on experience in designing and implementing key management solutions for enterprises. Hands-on experience in HSM, Cryptography related fields Knowledge of Networking and Network Security concepts. Programming knowledge in C/C++ (preferred),Java,.NET Experience integrating cryptographic libraries and HSMs with applications. Understanding of InformationSecuritymore »
for the development and maintenance of PAM & EPM (Endpoint Privilege Management) policies and procedures. This role offers a unique opportunity to contribute to the security and integrity of our organization's privileged access systems. Key Requirements: Develop and maintain Privileged Access Management (PAM) and Endpoint Privilege Management (EPM) policies … and core infrastructure components such as networks and databases. Profound knowledge of Endpoint Privilege Management governance principles and best practices. Demonstrated experience in mitigating informationsecurity risks related to privilege escalation on endpoints. Familiarity with industry IT compliance standards Contract Details: Duration: 6 months Location: Midlands/Remote more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
Role: Cyber Security Engineer Business: Data Driven Organisation (Clients within Transport & Logistics) Salary: Circa £55k-£65k Location: Hybrid/flexible - ideally, 2 days per week near Solihull HQ Description: Opportunity to join a business that helps global organisation make data-driven cost savings through cutting edge data insights and … will sit in the businesses Technology team, which will be around 28 people. This role will also be the first person into a Cyber Security role, and will work very closely with the Head of IT. This role: Due to continued growth, this is a pivotal hire, and will … be our first team member solely responsible for our Cyber Security for the business. This will be a hugely varied role, and considered our Cyber Security specialist for the organisation. Reporting directly into the Head of IT, this role will be focused on ensuring we are secure by more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
Gleeson Recruitment Group
steering groups, where required. Create and maintain comprehensive project documentation, including project plans, status reports, risk registers, and lessons learned. Work with the IT Security Officer and Group Compliance Director to ensure all new software, services or processes are compliant with the InformationSecurity Framework, ISO27001 and more »
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Crimson
InformationSecurity Manager Stoke on Trent 2-3 days per week on site Salary - £55,000 - £65,000 per annum InformationSecurity Manager required to be responsible for leading InformationSecurity ensuring visibility, understanding and appropriate management of InformationSecurity risks in … order that the organisation can achieve its strategic and tactical objectives whilst maintaining the confidentiality, integrity, and availability of its information assets. You will mentor a team of three whilst managing internal and external suppliers. Key responsibilities: Drive the development of effective stakeholder relationships with peers to garner sustained … support for the InformationSecurity strategy Manage stakeholder perceptions of InformationSecurity as a valuable investment to optimise our corporate risk stance Ensure that InformationSecurity considerations are an integral part of all investment and outsourcing decisions Manage the creation and maintenance of Informationmore »
The Role As a Senior InfoSec Specialist, you'll have a role that is out of the ordinary. You will support the delivery of cyber security improvement initiatives throughout our clients group by working directly with the programme leadership team. Your knowledge of cybersecurity, informationsecurity, and … focus on continuous improvement and develops improvement solutions in response to security issues and problems. Day-to-Day, You Will: Design and deliver InfoSec improvement solutions in response to security issues and problems. Provide SME InfoSec advice and guidance to both technical and non-technical personnel. Oversee audit … programme team to develop a security culture and awareness of InformationSecurity through direct user communications. Essential Experience of the Senior Infosec Specialist An excellent understanding and experience of Security techniques and InfoSec principles. Considerable experience of delivering effective Security in a complex, regulated, and more »
sites. Key responsibilities: Delivery of day-to-day IT services and support for business systems within the business in conjunction with Support Helpdesk, Infrastructure, InfoSec and Data & Analytics teams. Troubleshoot and resolve issues in business applications liaising with business users, technology partners 3 rd party vendors. Assist with delivery of … training. Identify business process that can be improved using technology solutions. Liaise with internal committees and forums to ensure compliance with policies, processes, and security standards, including execution of audit actions. Plan and execute BCP & DR testing and advise on changes arising from learnings during the testing. Liaise with … IT security teams to assist, when requested, in user training and awareness of cyber security. Working with technology partners ensure that systems are fully integrated using event driven integrations, creating a seamless platform for business processes. Support, maintain and enhance business RPA capability. Ensure that both technical and end more »
Arcus are recruiting for an InformationSecurity Manager to be responsible for leading, implementing and managing the InformationSecurity Management System, while building a new InformationSecurity risk management process and integrate into the wider Arcus risk management model. Responsibilities As the InformationSecurity Manager, you will work with the IT teams to govern day-to-day informationsecurity compliance e.g. Malware Protection, Security Incidents, Intrusion Detection Systems, Patch management compliance etc. Other duties include; Conceptualise and implement an ISO 27001:2013 and GDPR compliant management system. Manage … the IT Security workstream of initiatives, in order to improve informationsecurity within the organisation Integrate the new ISMS into the current Arcus Integrated Management System working with the Audit & Governance team. Draft and implement InformationSecurity policies throughout the group. Collaborate with key stakeholders more »
Role: OT Security Engineer Duration: 6 Months Location: Coventry Key responsibilities: responsibility to represent the policy and views of the ICS team within the wider business acting as a consultant to product teams informationsecurity risks and proactively work to ensure that Information risks are identified … the business. within the established governance processes to ensure that new IT solutions are delivered to a high standard of security. with the wider Information Technology Management community to provide informationsecurity advice and ensure that the appropriate technologies in place to protect the information of … the business. with the business to identify and understand future Informationsecurity risks and provide appropriate input to ensure that such risks are minimised ahead if time. informationsecurity threats and vulnerabilities within projects and programmes, assess informationsecurity risks and advise the relevant more »
Location: Mansfield -2 days per week in office rest remote Pay: available on application Ensuring compliance with industry-standard security practices and regulations, while continuously evaluating and enhancing the organisation's security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what … the role will involve: Collaborating with senior management to develop and refine the organisation’s informationsecurity strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data security policies, standards, guidelines, and procedures to ensure compliance with relevant regulations (e.g. GDPR … industry standards such as Cyber Essentials+, ISO 27001 & NIST guidelines. Managing the relationship(s) with 3 rd party suppliers responsible for implementing and managing security monitoring tools and technologies, ensuring we detect and respond to security threats in a timely manner. Developing and deliver a security awareness more »
have partnered with a large retail organisation based in Northampton who are recruiting a Governance, Risk and Compliance Manager. Reporting into the Head of InformationSecurity, the Governance Risk and Compliance Manager will be responsible for the day to day management of the GRC deliverables and management of … direct reports in the GRC team to ensure effective Governance, risk and compliance aligning to the organisational informationsecurity policies. Role Responsibilities: Provide leadership and direction to the Governance Risk and Compliance team, plus day to day task management, performance management and development. Maintain and monitor the enforcement … of the InformationSecurity Policy framework,including policies, standards, procedures and guidelines. Implement, monitor, maintain and continuously improve the GTS risk management process. Deliver and maintain strategies and audit capabilities to maintain compliance to the GDPR , PCI - DSS and Cyber Essentials. Ensure the maintenance and delivery of an more »
InformationSecurity Manager Stoke on Trent 2-3 days per week on site Salary - £55,000 - £65,000 per annum InformationSecurity Manager required to be responsible for leading InformationSecurity ensuring visibility, understanding and appropriate management of InformationSecurity risks in more »
Peaple Talent have partnered with a large retail organisation based in Northampton who are recruiting an InformationSecurity Cloud Analyst. You will be responsible for maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat … intelligence and the management of security testing in order to reduce operation informationsecurity risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers … and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of InformationSecurity Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring effective communication and prioritisation of incidents between the Security Operations Center and support teams. Supporting the ISI process for more »
this role is of interest, please apply or reach out to Jacob – 07893921057/j.collen@lockemccloud.com Locke & McCloud are the UK’s leading cyber security & informationsecurity staffing company – through having a sole focus on the cyber & informationsecurity space we have been able to … foster solid relationships with some of the UK’s most exciting cyber security consultancies & end users. Our focus on the informationsecurity space allows us to be able to help you find the most exciting. more »
what they do, alongside Agile+ working policies. Your new role Reporting to the IT Compliance Manager, you will be the Subject Matter Expert for Information Security. The key objectives of the role are to manage, maintain and monitor the InformationSecurity Management System (ISMS) within the firm … s Integrated Management System (IMS). You will embed a culture of informationsecurity within the firm, with a focus on security by design alongside acting as an interface for security between the strategic and process-based activities and the work of the technology-focused experts … analysts, and administrators. You will be expected to work with the IT organisation and business management to align security priorities and plans with key business objectives. What you'll need to succeed Ideally, you will be educated to degree level or equivalent, with a minimum of 3-5 years more »
for any PAM & EPM alerts or issues which has been raised by other departments, or potentially from monitoring systems. Keep abreast of trends in informationsecurity and be able to propose proactive mitigation as appropriate Provide consultancy on PAM & EPM Best Practices to different stakeholders/teams Required … operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity Significant knowledge of Endpoint Privilege Management governance principles and best practices and experience in managing informationsecuritymore »
to us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … Vulnerability & Patch Management Engineer acts as a threat and vulnerability resource assisting with daily operations, specifically the remediation of identified vulnerabilities ensuring compliance and security goals. This role works with IMDC InformationSecurity Risk Management, business teams and infrastructure teams to track, and remediate open vulnerabilities on … position, we are seeking a candidate who can administer and maintain centralized patch and vulnerability management solutions to ensure end-points are compliant with Security guidelines. Performs endpoint management to provide patching and task automation of servers and desktops to maintain a secure and compliant environment. Maintains a secure more »
UK based digital health tech start up to achieve positive impact on patient outcomes and efficiency in hospitals? If so carry on reading.. Company Information RUMI Medtech Limited is helping NHS hospitals improve efficiencies and clinical outcomes by engineering a paradigm shift in how clinical pathways are delivered and … detail and with good communication skills to understand customer requirements and build products efficiently in line with our business objectives, our Quality Management system, InformationSecurity Management system policies and Clinical Safety Frameworks. The candidate will have plenty of opportunity for growth with the possibility of becoming a … Logging Framework, OAuth 2.0 and MFA Authentication services. Proficient in HL7 standards (e.g., HL7 v2.x, HL7 v3) and FHIR specifications. Experience working with healthcare information systems and electronic health records (EHR) platforms. Strong understanding of healthcare data formats and protocols, including XML, JSON, and RESTful APIs. Familiarity with database more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
SMT
Research & Finance) Keep up to date and compliant with all relevant legislation and Company policies and procedures, with particular attention to the requirements of InformationSecurity and Quality practices Other Responsibilities: Willingness to undertake out of office customer training, sales and conferences. Any other duties as requested from … creating tools and process to improve productivity, communication clarity, organisation, reporting and reducing risk on projects. Excellent communication skills, for both project and technical information, both with internal and external stakeholders. Demonstrable ability to organise self and project teams, managing timescales to meet tight deadlines. Self-motivated, able to more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
NQB International
Cybersecurity Sales Professional (Hunter not Farmer) Our Client: Our client is a leading provider of cyber and informationsecurity services in the UK. Founded by university academics and consultants, they boast a team of highly skilled professionals, including Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead … auditors. With expertise in system penetration, network intrusion, incident response, user awareness, and information governance, they are at the forefront of developing and delivering cutting-edge solutions, strategies, and services in the cybersecurity domain. Our client is on the lookout for experienced Sales Professionals to join their dynamic team. more »
offerings; we act as an extension of our clients' recruitment team and provide professional interim and temporary resources. We are looking for a Cyber Security Project Manager for a 12 Month contract based in Derby (1 day on site per week) on behalf of our globally respected client who … with cross-functional teams, and ensuring that all aspects of the project are completed on time and within budget. As a Project Manager (Cyber Security) you will be responsible for: Leading and reviewing the implementation of NIST 800-53 Revision 5, ensuring adherence to its guidelines and best practices. … and deadlines to ensure timely completion of tasks and overall project success. Collaborating with cross-functional teams, including IT, operations, and management, to enforce security policies and procedures. Identifying the necessary resources, both internal and external, required for successful project execution. Coordinating and monitor project activities, ensuring adherence to more »
Walsall, West Midlands, United Kingdom Hybrid / WFH Options
WHG
use it and how we protect it. We are embarking on an ambitious transformation programme focused on Data Driven Decisions which means the quality, security and management of our data is a key corporate priority. We are seeking a Data Privacy Manager to lead the way for all things … to data privacy and protection compliance, in accordance with legislation. In this pivotal role you will be the subject matter expert in data/informationsecurity across the organisation. More than 22,000 customers trust whg to protect their personal information, and youll have responsibility for maintaining more »
Warwickshire, Stratford-upon-Avon, United Kingdom Hybrid / WFH Options
Alexander Associates
opportunity Remote role with occassional travel to client sites £60,000 - £70,000 per annum DOE * Please note this role requires you to gain security clearance Job description Scope penetration tests accurately, ensuring compliance with relevant legislation and standards. Work autonomously and under direction, delivering accurate technical results in … analytical and systematic approach. Apply knowledge of configuration errors, vulnerabilities, and coding flaws to create and execute a series of tests to validate the security of a system or product. Communicate penetration test results to both technical and non-technical audiences, facilitating collaboration between stakeholders where necessary. Influence peers … customers by delivering presentations, papers, and reports. Have a good understanding of technology and actively maintain awareness of developments in the penetration testing and informationsecurity fields. Participate in technical and/or professional development activities beyond own team, sharing knowledge with colleagues to improve the securitymore »
London, Leicester Square, United Kingdom Hybrid / WFH Options
Proactive Appointments
InformationSecurity Manager - Hands-on Hybrid 3 days a week onsite We have an opportunity for a hands-on InformationSecurity manager to join on a permanent basis for our client in London. Working as part of a small team, you will be responsible for the … overall InformationSecurity governance, controls and process as well as management of third parties. Further to this, you will be required to support to the wider network & infrastructure team. Essential Skills: Experience previously as an InformationSecurity Manager/Head of InformationSecurity Proven … experience as a hands-on network/infrastructure professional. Providing hands on cover as and when required Knowledge and understanding of security protocols and processes Excellent knowledge of governance controls and processes Experience of managing third party vendors including offshore Desirable skills: CCNP certification CISM/CISSP Benefits include more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Hays
what they do, alongside Agile+ working policies. Your new role Reporting to the IT Compliance Manager, you will be the Subject Matter Expert for Information Security. The key objectives of the role are to manage, maintain and monitor the InformationSecurity Management System (ISMS) within the firm … s Integrated Management System (IMS). You will embed a culture of informationsecurity within the firm, with a focus on security by design alongside acting as an interface for security between the strategic and process-based activities and the work of the technology-focused experts … analysts, and administrators. You will be expected to work with the IT organisation and business management to align security priorities and plans with key business objectives. What you'll need to succeed Ideally, you will be educated to degree level or equivalent, with a minimum of 3-5 years more »