Security Engineer, Security Operations & Enterprise Security

Anaplan
London
7 months ago
Applications closed

Related Jobs

View all jobs

Cyber Security and Resilience Engineer

Graduate Cyber Security Engineer

Cyber Engineer

Security Engineer

IT Network Security Engineer

IT Infrastructure Engineer

Security Engineer, Security Operations & Enterprise Security

London, United Kingdom

At Anaplan, we are a team of innovators who are focused on optimizing business decision-making through our leading scenario planning and analysis platform so our customers can outpace their competition and the market.

What unites Anaplanners across teams and geographies is our collective commitment to our customers’ success and to our Winning Culture.

Our customers rank among the who’s who in the Fortune 50. Coca-Cola, LinkedIn, Adobe, LVMH and Bayer are just a few of the 2,400+ global companies that rely on our best-in-class platform.

Our Winning Culture is the engine that drives our teams of innovators. We champion diversity of thought and ideas, we behave like leaders regardless of title, we are committed to achieving ambitious goals and we have fun celebratingour wins.

Supported by operating principles of being strategy-led, values -based and disciplined in execution, you’ll be inspired, connected, developed and rewarded here. Everything that makes you unique is welcome; join us and be your best self!

Join our Security Operations & Enterprise Security team, a highly collaborative group dedicated to safeguarding the organization’s data, infrastructure, and workforce. Reporting into the security leadership team, you will operate as a generalist across enterprise security domains, working closely with IT and other stakeholders to implement robust security practices and tooling across the company.

Your Impact

  • Develop and implement security measures that protect the organization’s information assets from unauthorized access or misuse.
  • Collaborate closely with IT to harden the enterprise environment using industry best practices.
  • Evaluate, deploy, and manage security tools for monitoring, data loss prevention, infrastructure, network, and email security.
  • Monitor internal and external environments for security threats, respond to alerts, and support incident response efforts.
  • Educate employees about security awareness and advise on best practices for maintaining a secure workplace.
  • Incorporate principles of “zero trust” to create a secure enterprise environment focused on minimizing friction.
  • Stay current on evolving threats and contribute to the team’s security roadmap with strategic recommendations.
  • Participate in an on-call rotation to ensure coverage and rapid incident response outside business hours.

Your Qualifications

  • 2–5 years of experience in an Enterprise Security or Security Operations role within a modern technology environment.
  • Proven experience deploying and managing endpoint security solutions.
  • Familiarity with public cloud platforms such as AWS, Azure, or GCP.
  • Working knowledge of identity and access management protocols (SAML, OAuth, SCIM).
  • Experience with email security controls and protocols such as SPF, DKIM, and DMARC.
  • Proficiency in scripting languages (e.g., Python, Bash) for automation or analysis.
  • Understanding of current adversary tactics, techniques, and procedures (TTPs).
  • Strong communication and collaboration skills, with the ability to manage projects and prioritize risk-reduction efforts independently.

Preferred Skills

  • Familiarity with security frameworks such as MITRE ATT&CK, NIST, or ISO.
  • Security certifications (e.g., Security+, GSEC, or equivalent).

Our Commitment to Diversity, Equity, Inclusionand Belonging

Build your career in a place that thrives on diversity, equity, inclusion, and belonging. We believe in a hiring and working environment where all people are respected and valued, regardless of gender identity or expression, sexual orientation, religion, ethnicity, age, neurodiversity, disability status, citizenship, or any other aspect which makes people unique. We hire you for who you are, and we want you to bring your authentic self to work every day!

We will ensure that individuals with disabilities are provided reasonable accommodation to participate in the job application or interview process, perform essential job functions, and receive equitable benefits and all privileges of employment. Please contact us to request accommodation.

Fraud Recruitment Disclaimer

It has come to our attention that fraudulent and fictitious job opportunities are being circulated on the Internet. Prospective candidates are being contacted by certain individuals, mainly through telephone calls, emails and correspondence, claiming they are representatives of Anaplan. The main purpose of these correspondences and announcements is to obtain privileged information from individuals.

  • Extend offers to candidates without an extensive interview process with a member of our recruitment team and a hiring manager via video or in person.
  • Send job offers via email. All offers are first extended verbally by a member of our internal recruitment team whenever possible, and then followed up via written communication.

All emails from Anaplan would come from an @anaplan.com email address. Should you have any doubts about the authenticity of an email, letter or telephone communication purportedly from, for, or on behalf of Anaplan, please send an email to before taking any further action in relation to the correspondence.

Apply for this job

*

indicates a required field

First Name *

Last Name *

Preferred First Name

Email *

Phone

Resume/CV

Enter manually

Accepted file types: pdf, doc, docx, txt, rtf

Enter manually

Accepted file types: pdf, doc, docx, txt, rtf


#J-18808-Ljbffr

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.