National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Security Engineer

Avance Consulting
London
3 months ago
Applications closed

Related Jobs

View all jobs

Security Engineer

Security Engineer - DV Cleared

Security Engineer: (Contract) £750 p/d (Investment Banking)

Security Engineer

Security Engineer (MS Defender) Contract: £650 p/d (Investment Banking)

Security Engineer (MS Defender) Contract: £650 p/d (Investment Banking)

Role description:

Cyber Security Designs, Strategies, and Security Patterns, data security and compliance by implementing GCP, Azure security best practices, managing IAM roles and permissions, GCP, Azure environments by implementing robust security controls, encryption, and access management policies

Key responsibilities:

Each team that owns a security control has been responsible for creating the format they use to guide the consumers of that control

1. Engineering Guardrails that help security control users identify the strategic solution to meet their use case and map to the appropriate engineering pattern

a. Depending on the type of security control, the security control users would know the use case they need to meet, the technology they are using, and the environment it’s needed it.

i.      For example, the use case may be something like “as a production oracle database deployed in AWS that holds PII data, I need field level encryption for defined columns”. The guardrail would map field level encryption (control required) for production oracle databases (technology/platform) in AWS (environment/datacentre) to the specific engineering pattern that tells them how to meet that use case for oracle in AWS.

2. Engineering Patterns tell the security control users how to use the required control on the technology/platform they are using and for each environment/datacentre. Many of the engineering patterns will be the same regardless of the technology/platform or environment/datacentre. But when those variables do impact HOW a user onboards a given security control, patterns specific to their overall use case is required.

Each technology that is used to meet security use cases will have engineering patterns documented. Engineering patterns will be mapped to an engineering guardrail There will be an engineering pattern for each variation that is needed to meet known use cases. For example, if different steps are required to onboard the security control on different technologies, platforms, environments, or datacentres, unique patterns will be written for each known combination resulting in needing to follow different steps.

GSRA and AccSec Teams agree on prioritised list of Technologies that need to have Engineering Patterns generated Contractor will work with relevant Product Owner and Engineering Leads to identify each unique use case that requires an engineering pattern Contractor will work with feature team’s engineers to populate the engineering pattern for each unique use case Initial engineering patterns will go through user acceptance testing to ensure the intended audience is able to use the document as expected GSRA and AccSec Teams will work with contractor to ensure proper governance is achieved for each engineering pattern

The maintenance review cycle will be initiated from the date the document completed governance assurance.

Completed engineering pattern will be added to applicable engineering guardrail and published in the Group Security Reference Architecture

Key skills/knowledge/experience:

  • Both the Engineering Guardrails and the Engineering Patterns are needed for most, if not all, CSO controlled security technologies.

  • The Accelerated Security Workstream and Group Security Reference Architecture team will work with the contractor to prioritise the order the technologies are documented Developing Engineering Guardrail Template

  • Developing Engineering Pattern Template User acceptance testing templates

  • Test and learn of templates

  • Upload finished templates to GSRA SharePoint

National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Find Hidden Cyber Security Jobs in the UK Using Professional Bodies like BCS, CIISec & More

The demand for skilled cyber security professionals in the UK has never been higher. With threats increasing in sophistication and frequency, organisations are urgently hiring ethical hackers, threat analysts, GRC specialists, and security architects. But many of the most valuable roles—particularly in government, defence, and critical infrastructure—are never publicly advertised. Instead, these jobs are shared behind the scenes through trusted networks, private communities, and professional bodies. In this article, we explore how to uncover hidden cyber security jobs in the UK using organisations like the BCS (The Chartered Institute for IT), CIISec (The Chartered Institute of Information Security), ISACA, and ISC² UK Chapter. We’ll show you how to use membership directories, special interest groups, CPD events and informal networks to gain early access to roles most people never see.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.