tests, vulnerability scans, and assess organization cybersecurity maturity complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and security standards and regulations. Provide internal customer support via assigned tickets for security-related issues, while ensuring assignments More ❯
cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of experience in GRC, risk management, or compliance. A bachelor's degree in computer More ❯
dynamic analysis techniques. Ability to develop and refine threat-hunting methodologies and define SIEM use cases. Familiarity with global cybersecurity regulations and compliance frameworks (GDPR, NIST, ISO 27001, etc.). Ability to work under pressure in a fast-paced, dynamic security environment. Experience in developing Standard Operating Procedures (SOPs), security More ❯
and maintain security controls and configurations across various systems and platforms. Oversight of compliance for regulatory compliance requirements, such as SOC2, HIPAA, ISO 27001, GDPR etc., and ensure our systems adhere to these standards. Stay updated with the latest industry trends, emerging threats, and security technologies to proactively identify and More ❯
the effectiveness of security controls such as RBAC (Role-Based Access Control), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSC Cyber Essentials security standards. 3. Vulnerability Management & Defect Tracking Identify, document, and track security defects, working closely with development teams to More ❯
CAP, OWASP, PCI DSS Security Cleared with potential to gain enhanced clearances Experience implementing privacy solutions based on the requirements of the EUGDPR and UK DataProtection Act 2018 Good awareness of threats trends and issues across the cyber security industry Proven self-management skills, including More ❯
Management, Disaster Recovery, Business Continuity, IT Security Architecture, and IT Regulatory Compliance. Experience with Cybersecurity frameworks and regulations such as HIPAA, Data Privacy, GDPR, etc. Experience with architectural and design patterns such as PubSub, Event Driven, SOA, Observer, Dependency Injection, Repository, Decorator, MVC, etc. Proven expertise in working in More ❯
Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity with security frameworks and standards such as SOC 2, ISO 27001, GDPR, or NIST. Experience with incident response and risk management. Knowledge of Zero Trust architectures and security-first IT practices. Soft Skills: Excellent problem-solving and More ❯
explain technical risks and solutions to technical and non-technical stakeholders. Desired skills Familiarity with UK regulatory frameworks (NIS / NIS2, Ofgem CAF, ECAF, GDPR/ DPA18, ISO 27001, or Cyber Essentials Plus). Understanding secure architecture principles, including zero trust, defence-in-depth, and secure-by-design approaches. Exposure More ❯
regulations that apply to financial institutions or its outsourcing partners. In-depth knowledge of relevant regulatory requirements and industry standards (ISO 27001, SOC 2, GDPR, DORA, etc.). Experience with cloud security (AWS, Google etc.), application security, and DevSecOps practices is a significant plus. Proven experience in developing and implementing More ❯
programmes, projects of both a GRC and technical nature alongside frameworks such as ISO27001 / 2:2005 / 13, DORA, NIS 2, PCI-DSS, GDPR-DPO, NIST CSF SP800-53, PSD-2, FCA / PRA, and MS Azure. Ownership of Strategic, Operational, and Tactical IT Security and Risk Management, technical More ❯
This You? CISSP, CISA, or CISM certification is strongly recommended, but not required. ISO 27001 / 27701 / 42001, SOC-2, PCI DSS, and GDPR knowledge, experience, and qualifications are highly desirable. At least 5 years of relevant industry experience in information security, with a focus on security architecture and More ❯
and Information Systems Directive (NIS), National Cyber Security Centre (NCSC) Cyber Assessment Framework (CAF), ISA / IEC 62443, ISO / IEC 27001 / 27002, GDPR, Cloud Security Alliance (CSA) Star framework, SOC2 Type 2 audits, Information Technology Infrastructure Library (ITIL), Control Objectives for Information and Related Technologies (CoBIT), etc. . More ❯
Accreditation Council for Graduate Medical Education
data warehouse. Experience with Azure Purview or data lineage similar tools. Experience with information security, data compliance policy and privacy standards (GDPR, Schrems II, ISO 27001) Experience with agile processes, methods and tools Good to have Certified Data Management Professional will be a plus. Knowledge of More ❯
adherence to the architecture and best practices. Security and Compliance: Ensure that all solutions comply with internal security standards and relevant regulatory requirements (e.g., GDPR, HIPAA), including data privacy, security, and disaster recovery considerations. Documentation: Develop and maintain detailed documentation of solution designs, architecture principles, and integration approaches for More ❯
Security Professional Qualifications / Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM / CISSP Patch Management Applications, EDR / XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Security Professional Qualifications / Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM / CISSP Patch Management Applications, EDR / XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Security Professional Qualifications / Certifications Desirable: General understanding of IT Security principles, standards and regulations (e.g. ISO 27001, NIST, CIS, PCI DSS and GDPR) CISM / CISSP Patch Management Applications, EDR / XDR systems. Antivirus, NAC - Forescout Vulnerability Scanning Tool e. Tenable One, Qualisys Knowledge of vulnerability scoring systems More ❯
security frameworks and standards. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server More ❯
london (city of london), south east england, united kingdom
Hays
security frameworks and standards. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server More ❯
development teams to integrate security into CI / CD pipelines. Experience in applying and conforming to relevant regulations and standards such as Cyber Essentials, GDPR, ISO 27001, NIST Cybersecurity Framework. Strong analytical and problem-solving skills, with a determined and proactive approach. Knowledge of emerging security trends and threats relevant More ❯
development teams to integrate security into CI / CD pipelines. Experience in applying and conforming to relevant regulations and standards such as Cyber Essentials, GDPR, ISO 27001, NIST Cybersecurity Framework. Strong analytical and problem-solving skills, with a determined and proactive approach. Knowledge of emerging security trends and threats relevant More ❯
OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
and intrusion detection systems. Experience with security tools such as SIEM, IDS / IPS, and vulnerability scanners. Familiarity with regulatory standards and frameworks (e.g., GDPR, HIPAA, ISO 27001). In-depth understanding of routers, switches, firewalls, and switching / routing protocols - such as VLAN, VTP, STP, RSTP, MST, OSPF, EIGRP More ❯
platforms, ensuring high availability, security, and cost-efficiency. Data Governance & Compliance: Ensure data integrity, security, and compliance with industry regulations (e.g., GDPR, PCI-DSS). Collaboration with Stakeholders: Work closely with product, analytics, and engineering teams to deliver data-driven insights and support business growth. ETL More ❯