Security and Data Protection, in alignment with the corporate Risk Framework, is another critical responsibility. Supporting internal and external audit activities related to Data / Information and Technology, such as ISO27001 certification, risk management, business continuity, and relevant specific requirements, is also part of … IT departments, including budgeting and financial management, talent management, risk management, and IT audits. Familiarity with relevant compliance standards and regulations, such as ISO27001 and the Data Protection Act, is crucial. A solid understanding of corporate productivity and technology tools, including Microsoft Office and Azure … also important. Desirable skills and qualifications include a degree in a relevant subject, such as Computer Science, Information Management, or Business Management. Experience and / or certification in leading data warehouse, analysis, and visualisation tools, such as Snowflake, Azure Synapse, Power Platform, Cognos, SAS, and Qlik, are highly valued. More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
Randstad Technologies Recruitment
trends. Partner with teams across the globe to design, implement, and test security tools and controls. Lead the journey to achieving and maintaining ISO27001 certification. Stay sharp on cybersecurity developments, translating new risks and regulations into meaningful action. Drive cultural change by creating impactful cybersecurity … You Bring to the Table We're looking for a curious, thoughtful, and detail-oriented professional. Hands-on experience implementing and auditing against ISO27001 standards. A solid foundation in enterprise-level Information Security practices. Strong analytical skills and a calm approach under competing demands. Familiarity … 2010. For the purposes of the Conduct Regulations 2003, when advertising permanent vacancies we are acting as an Employment Agency, and when advertising temporary / contract vacancies we are acting as an Employment Business. More ❯
Swindon, Wiltshire, United Kingdom Hybrid / WFH Options
WeAreTechWomen
should have significant experience or aptitude in areas such as: Identity and Access Management (e.g., MFA, SAML, Kerberos) Networking protocols and security (e.g., IPv4 / 6, TLS, VPN, Wireless Security) Automation and scripting (e.g., API, Ansible, Terraform, Bash, PowerShell) Security architectures (e.g., Zero Trust, micro-segmentation, NGFW, WAF) Cloud … Experience in threat evaluation and documenting architectural solutions Knowledge of security policies, standards, and audit findings Experience with maturity frameworks like NIST CSF or ISO27001 Knowledge of financial regulations such as PCI-DSS and GDPR Professional security qualifications (e.g., CISSP, ISSAP) Our customer-first behaviors include: Feel what customers feel More ❯
security policy and requirements (JSP 440, JSP 604 etc) Produce, Review, Manage Technical Risk Assessments Ideal Candidates should have proven experience within an MOD / … Defence Digital environment. And also hold Some / Several of the following Accreditations and Qualifications: CCP SIRA qualified Ex CLAS NIST CISSP, CISSM, ISO27001 SC as a minimum and Ideally DV Clearance will be required prior to starting, as such all candidates should either hold existing clearance or be More ❯
security policy and requirements (JSP 440, JSP 604 etc) Produce, Review, Manage Technical Risk Assessments Ideal Candidates should have proven experience within an MOD / … Defence Digital environment. And also hold Some / Several of the following Accreditations and Qualifications: CCP SIRA qualified Ex CLAS NIST CISSP, CISSM, ISO27001 SC as a minimum and Ideally DV Clearance will be required prior to starting, as such all candidates should either hold existing clearance or be More ❯