Senior Security Engineer

Admiral Careers
united kingdom
4 weeks ago
Applications closed

Related Jobs

View all jobs

Senior Security Engineer

Senior Security Engineer (DevSecOps)Identity/AuthenticationFinance

Senior Security Engineer

Senior Security Engineer

Senior Security Engineer

Senior Security Engineer

The Senior Cyber Engineer will have a passion for cyber security along with a desire to relentlessly champion best practices. The role is responsible for implementing, configuring, and guiding the evolution of the security technology portfolio. The Cyber Engineering team sits within the Information Security Operations team. This is a proactive role, and the successful candidate will have strong analytical and troubleshooting skills and a desire to learn new technologies.

Main Duties

The Senior Cyber Engineer will:

  • Manage technical escalations to a successful resolution.
  • Raise awareness of security policies and develop corresponding procedures.
  • Analyse business needs, research, and recommends solutions, drive adoption of the best ones.
  • Take a threat led approach to generating mitigation and countermeasures.
  • Identify and lead maximising security value from existing investments.
  • Understand the key risks the organisation faces, the key tactics techniques and procedures that likely threat actors will exploit and create control boundaries to intersect these domains.
  • Work collaboratively with the wider Information Security team. This would include working with: The Incident Response team, assisting with incidents and enhancing Incident Response tooling; Security Architecture to ensure that any existing constraints are overcome within forward looking plans; and with the Security Risk Consultants to provide additional technical knowledge.
  • Take a leading role in post incident reviews and propose engineering resolutions to improve results in any future recurrence.
  • Champion best practice methods for web application hosting and protection, endpoint management and software defined protection.
  • Design, produce and continually improve Management reporting.
  • Monitor the capacity of security tooling & supporting infrastructure and project future capacity for security products.
  • Recognise that telemetry for security products will increasingly be curated in the cloud and be prepared to develop API endpoints and connections to collect and collate this knowledge.
  • Establish and manage relations with vendors and related equipment suppliers.
  • Participate in the Information Security On-Call rota Triage security issues and provide recommended fixes.
  • This position is an active member of the business Change Advisory Board.


Essential Experience

  • 8+ years of IT experience including at least 4 years in a cyber security role delivering security solutions.
  • Highly responsive and proven professionalism in communication, interpersonal, analytical, and organizational skills.
  • Strong technical background is required with knowledge of managing, supporting, and creating policy for at one or more of the following areas:
    • Internet Filtering
    • Email Filtering
    • Endpoint Detection and Response
    • Host Based Firewalling, HIDS/HIPS
    • Antimalware
  • The ability to pick up and learn new technology approaches and make rapid decisions on the best way to use these technology advancements for the betterment of the overall security posture.
  • Excellent communication skills as the ability to communicate effectively, constructively, confidently, and professionally is key to the success in the role as is the ability to work with IT and Information Security teams and the wider business.
  • An excellent knowledge of Information Security principles and an understanding of the Cyber Kill Chain, MITRE ATT&CK and other information security defence and intelligence frameworks.
  • Keen attention to detail and excellent analytical skills.
  • Ability to actively manage workloads to meet business and department requirements.
  • Strong process-oriented individual with experience in ITIL concepts.


Desirable Experience

  • One or more technical Information Security Certifications such as:
    • CISSP
    • CompTIA: Security+
  • Degree in an Information Security / Computing discipline.
  • Familiarity with a programming or scripting language.
  • Familiarity with regex / regular expressions.
  • Experience working within in an Agile framework Experience with at least 1 of the main cloud vendors (Amazon Web Services, Azure, Google Cloud Platform).
  • A working knowledge of financial services and the typical business processes involved together with the threat actors and their relevant tactics, techniques and procedures would be of significant advantage.


Benefits and Work-Life Balance

At Admiral, we are proud to be a diverse business where we put our people and customers first. We have great benefits to ensure employees have a great work-life balance; it's one of the reasons we're consistently voted one of the Sunday Times Best Big Companies to work for in the UK. We want you to have an element of freedom to define a working lifestyle that supports this, so accommodate flexible hours wherever possible.

All colleagues will receive 33 days holiday (including banks holidays) when they join us, and this will increase with length of service, up to a maximum of 38 days (including banks holidays). You also have the option to buy or sell up to five days of annual leave in addition to your allocation.

Admiral, Where You Can Be You

At Admiral you're accepted, supported and empowered to be you. Because you're brilliant.

We're proud of our people-centric culture which has led us to being recognised as a Great Place to Work for Women, a Great Place to Work for Wellbeing, and an overall Great Place to Work for over 25 years! We're committed to ensuring that at Admiral, progression is not slowed or haltered by barriers related to protected characteristics.#J-18808-Ljbffr

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Portfolio Projects That Get You Hired for Cyber Security Jobs (With Real GitHub Examples)

With rising cyber threats and increasingly sophisticated attacks, cyber security has become a critical priority for organisations worldwide. From penetration testers (pentesters) and SOC analysts to cloud security engineers and threat intelligence specialists, the demand for skilled cyber security professionals continues to surge. But how do you stand out in a growing field? Alongside your CV, an impressive cyber security portfolio can be the distinguishing factor that convinces employers you’re the right fit. In this comprehensive guide, you’ll discover: Why a cyber security portfolio is essential for job seekers in this domain. How to align portfolio projects with different cyber security career paths. Real GitHub examples that demonstrate best practices in security-focused projects. Actionable project ideas you can start today, from penetration testing labs to blue-team detection pipelines. Best practices for organising your repos and presenting your work so hiring managers can instantly see your impact. When you’re ready to pursue your next opportunity, remember to upload your CV on CyberSecurityJobs.tech. Our specialised platform connects talented security professionals with employers who need your expertise—exactly what your portfolio will showcase.

Cyber Security Job Interview Warm‑Up: 30 Real Coding & System‑Design Questions

The need for skilled cyber security professionals has never been greater. As organisations rapidly digitise their operations and store increasing amounts of sensitive data online, cyber threats loom large—ranging from sophisticated ransomware attacks to insider threats and state‑sponsored espionage. Against this backdrop, cyber security jobs remain some of the most in‑demand and mission‑critical roles on the market. If you’re preparing for a cyber security interview, expect to be tested on a broad spectrum of topics—from secure coding and incident response to network security architecture and compliance standards. In many cases, companies also include problem‑solving exercises and system design scenarios to gauge how well you can apply theoretical knowledge to real‑world threats. To help you ace these assessments, we’ve compiled 30 real coding & system‑design questions you might encounter. Each reflects a key area of cyber security—whether it’s encryption and key management, threat modelling, or designing a zero‑trust network. Along the way, we’ll offer insights and best practices so you can stand out from the crowd. If you’re on the lookout for exciting cyber security roles in the UK, head to www.cybersecurityjobs.tech. There, you’ll discover a range of positions—covering everything from penetration testing and threat intelligence to compliance management and security operations. Let’s dive into the essentials of interview readiness.

Negotiating Your Cybersecurity Job Offer: Equity, Bonuses & Perks Explained

How to Secure Compensation That Reflects Your Value in the UK’s High-Stakes Cybersecurity Sector Introduction As cyber threats grow more sophisticated and frequent, cybersecurity professionals have never been more in demand. From thwarting ransomware attacks to architecting secure cloud infrastructures, mid‑senior cybersecurity experts play a critical role in safeguarding a company’s data and reputation. Thanks to this growing reliance on cybersecurity, employers in the UK are going above and beyond simple salary offers to attract the top echelon of talent. Although base salary remains a key component of any job offer, the broader package—encompassing equity, bonuses, and perks—can often surpass what you’d gain from a small bump in monthly pay. For cybersecurity specialists working in areas such as threat intelligence, incident response, penetration testing, or compliance, the complexity and risk mitigation you bring to the table is massive. Knowing how to negotiate the entire package ensures you are duly rewarded for keeping an organisation’s data, assets, and operations safe. In this guide, we’ll delve into every aspect of negotiating a cybersecurity job offer. Whether you’re pivoting to a mid‑senior role or cementing your expertise at an established security consultancy, understanding the full range of compensation elements will help you secure an offer that acknowledges the criticality of what you do. Let’s explore equity options, performance bonuses, and the perks that matter most, so you can come out of your next job negotiation confident that you’re getting more than just a salary.