Company: Hexaware Technologies
Location: London
Posted: April 30th, 2026
The Information Security Engineer is responsible for designing, implementing, and operating enterprise security controls across endpoints, networks, cloud platforms, identities, data, and applications.
The role ensures protection against cyber threats, proactive vulnerability management, and compliance with regulatory and internal security standards, while supporting business operations and transformation initiatives.
Design, deploy, and manage endpoint security solutions (AV, EDR, XDR).
Ensure protection across desktops, laptops, servers, and mobile devices.
Manage endpoint hardening, patching, and threat response.
Support incident investigation and remediation related to endpoint threats.
Implement and manage network security controls, including:
Monitor network traffic for threats and anomalies.
Support network segmentation and zero-trust security initiatives.
Native security services
Cloud security posture management (CSPM)
Implement identity, network, data, and workload protections in cloud.
Support cloud security architecture reviews and threat modeling.
Ensure compliance with cloud security best practices.
Manage email security platforms to protect against:
Implement DMARC, DKIM, SPF, and email threat protection controls.
Investigate and respond to email-based security incidents.
Implement and manage IAM solutions, including:
Enforce MFA, conditional access, and least-privilege principles.
Support audits and access reviews.
Design and enforce DLP policies for:
Identify, classify, and protect sensitive data.
Investigate DLP incidents and support data protection initiatives.
Perform vulnerability scanning using enterprise tools.
Analyze findings, prioritize risks, and coordinate remediation.
Track vulnerability remediation metrics and SLA compliance.
Support penetration testing and remediation planning.
Support SOC activities including alert triage and investigation.
Participate in incident response, root cause analysis, and lessons learned.
Improve detection and response capabilities.
Support security compliance initiatives such as:
Provide evidence, documentation, and remediation support for audits.
Ensure adherence to internal security policies and standards.
Core Technical Skills
Endpoint Security (EDR/XDR platforms)
Network Security (Firewalls, IDS/IPS, VPN)
Cloud Security (Azure / AWS / GCP)
Email Security platforms
Identity & Access Management (IAM, PAM)
Vulnerability Management tools and processes
SIEM / Security monitoring tools
Tools & Technologies (Examples)
Soft Skills
Preferred Certifications