medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure … we embrace difference. In this role youll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security architectures and solutions that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their … inhouse Information and Cyber Security resources combining expertise in informationsecurity, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk more »
Job Title: Cyber Security Consultant Cyber Risk Reporting to: Principal consultant Location: Remote with travel to Customer site as required Role Requirements: Must hold or be eligible to hold government security vetting at SC level Must be currently resident in the UK Reward Package: - 25 days annual holiday … Cover - Life Assurance - Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Cyber Security Risk Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in … we embrace difference. In this role youll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security risk assessment and best practice solutions that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services more »
Know-How : Stay ahead of the curve with the latest inDesktop,Server,Network, andSecuritytechnologies. NOC/SOC Mastery: Youre well-versed in network and security operations. Think monitoring, infrastructure management, and ITIL processes (Change, Release, Problem). Data Connectivity: Your knowledge extends to data connectivity technologies. You understand the … on time, every time. Technology and Vendors: Desktop Microsoft, Dell, IBM, HPE Server Microsoft, Dell, IBM, HPE, VMWare, Veeam LAN Cisco, Juniper and Aruba Security - Check Point, Fortinet and Juniper Wireless Juniper and Aruba Data Connectivity: MPLS SD-WAN Technologies Leased Lines (FTTP, FTTC, P2P, ADSL etc) Wireless Connectivity … As a specialist in secure technology solutions, all successful candidates will be subject to preemployment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications.?We are committed to using any personal information you may give us in a secure and more »
As a specialist in secure technology solutions, all successful candidates will be subject to preemployment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications.?We are committed to using any personal information you may give us in a secure and … proper manner, for more information please see our privacy policy on our website. more »
sites. Key responsibilities: Delivery of day-to-day IT services and support for business systems within the business in conjunction with Support Helpdesk, Infrastructure, InfoSec and Data & Analytics teams. Troubleshoot and resolve issues in business applications liaising with business users, technology partners 3 rd party vendors. Assist with delivery of … training. Identify business process that can be improved using technology solutions. Liaise with internal committees and forums to ensure compliance with policies, processes, and security standards, including execution of audit actions. Plan and execute BCP & DR testing and advise on changes arising from learnings during the testing. Liaise with … IT security teams to assist, when requested, in user training and awareness of cyber security. Working with technology partners ensure that systems are fully integrated using event driven integrations, creating a seamless platform for business processes. Support, maintain and enhance business RPA capability. Ensure that both technical and end more »
is key to helping embed these good behaviours and monitoring these. About You We are looking for someone who has a strong baseline of InformationSecurity knowledge across the breadth of the space, along with direct experience of delivering security culture change and delivering a dramatic shift … away from compliance driven behaviours towards a more rounded embedded approach to people cyber risk management. You need to be able to deliver security cultural change within an organisation and work independently and act as a subject matter expert on security and security culture issues. Requirements To … be successful in this role you need to have: Experience of what good looks like in terms of security culture for a financial institution. Strong baseline knowledge across the breadth of the security space (around Security+ level) and are passionate about keeping your security knowledge current – securitymore »
Birmingham, England, United Kingdom Hybrid / WFH Options
Hamilton Barnes 🌳
Job Title: Graduate InformationSecurity Consultant Role Overview: Are you a recent graduate in Cyber Security with a passion for Governance, Risk, and Compliance (GRC)? Join our esteemed IT Managed Services Provider in Birmingham as a Graduate InformationSecurity Consultant! We're on the lookout … to become a part of our hybrid working team. With a stellar reputation for delivering top-tier Hybrid Multi-Cloud, Data Protection, and Cyber Security solutions, we partner with some of the most innovative businesses, especially within the regulated insurance and banking sectors. What You'll Do: Assess and … and maintain compliance with industry standards. Reporting: Prepare and present detailed reports and recommendations. Policy Development: Work with our team to develop and implement security policies and procedures. Client Engagement: Understand client security needs and provide tailored solutions. What We're Looking For: Education: A degree in Cyber more »
for any PAM & EPM alerts or issues which has been raised by other departments, or potentially from monitoring systems. Keep abreast of trends in informationsecurity and be able to propose proactive mitigation as appropriate Provide consultancy on PAM & EPM Best Practices to different stakeholders/teams Required … operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity Significant knowledge of Endpoint Privilege Management governance principles and best practices and experience in managing informationsecuritymore »
DV CLEARANCE Duration: 6 Months Rates : Market Rate MUST BE PAYE THROUGH UMBRELLA Role Description: Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC’s technology stack (hardware and software). The engineer will … big data technologies and ecosystems (e.g., NiFi). • Knowledge of current market and emerging leaders in data analytical and SIEM platforms. • Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. • Knowledge of intrusion detection systems and signature development. • Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. • Knowledge of cyber defence and informationsecurity policies, procedures and regulations. • Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: • Previous experience more »
IT Governance & Assurance Lead - Information & Data Management Hybrid Birmingham - Occasional Travel to London 6 month contract Inside of IR35 My client is looking for a Governance & Assurance Lead with strong Data Management in Construction Projects. This is a Governance and Assurance role, not a hands on data and information … Data Accountability's Define, implement, and monitor a governance framework to guide the use of data across the client. Develop the client’s IT information governance & assurance approach, focusing on treating data as an asset and maintaining wider organisational compliance. Assure continuation of standard approach for the technical assessment … of the client information systems against information assurance polices and business objectives. Develop information assurance policy, standards and guidelines. Provide advice and guidance to ensure adoption of and adherence to information assurance architectures, strategies, policies, standards and guidelines Contribute to the development of organisational strategies that more »
Walsall, England, United Kingdom Hybrid / WFH Options
James Stevens Associates
use it and how we protect it. We are embarking on an ambitious transformation programme focused on Data Driven Decisions which means the quality, security and management of our data is a key corporate priority. The organisation a Data Privacy Manager to lead the way for all things relating … to data privacy and protection compliance, in accordance with legislation. In this pivotal role you will be the subject matter expert in data/informationsecurity across the organisation. More than 20,000 customers trust the organisation to protect their personal information, and you’ll have responsibility more »
OASIS Group is the largest privately-owned information management provider in Europe, securing and managing over 115 million barcoded items, 200TB of digital data, and scanning more than 17 million images per month. Since forming in 1999 we have grown steadily, and we now employ over 1,700 Team … more than 11,500 clients through our network of over 70 secure, monitored and compliant record centres. As our clients’ single source partner for information management, we offer solutions that cover the full record lifecycle, including file storage; secure online access; data protection; business continuity; and secure destruction. The … through the development of KPI’s, dashboards and other reporting tools. Other: Any other additional duties as deemed necessary to support the business. Ensure informationsecurity and compliance. Candidate Requirements Educated to degree level with sufficient business experience to understand the business cases that underpin our projects. Proven more »
Birmingham, England, United Kingdom Hybrid / WFH Options
James Andrews Technology
line with the relevant Digital Strategy and Technology Roadmaps, the Solution Architect will be responsible for supporting the successful implementation of the new research information eco-system. The work will include designing, advising on and implementing an architecture that meets ITS governance standards, business requirements and fits within the … in the selection and delivery of the digital learning environments Key Skills and Experience: Educated to degree level or equivalent qualification in Computer Science, Information Systems, or equivalent relevant education/experience plus substantial work experience in a relevant technical/scientific and/or management/supervisory role … A broad technical background in IT, covering operating systems, databases, integrations, cloud-based Software/Platform/Infrastructure-as-a-Service, business continuity and information security. An understanding of the application and software development life cycle. An understanding of release and change management. An understanding of Agile and Product more »
The Role As a Senior InfoSec Specialist, you'll have a role that is out of the ordinary. You will support the delivery of cyber security improvement initiatives throughout our clients group by working directly with the programme leadership team. Your knowledge of cybersecurity, informationsecurity, and … focus on continuous improvement and develops improvement solutions in response to security issues and problems. Day-to-Day, You Will: Design and deliver InfoSec improvement solutions in response to security issues and problems. Provide SME InfoSec advice and guidance to both technical and non-technical personnel. Oversee audit … programme team to develop a security culture and awareness of InformationSecurity through direct user communications. Essential Experience of the Senior Infosec Specialist An excellent understanding and experience of Security techniques and InfoSec principles. Considerable experience of delivering effective Security in a complex, regulated, and more »
As a specialist in secure technology solutions, all successful candidates will be subject to preemployment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications.?We are committed to using any personal information you may give us in a secure and … proper manner, for more information please see our privacy policy on our website. more »
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
Senior Analyst – Information & Cyber Security - IAM Coventry: Hybrid working pattern The Client: A leading building society is looking for an InformationSecurity & IAM Consultant! Salary – Up to £62,000 + Up to 20% Discretionary Bonus + Additional Corporate Benefits Package Role: A dynamic A Senior IAM … Analyst- IAM drives through security good practices as we expand our use of cloud technologies and take on digital transformation initiatives. The role will influence security practices, moulding the future of the building society for years to come. The consultant will act as a guardian of our technological … transformation, ensuring robust security measures in line with regulatory frameworks such as GDPR, FCA, and PRA. Essential skills: Familiarity with PCI-DSS, UK Financial Services regulatory requirements and ISO27001/2 or NIST Cyber security experience with IAM/PAM tools such as SailPoint, Okta, CyberArk, BeyondTrust or more »
Arcus are recruiting for an InformationSecurity Manager to be responsible for leading, implementing and managing the InformationSecurity Management System, while building a new InformationSecurity risk management process and integrate into the wider Arcus risk management model. Responsibilities As the InformationSecurity Manager, you will work with the IT teams to govern day-to-day informationsecurity compliance e.g. Malware Protection, Security Incidents, Intrusion Detection Systems, Patch management compliance etc. Other duties include; Conceptualise and implement an ISO 27001:2013 and GDPR compliant management system. Manage … the IT Security workstream of initiatives, in order to improve informationsecurity within the organisation Integrate the new ISMS into the current Arcus Integrated Management System working with the Audit & Governance team. Draft and implement InformationSecurity policies throughout the group. Collaborate with key stakeholders more »
Role: OT Security Engineer Duration: 6 Months Location: Coventry Key responsibilities: responsibility to represent the policy and views of the ICS team within the wider business acting as a consultant to product teams informationsecurity risks and proactively work to ensure that Information risks are identified … the business. within the established governance processes to ensure that new IT solutions are delivered to a high standard of security. with the wider Information Technology Management community to provide informationsecurity advice and ensure that the appropriate technologies in place to protect the information of … the business. with the business to identify and understand future Informationsecurity risks and provide appropriate input to ensure that such risks are minimised ahead if time. informationsecurity threats and vulnerabilities within projects and programmes, assess informationsecurity risks and advise the relevant more »
for any PAM & EPM alerts or issues which has been raised by other departments, or potentially from monitoring systems. Keep abreast of trends in informationsecurity and be able to propose proactive mitigation as appropriate Provide consultancy on PAM & EPM Best Practices to different stakeholders/teams Required … operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity Significant knowledge of Endpoint Privilege Management governance principles and best practices and experience in managing informationsecuritymore »
UK based digital health tech start up to achieve positive impact on patient outcomes and efficiency in hospitals? If so carry on reading.. Company Information RUMI Medtech Limited is helping NHS hospitals improve efficiencies and clinical outcomes by engineering a paradigm shift in how clinical pathways are delivered and … detail and with good communication skills to understand customer requirements and build products efficiently in line with our business objectives, our Quality Management system, InformationSecurity Management system policies and Clinical Safety Frameworks. The candidate will have plenty of opportunity for growth with the possibility of becoming a … Logging Framework, OAuth 2.0 and MFA Authentication services. Proficient in HL7 standards (e.g., HL7 v2.x, HL7 v3) and FHIR specifications. Experience working with healthcare information systems and electronic health records (EHR) platforms. Strong understanding of healthcare data formats and protocols, including XML, JSON, and RESTful APIs. Familiarity with database more »
Royal Leamington Spa, England, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Identity and Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity. Knowledge of SAML/OAUTH protocols. Experience of working and influencing cross-functionally and managing external agencies. Good more »
Are you an experienced Enterprise & Security Sales Specialist looking for your next move? Intercity are seeking a highly motivated and results-oriented Enterprise Cyber Security Sales Specialist to join our dynamic Sales team. As an Enterprise Cyber Security Sales Specialist, you will be responsible for driving the … sales of Intercitys Cyber Security services and solutions to SME & Enterprise businesses. Your primary goal will be to promote and sell our company's products and services, enabling organisations to enhance their security posture and decrease risk. This role requires a deep understanding of how Cyber Security … and the benefits they can bring, excellent communication skills, and a passion for helping clients optimise their infrastructure and services. As an Enterprise Cyber Security Sales Specialist, you will be responsible for: Drive the sales process from prospecting to deal closure by identifying business opportunities, engaging with potential customers more »
City Of Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
Who we are looking for An InformationSecurity Specialist who will focus on the technical side of IT Security, specifically looking at application security and code analysis to ensure applications are built securely. The InformationSecurity team deal with the security of closed … sourced, open-source and in-house written applications. The objective is to ensure that systems and services are built with privacy and security by design. You will be working closely with the Software Development team, to confirm that application based vulnerabilities are understood and mitigated. This is done from … a security assessment point of view rather than code QA, therefore code reading skills are desirable. The team comprises of a variety of individuals, ranging from graduates to time served engineers with backgrounds as sys-admin, networks, service operation as well as security. We use first-class, enterprise-level more »
City Of Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
Who we are looking for A Senior InformationSecurity Specialist to focus on the technical side of IT Security, specifically looking at application security and code analysis to ensure applications are built securely. The InformationSecurity team deal with the security of closed … sourced, open source and in house written applications. The objective is to ensure that systems and services are built with privacy and security by design. You will work closely with the Software Development team to confirm that application based vulnerabilities are understood and mitigated. This is done from a … security assessment point of view rather than code QA, therefore code reading skills are desirable. The team comprises of graduates to time served engineers with backgrounds as sys-admin, networks, service operation as well as security. We use first-class, enterprise-level tools to identify threats to the systems more »
Information Assurance Officer – 12 Month FTC - Birmingham - £60k - Legal ISO27001 | Cyber Essentials | Compliance | Risk Assessments | Documentation | Policies Salary: £60,000 Location: Birmingham Are you an Information Assurance professional, looking for a new challenge in your career? Do you have demonstrable experience of working with InformationSecurity Management Systems and Security Programmes? Have you previously worked in line with ISO27001:2022 standards? Interested in working for an innovative and award-winning company who support the development of your career? If so, I have a fantastic opportunity for you! I’m looking to speak with individuals … who are comfortable producing and developing policies and documents to enforce security requirements. You will have the ability to facilitate the requirements for external audits. You must be comfortable liaising with both internal and external stakeholders and capable of driving compliance capabilities. Key Responsibilities Assist with the design, development more »