Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
development lifecycle (SDLC). Experienced in incident response and cross-functional coordination. Confident supporting tenders and delivering client security assurance. Preferrable If You. Professional certifications such as CISSP, CISM, CISA, or equivalent. Experience in or supporting the higher education sector. Strong understanding of multi-tenant SaaS security. Knowledge of DevSecOps and integrating security in CI/CD pipelines. Familiarity with More ❯
Reading, Berkshire, England, United Kingdom Hybrid/Remote Options
Certain Advantage
as ISO27001, NIST CSF, CIS, COBIT , or equivalent. Strong client-facing skills, with the ability to communicate technical concepts to non-technical audiences. Relevant industry certifications such as CISSP, CISA, CRISC, CISM, or CISMP . Excellent communication skills and fluency in English. Desirable Degree in a related discipline (e.g. Information Security, IT, Risk Management). Exposure across multiple industry sectors. More ❯
within the water utility industry or large, complex critical national infrastructure. Experience in internal audit, external audit, or assurance functions related to IT or cybersecurity. Professional certifications such as CISA, CISSP, CRISC, or ISO 27001 Lead Auditor are advantageous. GCS is acting as an Employment Agency in relation to this vacancy. More ❯
capacity. Experience in delivering assignments using well known security frameworks, standards and methodologies such as ISO27001, NIST CSF, CIS Top 18 and COBIT. Industry certifications such as CISSP/CISA/CRISC/CISM/CISMP. More ❯
capacity. Experience in delivering assignments using well known security frameworks, standards and methodologies such as ISO27001, NIST CSF, CIS Top 18 and COBIT. Industry certifications such as CISSP/CISA/CRISC/CISM/CISMP. More ❯
The Policy Support Lead will be responsible for developing, implementing, and maintaining security policies, standards, and procedures to ensure the protection of our information assets. This role requires a good understanding of security frameworks and regulatory requirements. In addition, this More ❯