Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
HEAD OF INFORMATIONSECURITY OPERATIONS - CONTRACT - HYBRID -READING Contract Hybrid working - 2/3 days in office/week Location: Reading Duration: 6 -9 months We are recruiting for a Head of InformationSecurity Operations to ensure that the Confidentiality, integrity and availability of information … Anti-Virus/Identity Awareness/URL Filtering SIEM/Splunk Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability Security Scanning e.g. Nessus Microsoft Windows Server family of products. Operational experience of PCI DSS Citrix XenApp, remote access products LAN & WAN networking using Cisco … Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into a SOC in order to identify and alert on security incidents Understanding of security issues and ability to allocate work to appropriate resources and manage escalations effectively Understanding of vulnerability management and defence more »
month contract. The role will be fully on site in Reading so a local candidate will be most ideal. Responsibilities in the role; Identify informationsecurity and Threat Intelligence requirements and oversight of delivery by: Identifying business unit Priority Intelligence Requirements that enable the business unit to conduct … its business continuously in a secure manner. Analysis of information across Strategic, Operational and Tactical arenas into actionable intelligence that allows stakeholders to make informed decisions. Ensuring delivery of the Threat Intelligence programme within the business unit, delivery of services and products provided by Group Security. Where services are … of business unit. Engage with the business unit to: Develop an understanding of business goals in order to constructively engage senior business leaders on informationsecurity, identifying key threats and areas for improvement, driving appropriate risk management decisions and collaborating with partners to achieve positive outcomes and business more »
Your new company Our Public Sector client requires an experienced Security and Information Risk Advisor (SIRA) to provide expertise to teams for risk identification, analysis, evaluation and treatment and to develop, operate, maintain and improve the organisation's ISMS. They shall be responsible for providing informationsecurity … relative international standards. What you'll need to succeed The successful candidate will have a strong understanding and background in technical and non-technical informationsecurity and risk and have the ability to engage with management and technical/non-technical SMEs for the successful implementation and operation … certifications/qualifications or equivalent: * Certified Information Systems Security Professional (CISSP) * Certified ISO 27001 Lead Implementer/Auditor of Management Systems (including InformationSecurity and Business Continuity) * Technical Risk assessment within Government departments What you need to do now If you're interested in this role, click 'apply now more »
Employment Type: Contract
Rate: £550 - £600/day £550 - £600 pd, Out of Scope of IR35
Role Overview Microsoft Data Security Cloud Solution Architects are trusted advisors for customers attempting to secure their entire data estates against internal and external data risk. Microsoft Purview's integrated Data Security services support customers holistically secure data: · Protect Sensitive Data using data classification, sensitivity labelling and encryption … teams and have access to a significant library of training, certification and usage guide resources. Required/Minimum Qualifications · 3+ years' experience in Data Security/InformationSecurity Management, Data Governance or related field AND 3+ years of working in cloud infrastructure, IT consulting/support, systems … administration, architecture and/or software development. · Good understanding of the principles of Data Security, such as data classification, encryption, sensitivity labelling, information protection policies and exfiltration controls · Experience in the implementation (end to end) of Data Security projects with Data Security Platforms (Broadcom, Micro Focus more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
LEAD CYBER SECURITY CONSULTANT - READING - CONTRACT- HYBRID Lead Cyber Security Consultant Contract - 6 Months rolling- Inside IR35 Location: Reading - 2 days onsite/week must The role of Cyber Security Consultant sits within the Cyber Security team which is responsible for providing subject matter expertise and … in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common informationsecurity management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP … and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/design more »
AWS Security Engineer - Remote (Outside IR35) Day Rate : £(Apply online only) Contract Length : 6+ months Location : Remote About the role: As a Cloud Security Engineer you will be responsible for designing, implementing, and managing security measures to safeguard computer systems, networks, and data. Conducts regular system tests … and monitors network security continuously. Develops and implements security standards and procedures aligned with industry best practices. Collaborates with IT and development teams to integrate security practices into AWS-hosted and .NET or any other application security life cycles. Also performs vulnerability testing, investigates security breaches, installs security measures, documents breaches, and works to maintain a high-security standard by fixing detected vulnerabilities and staying updated on security technologies. Required Skills: Must be AWS security certified or relevant certifications (e.g., CISSP, CISM, CISA) Bachelor's degree in Computer Science, Informationmore »
Application Security Architect Day Rate: Excellent Day Rate/Above Market Rate (disclosed on application) IR35 Status: Inside IR35 Contract Length: 6 months initial (expected to extend multiple times) Hybrid Model: 3 days per week in office, 2 days remote Office Location: Central London Job Level: Senior Industry/… experience essential) About the Client and Role: My client, a highly prestigious, globally renowned name in financial services is seeking a vastly experienced Application Security Architect to join the in-house security team on an initial 6-month (but fully expected to extend many times) basis. The Application … Security Architect will be responsible for translating the group-wide information and cyber security strategy and requirement into secure-by-design Application security architecture throughout the organisation. The Architect will work closely with the Security and DevOps teams, reviewing large bodies of code (Java and more »
DV Cleared Onsite in Hereford Duration: 6 Months initially Market Rates via Umbrella Role Description: Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will … big data technologies and ecosystems (e.g., NiFi). * Knowledge of current market and emerging leaders in data analytical and SIEM platforms. * Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusion detection systems and signature development. * Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and informationsecurity policies, procedures and regulations. * Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: * Previous experience more »
Our client, a leading technology company, is seeking a Microsoft Data Security Cloud Solution Architect to join their team. In this role, you will be a trusted advisor to customers, helping them secure their data estates against internal and external data risk. You will work with Microsoft Purview's … integrated Data Security services, providing comprehensive support to customers throughout the adoption lifecycle. Key Responsibilities: Protect sensitive data through data classification, sensitivity labelling, and encryption policies. Manage insider risks using machine learning detection controls, adaptive protection, and advanced privacy controls. Prevent data loss with built-in exfiltration policies for … deployment, and optimization. Work within small teams and utilize a library of training and certification resources. Job Requirements: 3+ years of experience in Data Security/InformationSecurity Management or related field, along with 3+ years of experience in cloud infrastructure, IT consulting/support, systems administration more »
experience with cloud services and their WAF controls, ideally including one or more of the following: AWS, Azure, and GCP understanding of Web Application security attack methods and mitigations in WAF tuning and configuration, coupled with a strong foundation in web security principles and practices. custom WAF rules … and features, addressing gaps and enhancing overall security measures to design and implement bespoke WAF processes and documentation, underpinned by a thorough understanding of web application security. skills to review and align platforms with MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. DevSecOps pipeline … maintenance support for the automation works with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. of HTTPS inspection, including Termination and Certificate management, grounded in robust web security practices. in rate limiting techniques and their integration into security configurations of more »
Sheffield, South Yorkshire, United Kingdom Hybrid / WFH Options
Experis
with cloud services and their WAF controls, ideally including one or more of the following: AWS, Azure, and GCP * Strong understanding of Web Application security attack methods and mitigations * Proficiency in WAF tuning and configuration, coupled with a strong foundation in web security principles and practices. * Develop custom … WAF rules and features, addressing gaps and enhancing overall security measures * Capability to design and implement bespoke WAF processes and documentation, underpinned by a thorough understanding of web application security. * Analytical skills to review and align platforms with MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities … Providing DevSecOps pipeline maintenance support for the automation works * Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. * Understanding of HTTPS inspection, including Termination and Certificate management, grounded in robust web security practices. * Experience in rate limiting techniques and their more »
in SOC environments, SIEM & Incident Management, Vulnerability Management, and Endpoints or Threat Analysis. Key Responsibilities: - Conduct thorough Cyber Analysis to identify and respond to security incidents. - Monitor and manage Security Operations Center (SOC) environments to ensure the integrity and security of our systems. - Utilize SIEM tools for … real-time event correlation and incident detection. - Effectively handle Incident Management, responding promptly to security alerts and breaches. - Implement and oversee Vulnerability Management processes to identify and mitigate potential security risks. - Conduct analysis of endpoints and threats to enhance overall security posture. Qualifications: - Proven experience in Cyber … Analysis and Security Operations. - Proficiency in working with SOC environments and utilizing SIEM tools. - Strong knowledge of Incident Management processes and procedures. - Experience in Vulnerability Management to address potential security vulnerabilities. - Expertise in Endpoints or Threat Analysis to enhance threat detection and response. Requirements: - Bachelor's degree in more »
required. We are looking for someone who has the following skills: Recognised professional certification such as; CISSP, CISM, CISA, CRISC Experience and understanding of security governance frameworks and security risk management. Good familiarity with the NIST Cybersecurity Framework, CIS Critical Security controls, and ISO27001. Experience of delivering … security assurance services to significant projects within a large complex business Experience of engaging consultatively and openly with internal & external stakeholders to ensure good collaboration and positive working relationships. Strong technology grounding - familiarity with its implementation and use within the corporate environment, and the potential vulnerabilities that could arise. … Experience of delivering "end to end" Informationsecurity assurance activities and achieving optimal risk management outcomes Effective communicator with strong written and verbal communication skills - capable of writing clear concise reports and presenting to senior stakeholder groups. To apply today, contact Neha Cherian on 01675 678354 or email more »
Cambridgeshire and Peterborough NHS Foundation Trust
calls within the defined timeframe. To use effective telephone techniques to healthcare professionals, patients and other agencies in a quick and efficient manner. Record information in the chosen software timely and accurately. Manage all calls in a controlled and professional manner. Deal with difficult callers in a calm and … Any data that is taken/shared as part of a phone call or transferred electronically must be undertaken with regard to the Trust Information Governance and InformationSecurity policies. Attend and book rooms for team meetings, take, transcribe and distribute minutes on a weekly basis. Provide … to colleagues, and supervision of Band 2 administration staff within the team, if required, as directed by Line Manager. Inputting and updating service user information and service user/team activity on computerised information systems, creating service user notes where necessary and according to policy. Maintain filing in more »
Job Title: Cyber Security Programme Manager Location : London (Hybrid) Contract: End of year (Possibility of extension) Start Date: ASAP Client Description: Our client has chosen to do something incredible. There are totally transforming their business and building our future on smoke-free products with the power to improve the … lives of a billion smokers worldwide. Job Description: We are seeking a highly skilled Cyber Security Programme Manager to join our team. The ideal candidate will be responsible for overseeing and managing various aspects of our cybersecurity initiatives, with a focus on program management, stakeholder engagement, and ensuring alignment … identified during UAT, ensuring timely resolution. Business Requirements Documentation: Collaborate with stakeholders to document business requirements. Work closely with metric owners, data owners, and informationsecurity domain Subject Matter Experts (SMEs) to define and validate required metrics for cybersecurity initiatives. Data Integration Support: Support the delivery of data more »
and fire rules. It is your legal duty to take care of your own health and safety as well as that of your colleagues. InformationSecurity and Confidentiality During the course of your employment you may have access to, see or hear information of a confidential nature. … You are required not to disclose such information, particularly relating to patients or staff. All personal identifiable information must be held in the strictest confidence and should only be disclosed to authorised people in accordance with NHS confidentiality guidelines (Caldicott) and the Data Protection Act 1998, unless explicit … written consent is given by the person identified or where information sharing protocols exist. Any failure to comply with this term of your employment will be treated as an act of misconduct under the employer's disciplinary procedure. Research Governance Research and Development is at the heart of providing more »
Lead Security Engineer - £600 (Outside Ir35) - 2 days a week in London We are currently recruiting on behalf of an IT Change and Transformation Consultancy who are looking for a lead Network Security Engineer. They're currently supporting a client who are going through a transformation standardising on … week. We are looking for someone to provide technical leadership and at times be hands on as required. Key Skills: A good understanding of informationsecurity vulnerabilities, risks and threats. Experience with Fortinet networking equipment especially firewalls Previous experience working with auditors (internal and external) to obtain key more »
Powershell. Microsoft Office Applications and Office 365. Familiar with Microsoft Active Directory user account management. An understanding of NTFS Permissions. Both local and GPO Security Policies. User Hardware Board level support and configuration including desktops and laptops. PC Peripherals such as Printer configuration and support. Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLANs. A working understanding of DHCP and DNS. Awareness of InformationSecurity best practices. Conceptual understanding of AntiVirus, URL Filtering and spam identification. Business Audio and Visual Solutions such as projectors and conference systems. Backup Methodologies and practices. Understanding of more »
Powershell. •Microsoft Office Applications and Office 365. •Familiar with Microsoft Active Directory user account management. •An understanding of NTFS Permissions. •Both local and GPO Security Policies. •User Hardware – Board level support and configuration including desktops and laptops. •PC Peripherals such as Printer configuration and support. •Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLAN’s. •A working understanding of DHCP and DNS. •Awareness of InformationSecurity best practices. •Conceptual understanding of AntiVirus, URL Filtering and spam identification. •Business Audio and Visual Solutions such as projectors and conference systems. •Backup Methodologies and practices. •Understanding more »
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
Local Pensions Partnership
of data - Respond to member queries promptly both written and oral ensuring that service level targets and deadlines are met in this area - Treat informationsecurity with the upmost respect, dealing appropriately with sensitive and confidential information within Service protocol/guidelines - Communicate positively and participate in more »
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Handepay
manner, ensuring all necessary tasks are completed for each process eg starters, leavers, reward/benefits, payroll input, absence, holidays etc. Submission of personal information and payment uploads within agreed timescales. Complete monthly third party payment requests via Finance as required Provide a HR Administration service that manages the … management hierarchy within the Sage HR system ensuring all processes are executed within a timely manner, allowing for the production of monthly MI to informationsecurity, IT and Finance. Support the wider HR team with producing accurate and timely data inputs for all processes including performance management, pay … and compensation Maintain employee payroll records so that information is accurate and secure. Data managed may include personal information; job history; retirement and insurance documentation; leave accrual records; and details of illness, absences, transfers, and salary progression Assist with annual gender pay gap report. About you: You have more »
Hat, and VMware technologies across both the desktop and server estate Enterprise hardware from vendors from Dell, Apple, and Cisco A wide suite of InformationSecurity tooling from a number of best-in-class vendors Role & Responsibilities: Deploy, maintain, and support any IT systems and applications used within more »
RM17, Grays, Borough of Thurrock, Essex, United Kingdom Hybrid / WFH Options
Kane Recruitment
Corporate accountabilities: To work with colleagues to achieve service plan objectives and targets To comply with data protection legislation and the council's InformationSecurity Policy, including supporting policies To be willing and able to work in a flexible and agile way with regard both to hours of more »
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
yolk recruitment
/Mentorship experience Experience managing stakeholders Problem solving/providing solutions Collaboration: Work closely with SAP Collaboration Centre Team, Programme Managers, Business Analysts, Service & InformationSecurity teams, Business Managers, Senior Management Stakeholders, and External Partners. Benefits Fully funded training opportunities Flexible working arrangements 11% Pension 28 days annual more »