Preston, Lancashire, United Kingdom Hybrid / WFH Options
Delphi Care Solutions Limited
Location : Hybrid - Preston, Stevenage or Nottingham Job Summary : We are seeking a Senior Data Integration Specialist with extensive experience in designing and developing scalable, resilient, and durable data integration architectures. The ideal candidate will possess a strong background in Azure-based data management solutions and, ideally, integration … of AI tools across a variety of data sources. This role will involve working with Microsoft data solutions to drive intelligent data integration, and ensuring high standards of data security, compliance (including GDPR), and performance. Experience with Java and microservices architecture is highly desirable - working with … our dev. and data team to design, develop, and maintain robust and scalable data integration solutions. Key Responsibilities : API integration and development Design and implement secure API integrations between our SaaS software and third-party systems. Develop authentication, authorization, and access control mechanisms using JWT, OAuth, SSO, and More ❯
operational excellence whilst identifying new areas of growth as part of our day to day objectives. Role Purpose: We are looking for an experienced Data Security Architect to join our growing Information Security team. Reporting to the Global Head of Security Strategy, Architecture & Engineering and working closely with IT … solutions to ensure information security and compliance requirements of the organisation as we go through our Digital Transformation and modernisation and beyond. As a Data Security Architect, you will possess in-depth knowledge of a broad range of information security controls to protect various data stores, both on … premises and in the cloud. The Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference More ❯
with strong security knowledge & skills to help drive the Group’s Security Architecture forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, DataEncryption at rest, in transit, and … planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules, Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of … wider bank reference architecture and Group Security Architecture About us Like the modern Britain we serve, we’re evolving. Investing billions in our people, data and tech to transform the way we meet the ever-changing needs of our 26 million customers. We’re growing with purpose. Join us More ❯
with strong security knowledge & skills to help drive the Group’s Security Architecture forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, DataEncryption at rest, in transit, and … planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules, Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of … wider bank reference architecture and Group Security Architecture About us Like the modern Britain we serve, we’re evolving. Investing billions in our people, data and tech to transform the way we meet the ever-changing needs of our 26 million customers. We’re growing with purpose. Join us More ❯
Bradford, England, United Kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
Bradford, south west england, united kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
Deliver AWS Services & Security: Build and maintain AWS infrastructure (VPC, EC2, RDS, S3, Lambda, etc.), implementing security best practices (WAF, Network Firewall, IAM, VPC, dataencryption) to ensure compliance and resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including … Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost Explorer and Trusted Advisor to drive efficiency. Develop and Maintain Infrastructure as Code (IaC): Automate provisioning, alerting, and … best practices. Infrastructure as Code (IaC): Strong proficiency in CloudFormation (preferred) or AWS CDK for automated, scalable deployments. AWS Cloud Security & Compliance: Expertise in encryption, IAM policies, network security, and transit security, ensuring adherence to financial services regulations (PCI DSS, FCA, GDPR). Database & Data Services: Expertise in More ❯
bradford, yorkshire and the humber, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
wakefield, yorkshire and the humber, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
doncaster, yorkshire and the humber, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
sheffield, south yorkshire, yorkshire and the humber, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
leeds, west yorkshire, yorkshire and the humber, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
warrington, cheshire, north west england, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
preston, lancashire, north west england, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
bolton, greater manchester, north west england, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
newcastle-upon-tyne, tyne and wear, north east england, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
Kingston upon Hull, England Metropolitan Area, United Kingdom
Ventula Consulting
Information Security Lead where required, including within the technical response to security incidents. Maintain, review, test and implement security operations technologies, such as, antivirus, dataencryption, identity, cloud and other security measures in place. Maintain and improve procedures, documentation and relationships with other internal operations teams, ensuring effective More ❯
and the ISO 27001 as new and ongoing projects. Supporting with assessing any cyber security trends and look at preventative measures that could include dataencryption and anti-virus protection. Rolling out new software upgrades such as Windows 11. Skills required Experience with technical IT infrastructure and 3rd More ❯