place, so you ll play a key role in managing Subject Access Requests (SARs), Right to Be Forgotten (RTBF) requests, and ensuring the organisation maintains the highest standards of dataprivacy and governance. Key Responsibilities on the Information Security Analyst: Manage and respond to Subject Access Requests (SARs) in accordance with GDPR timelines and procedures. Oversee Right … to Be Forgotten and data deletion requests, ensuring complete and compliant execution. Support the wider GRC and Information Security team in data protection and risk management activities. Help maintain the Information Security Management System (ISMS). Maintain accurate records of all data protection requests and actions taken. Provide expert advice on GDPR compliance and data subject … rights. Liaise with internal teams and stakeholders to ensure consistent adherence to data protection principles. Information Security Analyst Experience/Technology: Proven experience in GRC and Information security. Extensive expertise of GDPR, SAR, and Right to Be Forgotten requirements. Experience running user awareness campaigns. Hands-on experience with Microsoft Purview or other data discovery and governance tools are More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
VIQU IT Recruitment
place, so you'll play a key role in managing Subject Access Requests (SARs), Right to Be Forgotten (RTBF) requests, and ensuring the organisation maintains the highest standards of dataprivacy and governance. Key Responsibilities on the Information Security Analyst: Manage and respond to Subject Access Requests (SARs) in accordance with GDPR timelines and procedures. Oversee Right … to Be Forgotten and data deletion requests, ensuring complete and compliant execution. Support the wider GRC and Information Security team in data protection and risk management activities. Help maintain the Information Security Management System (ISMS). Maintain accurate records of all data protection requests and actions taken. Provide expert advice on GDPR compliance and data subject … rights. Liaise with internal teams and stakeholders to ensure consistent adherence to data protection principles. Information Security Analyst Experience/Technology: Proven experience in GRC and Information security. Extensive expertise of GDPR, SAR, and Right to Be Forgotten requirements. Experience running user awareness campaigns. Hands-on experience with Microsoft Purview or other data discovery and governance tools are More ❯
Grantham, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Recruitment Revolution
track path to our Leadership Team. Application notice... We take your privacy seriously. As you might expect you may be contacted by email, text or telephone. Your data is processed by our talent partner RR (Recruitment Revolution) on the basis of their legitimate interests in fulfilling the recruitment process. Please refer to their DataPrivacyMore ❯
Boston, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Recruitment Revolution
track path to our Leadership Team. Application notice... We take your privacy seriously. As you might expect you may be contacted by email, text or telephone. Your data is processed by our talent partner RR (Recruitment Revolution) on the basis of their legitimate interests in fulfilling the recruitment process. Please refer to their DataPrivacyMore ❯
Nottingham, Nottinghamshire, England, United Kingdom Hybrid / WFH Options
RecruitmentRevolution.com
track path to our Leadership Team. Application notice... We take your privacy seriously. As you might expect you may be contacted by email, text or telephone. Your data is processed by our talent partner RR (Recruitment Revolution) on the basis of their legitimate interests in fulfilling the recruitment process. Please refer to their DataPrivacyMore ❯
Loughborough, Leicestershire, England, United Kingdom
Brush Group
Ensure the smooth operation and availability of critical IT systems, minimizing downtime and ensuring business continuity. Implement and monitor disaster recovery and backup systems to protect the company’s data and IT assets. Cybersecurity & Risk Management: Lead the development and implementation of robust cybersecurity strategies to protect against data breaches, cyber-attacks, and other security threats. Establish and … enforce IT policies, procedures, and controls that ensure compliance with industry standards, regulations, and best practices. Regularly assess and mitigate risks related to IT operations, including dataprivacy, security vulnerabilities, and compliance issues. Project Management & Systems Integration: Oversee the execution of IT projects, including software implementation, system upgrades, and infrastructure expansions. Ensure that all IT projects are … systems into existing business processes. IT Governance & Compliance: Maintain and enhance the existing governance frameworks to ensure that IT resources are used effectively and responsibly. Ensure compliance with relevant data protection laws (e.g., GDPR, CCPA) and industry-specific regulations. Lead regular IT audits and ensure that all internal and external audit recommendations are implemented. Team Leadership & Development: Lead and More ❯
anywhere in the UK. We're reviewing applications on a rolling basis , so don't wait! Apply today to kickstart your exciting journey with Dojo! Please refer to our DataPrivacy Statement for Candidates - https://www.dojo.careers/privacy-notice/for details on our data handling practices during your application. The personal … services or employment. Your personal information will also be used to verify your identity. Further details of how your information will be used by us and Cifas, and your data protection rights, can be found by requesting this from the Dojo team. More ❯
anywhere in the UK. We're reviewing applications on a rolling basis , so don't wait! Apply today to kickstart your exciting journey with Dojo! Please refer to our DataPrivacy Statement for Candidates - https://www.dojo.careers/privacy-notice/for details on our data handling practices during your application. The personal … services or employment. Your personal information will also be used to verify your identity. Further details of how your information will be used by us and Cifas, and your data protection rights, can be found by requesting this from the Dojo team. More ❯