National AI Awards 2025Discover AI's trailblazers! Join us to celebrate innovation and nominate industry leaders.

Nominate & Attend

Senior Security Consultant (Cloud Security)

Claranet
1 year ago
Applications closed

Related Jobs

View all jobs

Senior Security Consultant - UK Wide

Senior Security Consultant, AWSI-SDT-APJ, AWSI-SDT-APJ-Japan

Senior Security Consultant

Senior Security Consultant

Senior Security Consultant

Senior Security Consultant

About The Role

Essential duties & responsibilities

Support the development and execution of an enterprise-wide Cloud security program. Define and manage security controls for a multi-cloud architecture. Configure, maintain, deploy, and craft intricate rules within the framework of Cloud security tools, exhibiting a nuanced understanding of their functionality. Design and implement 3rd party as well as cloud-native tooling, aligning them meticulously with predefined requirements to optimize security measures. Develop standard operating procedures and conduct comprehensive training sessions for each technology, ensuring a thorough understanding and adherence to best practices. Configure, maintain, deploy, and write rules in Cloud security tools. Design and implement 3rd party and cloud-native tooling to meet defined requirements. Develop standard operating procedures and training for each technology. Architect and continuously improve security technology stack, process and procedures, support model and cross-function interactions utilizing automation where possible. Collaborate with the Security Operations team to swiftly respond to cybersecurity incidents, demonstrating a united front against potential threats. Review and assess utilization of Cloud security tooling. Promote and drive adoption of Cloud security tooling across the enterprise. Partner across the Security Operations team to respond to cybersecurity incidents. Develop and report Cloud security coverage metrics and remediation plans. Define procedures to validate the effectiveness of the design, deployment, and management of security controls that aim to maintain confidentiality, integrity, and availability of Cloud networks and technology platforms. Conduct research to stay up to date with the latest advancements in generative AI, machine learning, and deep learning techniques and identify opportunities to integrate them into our products and services. Experience contributing to the system design (architecture, design patterns, reliability, and scaling) of new and current cloud-based GenAI services. Conduct thorough reviews and assessments of the utilization of Cloud security tooling, ensuring optimal performance and alignment with security objectives. Configure, maintain, deploy, and craft intricate rules within the framework of Cloud security tools, exhibiting a nuanced understanding of their functionality.

About You

Position specifications

Bachelor’s Degree or industry equivalent work experience in cybersecurity, international security architecture, and/or engineering in a converged security program 4-7 years of experience operating with at least one cloud provider, preferably GCP, Azure, or AWS Strong understanding of Cloud security industry standards and best practices (CSA CCM, CIS, NIST benchmarks, etc.) Proficient use of Linux, MacOS, and Windows Operating System tools Operating and maintaining tools across the Cloud security technology stack (CSPM, CWPP, SASE, CASB, CIEM, Cloud native features like GuardDuty, AWS Config, Amazon Inspector, etc.) Conversant with Cloud security technology stack, encompassing CSPM, CWPP, SASE, CASB, CIEM, and Cloud-native features such as GuardDuty, AWS Config, Amazon Inspector, and more. Ability to visualize and integrate cloud-specific data and alerts with other security systems. experience in a multi-cloud or hybrid cloud environment, demonstrating adaptability across diverse technological landscapes. hands-on experience in utilizing one or more programming/scripting languages, such as Python, Go, Java, Terraform, etc. Experience in a multi-cloud or hybrid-cloud environment Working knowledge of SecDevOps and proficiency in embracing Shift Left concepts to enhance security measures throughout the development lifecycle. Technical knowledge of Kubernetes and Docker technologies and associated security requirements (Kubernetes, Docker, etc.) Experience contributing to the system design (architecture, design patterns, reliability, and scaling) of new and current cloud-based GenAI services. Familiarity with source code management and proficiency in CI/CD tools, such as Github, Bitbucket, Jenkins, Artifactory, etc. Should have at least one associate-level cloud certification, such as AWS Solutions Architect GCP Associate Cloud Engineer, as a testament to specialized knowledge and expertise.
National AI Awards 2025

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How to Get a Better Cyber Security Job After a Lay-Off or Redundancy

Redundancy is never easy—especially in a fast-moving field like cyber security, where your skills and experience are constantly evolving. But if you’ve recently been made redundant from a cyber security role, know this: the UK cyber workforce remains in high demand, and your expertise is more valuable than ever. Whether you’re a SOC analyst, penetration tester, incident responder, security architect or GRC specialist, there are still thousands of opportunities across sectors including finance, defence, government, retail, and critical infrastructure. This guide will help you turn redundancy into a career relaunch, with a clear action plan tailored to the UK cyber security job market.

Cyber Security Jobs Salary Calculator 2025: Check Your Market Value in Seconds

Why yesterday’s pay survey no longer protects you. “Could I earn more at a managed SOC?” “Is that fintech’s offer really competitive?” Every UK cyber‑security professional asks some version of those questions—usually after another colleague lands a pay rise, a recruiter sends a tempting JD, or a fresh breach makes headline news. Yet salary guides published even last year feel as out‑of‑date as a forgotten antivirus signature. Since 2024, ransomware gangs switched to double‑extortion, deepfake phishing exploded, & the EU’s NIS2/DORA regulations bled into UK contracts despite Brexit. With each shift, salary bands move. To cut through stale averages, CybersecurityJobs.tech distilled a three‑factor formula that lets you estimate a realistic 2025 salary in under a minute. Feed in your role, your UK region, & your seniority level. The output arms you with data‑driven leverage for your next appraisal, job application, or freelance rate card. This article explains the formula, reveals the forces pushing cyber pay ever higher, & outlines five practical moves to boost your market value within ninety days.

How to Present Cyber Security Solutions to Non-Technical Audiences: A Public Speaking Guide for Job Seekers

Cyber security is no longer just an IT issue—it’s a board-level priority. Whether you’re applying for a role in penetration testing, security operations, risk management, or compliance, your ability to clearly explain cyber threats and solutions to non-technical stakeholders is vital. This guide will help cyber security job seekers develop one of the most in-demand soft skills in the industry: public speaking. You’ll learn how to simplify complex concepts, structure effective presentations, use storytelling and analogies, and handle common stakeholder questions with confidence.