with others to deliver. Technically astute, with in good knowledge of IT Operation and infrastructure. Desired Certifications (one or more is a plus): CISSP (CertifiedInformation Systems Security Professional) CISM (CertifiedInformationSecurityManager) CompTIA Security+ CEH (Certified Ethical Hacker More ❯
influence stakeholders to take preventive actions. Working knowledge of GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience More ❯
influence stakeholders to take preventive actions. Working knowledge of GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience More ❯
Technology, or a related field. 7+ years of professional experience in cybersecurity and IT infrastructure, including hands-on roles in network, systems, and security operations. Relevant certifications preferred: CISSP, CISM, CISA, CCSP, ISO 27001 Lead Implementer/Auditor, Okta, CyberArk. Technical Expertise Privileged Access Management (PAM): Design, implement, and manage PAM solutions, including governance, role-based access, and operational workflows. More ❯
field. • Minimum seven (7) years of professional experience in cybersecurity and IT infrastructure, including hands-on roles in network, systems, and security operations. • Relevant professional certifications preferred (e.g., CISSP, CISM, CISA, CCSP, ISO 27001 Lead Implementer/Lead Auditor, Okta certifications, CyberArk certifications). Technical Expertise Privileged Access Management (PAM): • Proven experience in designing, implementing, and managing privileged access and More ❯
best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in InformationSecurity, Computer Science, or a related field.- Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in informationsecurity management and conducting security audits.- Strong knowledge of informationsecurity frameworks and standards.- Excellent analytical and problem-solving skills.- Strong More ❯
best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in InformationSecurity, Computer Science, or a related field. - Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor. - Proven experience in informationsecurity management and conducting security audits. - Strong knowledge of informationsecurity frameworks and standards. - Excellent analytical and problem-solving skills. - Strong More ❯
best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in InformationSecurity, Computer Science, or a related field.- Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in informationsecurity management and conducting security audits.- Strong knowledge of informationsecurity frameworks and standards.- Excellent analytical and problem-solving skills.- Strong More ❯
and influence stakeholders to take preventive actions. Familiarity with GRC platforms, vulnerability management tools, and risk dashboards. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
Security Engineer (AZ-500), or the ability to demonstrate equivalent knowledge. Desirable Familiarity with the Microsoft security suite: Defender, InTune, Purview, EntraID, and Azure. Further certifications such as CISSP, CISM, or CRISC are advantageous Familiarity with PCI-DSS standards. Experience influencing cyber security investments and initiatives by providing expert advice to stakeholders and management. Educated to degree level or equivalent. More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
Security Engineer (AZ-500), or the ability to demonstrate equivalent knowledge. Desirable Familiarity with the Microsoft security suite: Defender, InTune, Purview, EntraID, and Azure. Further certifications such as CISSP, CISM, or CRISC are advantageous Familiarity with PCI-DSS standards. Experience influencing cyber security investments and initiatives by providing expert advice to stakeholders and management. Educated to degree level or equivalent. More ❯
technical audiences. Experience partnering with cross-functional team members to deliver results. Advanced knowledge of Microsoft products. What sets you apart: Information Technology or Security certifications (e.g., CISA, CRISC, CISM, CISSP, CGEIT, CIA, NIST, COBIT, etc.). Familiarity with financial institutions regulations (GLBA, FFIEC Handbooks, PCI DSS) Work experience in highly regulated work environments including other large financial institutions Experience More ❯
lead engineering teams and drive complex architecture conversations Strong documentation, communication, and stakeholder management skills Background working in large enterprise or government environments preferred Industry certifications such as CISSP, CISM, CCSP, CEH, or relevant cloud security certifications are highly desirable More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
secure development lifecycle (SDLC). Experienced in incident response and cross-functional coordination. Confident supporting tenders and delivering client security assurance. Preferrable If You. Professional certifications such as CISSP, CISM, CISA, or equivalent. Experience in or supporting the higher education sector. Strong understanding of multi-tenant SaaS security. Knowledge of DevSecOps and integrating security in CI/CD pipelines. Familiarity More ❯
service delivery. Provide security input for vendor assessments, third-party risk, and M&A due diligence. Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure More ❯
service delivery. Provide security input for vendor assessments, third-party risk, and M&A due diligence. Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure More ❯
Master’s degree in Automation, Robotics, Cyber Security, Computer Science, or related discipline. Relevant OT/IT cyber security certifications such as: ISA/IEC 62443 Series CISSP/CISM/CISA CEH GICSP CSSA Behavioural Competencies Strong collaboration and teamwork. Commitment to continuous improvement. Accountability and empowerment. Transparency, respect, and inclusivity. Strong focus on safety and integrity. Long-term More ❯
policy/directives, and ability to assess risks across all types of IT systems and operations. Audit/Project Management Certifications (desirable) - CMIIA (UK), CIA (US), CISA, CGEIT, CISSP, CISM, CompTIA, SANS, ISC2, Prince2, Agile etc. More ❯
GDPR, FCA, PRA), cloud-native security, and DevSecOps practices. Exceptional leadership, communication, and stakeholder engagement skills, with the ability to influence at Board and executive levels. Relevant certifications (CISSP, CISM, CCSP, CIPP/E, SABSA, or equivalent) preferred. We’re committed to equal employment opportunity and provide application, interview and workplace adjustments and accommodations to all applicants. If you foresee More ❯
Ability to lead and communicate effectively with executive leadership and technical teams. Bachelor's degree in Computer Science, Cybersecurity, or related field (Master's preferred Preferred Certifications CISSP, CCSP, CISM, AWS Solutions Architect, Azure Security Engineer, or equivalent. Additional cloud or cybersecurity architecture certifications are a plus. More ❯
forensics, threat hunting, and real-time monitoring. Familiarity with scripting or automation tools such as Python, PowerShell, or Bash. Excellent communication and problem-solving abilities. Relevant certifications preferred: CISSP, CISM, CEH, OSCP, CCSP, or GIAC. Nice to Have Experience working in regulated environments such as healthcare, financial services, or government. Exposure to DevSecOps and CI/CD pipelines security. More ❯
A Flexible and collaborative mindset and the ability to foster productive relationships across IT, business, and leadership teams, supporting a proactive and security-aware culture. Certifications such as CISSP, CISM, GIAC, AZ-500, or MS-500. Experience working with compliance and security frameworks (e.g., ISO 27001, NIST, GDPR). Core Values Respect: Treat others the way they would like to More ❯
with SIEM, security system administration, and incident response. Understanding of SOC operations and monitoring. No formal qualifications required, although a security or IT-related certification (e.g., CompTIA Security+, CISSP, CISM) are desirable. About us... Since our humble beginnings in 1990, Poundland has evolved into a retail powerhouse with over 700 stores and nearly 13,000 dedicated colleagues across the UK More ❯