw inspiration from real returner success stories Whether you aim to return as an analyst, penetration tester, security engineer or compliance specialist, this guide will equip you with the steps and resources to reignite your cyber security career.