pivotal role at the heart of our commitment to safeguarding information and maintaining trust. You’ll lead the development and delivery of our information security programme, protecting our systems, data, and digital assets from evolving threats. This is an exciting opportunity to drive key security initiatives, oversee cutting-edge technologies, and ensure compliance with leading industry frameworks within a … day operation of security systems and tools, including firewalls, intrusion detection/prevention systems (IDS/IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and dataencryption solutions. Manage vulnerability management programs, including regular scanning, penetration testing, and remediation of identified weaknesses. Lead and manage security incident response, including detection, analysis, containment, eradication, recovery … endpoint detection and response (EDR), and identity management solutions. Experience with cloud security (e.g., Azure Security). Proven experience in managing security incidents and conducting incident response. Familiarity with data privacy regulations (e.g., GDPR). Excellent analytical and problem-solving skills with a keen eye for detail. Strong communication, interpersonal, and presentation skills, with the ability to convey complex More ❯
Officer (CISO) to join our team. In this role, you will lead Remepy's global cybersecurity strategy, ensuring the integrity, confidentiality, and availability of our digital health platform, patient data, and regulated software products. You'll be responsible for aligning information security and data protection with our mission to deliver FDA-regulated digital therapeutics. This includes leading regulatory … embed security-by-design across our software lifecycle Lead enterprise risk assessments, incident response, disaster recovery, and business continuity planning Oversee security architecture across cloud infrastructure, mobile apps, and data pipelines Represent security matters to the executive team, Board of Directors, and external auditors/regulators Drive internal security awareness and training across the organization Support FDA submissions and … track record managing security and compliance under HIPAA, FDA, and NIST Knowledge of GDPR, ISO 27001, SOC 2 and international security standards Experience with cloud-native environments (e.g., AWS), dataencryption, identity management, and secure software development practices Strong communicator who can translate security priorities to technical and non-technical audiences Experience supporting FDA submissions, audits, and documentation More ❯
will be required to obtain security clearance and undergo vigorous onboarding checks - UK Only. Sponsorship NOT available.The main purpose of this job mainly focusses on information security, cybersecurity, and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application … security both development and testing phrases, terminal security, backup security, third party and supply chain security of IT service provider.Liaison with the Head Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline … of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and dataencryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information More ❯
be required to obtain security clearance and undergo vigorous onboarding checks - UK Only. Sponsorship NOT available. The main purpose of this job mainly focusses on information security, cybersecurity, and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application … security both development and testing phrases, terminal security, backup security, third party and supply chain security of IT service provider. Liaison with the Head Office, Security Operation Centre or Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international … of network infrastructure and data. - Manage risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and dataencryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information More ❯
with CI/CD , automated testing ( JUnit , Espresso ), and DevOps workflows. Familiarity with Google Play Console , crash analytics, A/B testing, and performance tuning. Knowledge of mobile security , dataencryption, and compliance with Play Store policies. Agile mindset with experience in Scrum or similar methodologies. If you would like immediate consideration, please send me an updated CV More ❯
two of the most critical pillars of our platform: our monetization engine and our Zero Trust security architecture. You will build the systems that protect our users' most sensitive data, including PII and biometric voiceprints, while navigating complex global compliance laws. You will also build the metering and entitlements engine that powers our entire freemium business model. This position … to-end metering and entitlements system that powers our freemium business model, targeting a 30% premium conversion rate. Architect and manage our core database solutions (eg, PostgreSQL for user data, Redis for high-speed caching), ensuring high availability, scalability, and security for call logs and user-profiles. Develop core, non-feature-specific Back End services such as user account … authentication and authorization services (eg, Role-Based Access Control) for all internal and external APIs, ensuring strict adherence to the Principle of Least Privilege (PoLP). Implement industry-leading data security practices for handling highly sensitive PII and biometric data (voiceprints), ensuring end-to-end encryption for all data in transit (mTLS) and at rest (AES More ❯
London, Clerkenwell, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
understanding of end-to-end system design and dependencies. Network Architecture & Design Network Implementation Passive (fibre & copper, vertical (backbone) & horizontal) infrastructure design LANs & WANs WAN circuit dependencies and provisioning DataEncryption (cryptos) End User Device (EUD), computer storage, etc dependencies upon network infrastructure. Uninterruptible Power Supplies (UPS) Understanding of system delivery lifecycle through Service Design, Service Transition, Service More ❯