with strong security knowledge & skills to help drive the Group’s Security Architecture forward. We have a role open to be responsible for the Data Protection security domain. Data Protection at Lloyds Banking Group includes Data Loss Management, DataEncryption at rest, in transit, and … planning for in use, Key Management, Certificate Management, Secrets Management, Hardware Security Modules, Digital Rights Management, and attribute level treatment of Data (hashing, tokenisation, truncating, encrypting). The Chief Security Office (CSO) is a vital part of delivering the Group’s vision of putting customers at the heart of … wider bank reference architecture and Group Security Architecture About us Like the modern Britain we serve, we’re evolving. Investing billions in our people, data and tech to transform the way we meet the ever-changing needs of our 26 million customers. We’re growing with purpose. Join us More ❯
Bradford, south west england, united kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
south west london, south east england, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
swindon, wiltshire, south west england, united kingdom
Visa Inc
logging, auditing, and security implementation and practices. Experience in API development using REST, SOAP,JSON, and XML. Strong understanding of API security, security standards, dataencryption, and HSMs. Excellent written and verbal communication skills, interpersonal and presentation skills, and proven ability to influence and communicate effectively. Highly driven More ❯
operations and minimising manual processes. Security Compliance : Implement and maintain robust security protocols, ensuring that systems comply with regulatory standards and best practises, including dataencryption, access control, and vulnerability management. Incident Management : Lead efforts in resolving system outages or performance degradation, conduct root cause analysis, and implement … Years in a systems engineering role, focusing on managing and scaling systems in cloud or hybrid environments. Analytical Mindset: Strong analytical skills to synthesise data and insights into actionable strategies, addressing challenges creatively and effectively. Pontoon is an employment consultancy. We put expertise, energy, and enthusiasm into improving everyone More ❯
Stroud, England, United Kingdom Hybrid / WFH Options
Ecotricity
Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/DataEncryption About You The right candidate for this role will behave a demonstrable background in Cyber Security, a healthy passion for keeping up More ❯
Stroud, south east england, united kingdom Hybrid / WFH Options
Ecotricity
Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/DataEncryption About You The right candidate for this role will behave a demonstrable background in Cyber Security, a healthy passion for keeping up More ❯
rail, and defense organizations with the most comprehensive product portfolio to elevate operational excellence, and transform safety management and training, with closer integration of data across these domains. Comply365 ensures our customers' teams and assets are always geared for peak operational performance and unlocks unparalleled financial and operational gains … As a person, you'll be proactive rather than reactive, able to build cross functional relationships and be able to articulate value and represent data in a way that can be consumed at all levels. Key Duties and Responsibilities Conducting security assessments and prioritising findings for remediation. Designing and … and network security, protocols, and best practices, including ISO27001, SOC2 and Cyber Essentials controls. Experience with firewalls, intrusion detection systems, anti-virus software, and data encryption. Knowledge of risk assessment tools, technologies, and methods. Experience designing secure networks, systems, and application architectures. Eligible for SC Clearance (lived in the More ❯