Head of CyberSecurity - Hybrid - Cardiff - London - Leadership Yolk Recruitment are seeking a Head of CyberSecurity for a dynamic specialist mortgage lender backed by a global financial institution, where our mantra is simple: "Help People Succeed." We're seeking a Head of CyberSecurity … people - the driving force behind our success. As part of our team, you'll play a pivotal role in safeguarding our technology estate, ensuring cybersecurity is embedded in every facet of our operations. Why join? People-Centric Culture: Our people are our greatest asset. We're committed … By protecting our technology infrastructure, you'll directly contribute to our mission of empowering customers, brokers, and colleagues alike. Responsibilities: As the Head of CyberSecurity, you'll lead a talented team and spearhead the operational implementation of technical controls to fortify our technology ecosystem. Your duties will more »
Greater Cardiff Area, United Kingdom Hybrid / WFH Options
Hays
Head of CyberSecurity Permanent: £80,000 - £90,000 Location: Hybrid – Cardiff is the preferred option – London office also Your new company: An award-winning financial organisation is currently looking for a Head of CyberSecurity to help shape, direct, and lead their existing CyberSecurity Team and processes. The organisation is part of a Financial Group who has a strong global presence. The role responsibilities: The role will be supported by 2 direct reports and will be responsible for the overall cyber controls, ensuring that cybersecurity is at … the heart of all technology implementation moving forward. To lead and manage the CyberSecurity team and projects moving forward. To inform and advise the Group in respect of information and cybersecurity risks and issues. Responsible for defining, developing, and managing the Group’s information more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
week in office) Salary - Up to £67,000 Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating … vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about critical threats by continually analysing cyber threat intelligence from various sources. Proactively monitor vulnerability intelligence sources to swiftly address any potential exposures. Conduct on-demand vulnerability assessments for key personnel …/systems as needed. Deliver informative cyber threat intelligence briefings to senior stakeholders. Collaborate with security engineering to define requirements for vulnerability management and threat intelligence Experience: Hands-on experience with vulnerability scanning tools like Tenable or Qualys Collaboration with IT and network teams Previous roles in threat more »
IT service management frameworks and the ability to apply them effectively in a complex, outsourced environment. ▪ Proficiency in managing outsourced delivery of cloud technologies, cybersecurity practices, and infrastructure management, with a strong grasp of the organisations technology stack including Azure and M365. ▪ Demonstrated expertise in managing outsourced delivery models, with more »
team work ethic- (internal, external and virtual teams Benefits Who are we? ARO has 25 years’ experience in Collaboration, Connectivity, Cloud and Infrastructure and CyberSecurity services both in the UK and Internationally and has a nationwide presence with offices across the UK. As one of the UK more »
governance and data protection, including but not limited to: The Data Protection Act 1998, The UK and EU General Data Protection Regulation, ISO27001 Information Security Standard, PCI-DSS Card Payment regulation, The Freedom of Information Act 2000, Environmental Information Regulations 2004, The Common Law Duty of Confidence, The Computer … The DPO’s role in incident management Have sufficient understanding of the processing operations carried out, as well as the information systems and data security and data protection needs of the organisation. Monitor the effectiveness of policies and procedures and the organisations’ compliance with them through a proactive program … across the operating model and other stakeholders and bodies. Have senior responsibility for the development of a robust Information Risk Assurance function which includes CyberSecurity, System Failure and GDPR. Provide a single point of knowledge to senior management and staff with clear policies and procedures that ensure more »
reports and dashboards across the organisations key operational areas: • Financial reporting • Risk and Compliance reporting • Operational reporting • Banking Platform reporting • IT Service, resilience, and cyber reporting Responsibilities Data Management: Design, construct, install, test, and maintain highly scalable data management systems. Data Analytics: Develop analytics tools that utilise the data … organisation to enable the effective use of the Microsoft Power Platform to automate manual steps and drive operational efficiencies and continuous improvement. Compliance and Security: Adhere to the data privacy policies and comply with data protection regulations to ensure that the data used in reports is handled securely. Assess more »
critical position. The successful candidate will lead efforts to provide secure network services, ensuring seamless operations and growth. Responsibilities include staying updated on network security trends, leading technical direction, and implementing new solutions. As Network Manager, they will shape the future of IT services, creating a robust and secure … technical architecture. Network Protocols: Significant knowledge of routing (OSPF and BGP), network management (SNMP), and traffic, discovery, and aggregation (sFlow, LLDP, LACP). Network Security: Advanced understanding of next-generation network firewalls, IDS/IPS, and network segmentation/SDA. Proficient in applying and maintaining security best practices … NCSC, Cyber Essentials, PCI DSS). Network Standards: In-depth knowledge of ISO layer 1 (Ethernet) wiring standards (copper and fiber-optic), wireless standards, ISO layer 2 (VLANs and authentication), and ISO layer 3 (IPv6). Familiarity with DNS, DHCP, and IP address management (IPAM). Enterprise Networking: Experience more »