Technical skills in JSON, Power Fx, JavaScript, HTML, and SQL. Demonstrable expertise with relevant vendor business applications. Desirable Knowledge of ICT standards: HMG SPF, ITIL V3, ISO/IEC 38500, ISO/IEC27001, ISO/IEC 22301, ISO/IEC 20000, PRINCE2, MSP. Strong written and verbal communication skills, with the ability to simplify technical concepts. Experience balancing user needs with organisational priorities. Evidence of continuous professional development aligned with SFIA V7 competencies. What We're Looking For A commitment to continuous improvement and delivering high-quality services. Collaborative working style across teams and functions. Strong More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Adecco
We're looking for a Cyber Security Analyst who is passionate about closing security gaps and ensuring robust compliance. This is a permanent role where your expertise in ISO27001 implementation AND ongoing maintenance will be the cornerstone of our security strategy. Why This Role Matters Gap Analysis at the Core: You'll lead regular risk … assessments and gap analyses to identify vulnerabilities and strengthen our security posture. ISO27001 Expertise: Beyond implementation, you'll ensure continuous compliance and drive improvements to maintain certification year after year. Strategic Impact: Your work will influence audits, security operations, and business continuity planning across the organisation. What You'll Do Own the ISO … Looking For Experience: 3-5 years in information security or compliance roles. ISO27001 Mastery: Proven track record in implementing AND maintaining ISO/IEC27001 certification . Analytical Strength: Skilled in gap analysis, risk management, and vulnerability identification. Certifications: ISO27001 Lead Implementer /More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Ryder Reid Legal Ltd
London-Based) Permanent | Hybrid Working | Competitive Salary I am working with a leading international law firm to support their search for an experienced and proactive Information Security Officer (ISO) to lead their global information and data security programme. This senior-level role offers the opportunity to shape the firm's long-term security strategy, drive ISO … controls and security operations across enterprise platforms Excellent communication and stakeholder engagement skills Desirable Attributes: Certifications such as CISM, CISSP, or ISO27001 Lead Implementer / Auditor Experience working with MDR / XDR partners and tools like Trustwave, Mimecast, or FortiGate A background in mentoring and promoting a security-conscious culture This is a … over thirty years we've been connecting legal talent with many of the leading law firms in London and internationally. Follow our LinkedIn page for the latest vacancies. https: // company / ryder-reid-legal More ❯
and operational delivery of all information and cyber security activities. You'll develop and implement robust security policies, oversee incident response, and ensure compliance with GDPR, PCI DSS, ISO27001, and Cyber Essentials Plus. You will be the single point of accountability for all security matters, reporting directly to the executive team and influencing critical business … wide information, cyber, and data security governance. Define and implement security frameworks, policies, and operating models. Ensure compliance with GDPR, PCI DSS, Cyber Essentials Plus, and ISO/IEC27001:2022 aligned practices. Lead Data Protection Impact Assessments (DPIAs), data mapping, classification, and retention programs. Oversee incident response, vulnerability management, patch compliance, and … Candidate Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust More ❯
for an Information Security Manager to lead and strengthen their information security function. This is a hands-on, strategic role where you’ll manage a small team, oversee ISO27001 and Cyber Essentials Plus compliance, and drive continuous improvement across the business. What You’ll Do: Develop and deliver the firm’s information security strategy. Lead … mentor a small team of IT security professionals. Own ISO27001 implementation and Cyber Essentials Plus certification. Manage operational security: endpoint protection, M365 security, SIEM / SOC, vulnerability management, and incident response. Lead security projects. Build strong relationships with stakeholders and deliver security awareness training. What We’re Looking For: Proven experience in information security … management, ideally in professional services. Hands-on experience with ISO27001 and Cyber Essentials Plus. Strong technical knowledge: endpoint security, M365 / Entra ID, SIEM, network security, encryption, backup / recovery. Certifications highly desirable: CISM, CISSP, ISO27001 Lead Implementer . Excellent communicator, strategic thinker, and supportive team leader. Why More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Crimson
establishing structure, collaborating with technical and business teams, and supporting security and compliance initiatives within the organization. The position requires development and maintenance of security policies aligned with ISO27001, GDPR, HIPAA, and OWASP, as well as leading risk assessments and … managing the risk register. Key skills and responsibilities, Comprehensive knowledge of ISO27001, NIST CSF, GDPR, HIPAA, SOC 2, and OWASP frameworks. Senior Security Analyst / Senior Security Engineer background Proven experience collaborating with software development teams and implementing technical controls. Skilled in articulating technical risks in terms of business impact. Professional certifications such as … CISM, CISSP, CRISC, ISO27001 Lead Auditor, and hands-on experience with GRC tools (e.g., Vanta, Drata) are highly desirable. Responsible for developing and maintaining security policies in alignment with ISO27001, GDPR, HIPAA, and OWASP standards. Lead risk assessments and oversee the management of the organization's risk register. Support efforts More ❯
Overview Join Chambers and Partners as our next Cyber Security Analyst / Lead, a pivotal role at the heart of our commitment to safeguarding information and maintaining trust. You’ll lead the development and delivery of our information security programme, protecting our systems, data, and digital assets from evolving threats. This is an exciting opportunity to drive key security … information security matters to various stakeholders across the organization. 2. Security Operations & Incident Response: Oversee the day-to-day operation of security systems and tools, including firewalls, intrusion detection / prevention systems (IDS / IPS), antivirus, anti-malware, SIEM (Security Information and Event Management), vulnerability scanners, and data encryption solutions. Manage vulnerability management programs, including regular scanning, penetration … in the design, implementation, and maintenance of all IT infrastructure, including cloud environments (e.g., Azure, AWS, GCP), networks, servers, and endpoints. Manage access controls, identity management (e.g., Entra ID / Azure AD), and privileged access management (PAM) systems. Manage access control processes to 3rd party applications, and 3rd party relations. Oversee the patching and configuration management of all systems More ❯
Package: Strong bonus structure & Excellent employee benefits Senior IT Security Consultant Job Location : UK, Remote (There will be occasional expectation to visit London clients & attend essential meetings in London / South England locations. Up to a couple of times a month) Salary Range: £75,000 to £84,000 (based on candidate experience) Bonus & Package : Strong bonus structure & Excellent employee … posture. Stay informed on emerging threats and security best practices. Required Skills & Qualifications: 5+ years’ experience in Security with strong experience Consulting & Architectural design Professional background in IT Services / IT Consultancy / MSP Strong experience of contributing to development & architecture on major projects. Strong technical knowledge of Azure and AWS security services, controls, and architectures. Deep understanding … and incident response in cloud environments. Familiarity with cloud-native security tooling (Purview, MS Defender, AWS Security Hub, GuardDuty, etc.). Strong understanding of Identity functions & Related tools, EntraID / Purview / CrowdStrike etc. Solid knowledge of Zero Trust / Data Classification / hybrid connectivity – and producing related architecture. Knowledge of common frameworks and standards (NIST More ❯
london, south east england, united kingdom Hybrid/Remote Options
Navro
This Role Demands: You Own It – You lead our detection and response mission. You help define the roadmap, build the pipelines, and drive measurable outcomes across threat visibility, MTTD / MTTR, and resilience. You Ask Questions – You challenge assumptions to improve signal‐to‐noise, coverage, and automation. Why this alert? Where's the data gap? How do we shift … our SIEM and SOC capability with Microsoft Sentinel, including data ingestion, workspace architecture, analytics, automation, and dashboards. Integrate high‐value telemetry sources (Entra, M365, Google Workspace, AWS, GCP, endpoints / EDR, network, SaaS, CI / CD, identity, and proprietary platforms) into Sentinel via native connectors, APIs, custom logs, and event hubs. Engineer detection content: write, test, and tune … queries that map to industry frameworks (MITRE ATT&CK). Build incident response playbooks and SOAR automation with Logic Apps to enrich, correlate, contain, notify, and ticket, reducing MTTD / MTTR and false positives. Run the incident lifecycle: triage, investigation, containment, eradication, recovery, lessons learned, and problem management with crisp communications to stakeholders and customers as needed. Establish and More ❯
Oxfordshire, England, United Kingdom Hybrid/Remote Options
Cathcart Technology
and lead technical and cultural change. You will:** Modernise and redesign the tech landscape** Strengthen security & compliance (ISO27001, ISO 27701, Cyber Essentials / Plus)** Partner with the Governance Manager on data governance** Ensure staff feel confident and supported with technology What You'll Ideally Bring: ** Proven IT Manager experience** Strong strategic thinking … opportunity. Please apply or contact Matthew MacAlpine at Cathcart Technology. Cathcart Technology is acting as an Employment Agency in relation to this vacancy. For more jobs please visit http: // jobs More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
certification and compliance. Hands-on experience implementing GDPR in software products. Working knowledge of PCI DSS and securing payment systems. Deep understanding of cloud security across Azure and / or AWS. Skilled in application security and the secure development lifecycle (SDLC). Experienced in incident response and cross-functional coordination. Confident supporting tenders and delivering client security assurance. Preferrable … as CISSP, CISM, CISA, or equivalent. Experience in or supporting the higher education sector. Strong understanding of multi-tenant SaaS security. Knowledge of DevSecOps and integrating security in CI / CD pipelines. Familiarity with NIST, CIS Controls, OWASP, and other security frameworks. Awareness of global data protection and multi-jurisdictional privacy requirements. Experience supporting enterprise sales cycles with security … pension contributions to help support your future. Two paid volunteering days annually for charity, community, or sustainability initiatives. Salary sacrifice schemes for electric vehicles and cycle-to-work. 24 / 7 Employee Assistance Programme offering confidential advice and wellbeing support. Annual health check to help you stay at your best. Flexible benefits platform with options including life assurance, learning More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria
can flex to meet your needs and training and development opportunities. What you'll be doing: Implement ISMS strategy, policies and practices for assigned clients. Deliver services aligned with ISO27001 standards Provide regular reporting on ISMS effectiveness and operational performance. Manage security operations in line with organisational policy, standards and industry best practice. Conduct security risk and threat assessments (operational … IT and process change assessments. Maintain ISMS, Operational Security and Risk Assurance documentation. Lead monthly client Security Working Group meetings and stakeholder sessions. Ensure audit readiness and support internal / external audits. Drive continuous improvement initiatives within Sopra Sterias security function. What youll bring: GRC / Operational Security Manager experience with solid understanding and experience with security policies … solutions and their integration and operation into business systems and processes Experience of security maturity and developing roadmaps aligned to the priorities of clients Experience of ISO/IEC27001 Compliance and Certification It would be great if you had: CISSP, CISA or CISM certified or equivalent degree in Information Security Experience of More ❯
available.The main purpose of this job mainly focusses on information security, cybersecurity, and data security from a Greenfield perspective.We are on a journey to secure Cyber Essentials plus and ISO27001 certification.You MUST have experience working with banking / financial services regulations, FCA, PRA etc.Liaison with the Head Office, Security Operation Centre or Data Centre for implementing security policies, procedures … with regulatory requirements, and conducting thorough security audits.You will be part of the IT committee and work closely with the risk and compliance team.Ideally, having a background in IT / Network security, progressing into information security and cybersecurity.**Key Responsibilities:**- Develop, draft, implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify … interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA / CCNP Hays Specialist Recruitment Limited More ❯
summaries Coordinate secure changes and maintenance windows with engineering teams Respond to security incidents and support root cause analysis and reporting Participate in the deployment of new applications and / or changes, ensuring that all service components are documented and monitored and integrated into the company’s operational processes. Work with stakeholders across the solutions lifecycle to ensure that … with technical stakeholders (including customers) on the delivery of hosted solutions. Experience & Qualifications Good experience in a hosting provider or managed service provider environment Strong working knowledge of ISO27001, ISO 27017, ISO 27018, and ISO 22301 Hands-on experience with scanning and vulnerability detection applications Hands-on experience of … domain and AD management experience Strong troubleshooting skills Strong scripting skills Enthusiasm and talent for acquiring complex technical skills Good customer service attitude Knowledge of configuration management (Puppet and / or Red Hat Satellite preferred) Scripting for automation using technologies (e.g. Powershell, Puppet, Ansible, Python) ITIL knowledge – principles and application Ability to support and develop junior colleagues More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Proactive Appointments
supplier and project security documentation, responding to security questionnaires and tenders, supporting incident investigations, and helping to maintain security posture and compliance with relevant standards (Cyber Essentials Plus, ISO27001, DSPT, GDPR, NCSC). This is a hands-on delivery role for someone who can work independently, make sound judgements, and communicate clearly with both technical … personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website http: // proactive.it / privacy-notice /More ❯
with regulatory requirements, and conducting thorough security audits.You will be part of the IT committee and work closely with the risk and compliance team.Ideally, having a background in IT / Network security, progressing into information security and cybersecurity. **Key Responsibilities:**- Develop, draft, implement, and maintain information security policies, procedures, and guidelines.- Conduct regular security audits and assessments to identify … vulnerabilities and ensure compliance with industry standards (e.g., ISO27001).- SIEM & Vulnerability Management.- Monitor and respond to security incidents, conducting investigations and implementing corrective actions.- Collaborate with IT and other departments to ensure the security of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of … interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert; MCITP-Microsoft Certified IT Professional; VMware Certified Professional;CCNA / CCNP Hays Specialist Recruitment Limited More ❯
SOC Analyst (Operational Technology) Outside IR35 Duration: 6 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and / or escalated events and alerts then, using experience combined with … and customer data are protected from cyber threats. Overview of role and responsibilities: Threat Hunting: Analyse intel and IOCs to find and remove hidden threats across UKPN's OT / IT environments. Policy: Create SOC policies, standards and procedures aligned with best practice. Logs: Ensure all logs feed into the SIEM and build use cases to detect anomalous activity. … reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2 / NCSC CAF /ISO27001 audits and ensure compliance. Continuous Improvement: Automate and enhance monitoring, detection and response based on evolving threats. Skills, experience and previous achievements required: Essential Extensive End to End Cyber Incident More ❯
SOC Analyst (Operational Technology) Outside IR35 Duration: 6 – 9 months Location: Crawley, Hybrid 2 days per week on site Overview of project: The role of an Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst is to respond to high-severity cyber security incidents and / or escalated events and alerts then, using experience combined with … and customer data are protected from cyber threats. Overview of role and responsibilities: Threat Hunting: Analyse intel and IOCs to find and remove hidden threats across UKPN's OT / IT environments. Policy: Create SOC policies, standards and procedures aligned with best practice. Logs: Ensure all logs feed into the SIEM and build use cases to detect anomalous activity. … reporting dashboards and key security metrics. Tooling: Support and maintain security tools and platforms for threat prevention, detection and response. Audit: Support SOC2 / NCSC CAF /ISO27001 audits and ensure compliance. Continuous Improvement: Automate and enhance monitoring, detection and response based on evolving threats. Skills, experience and previous achievements required: Essential Extensive End to End Cyber Incident More ❯
AWS, Nutanix, and on-prem . Key Responsibilities Define and deliver a 3-5 year cyber security strategy and roadmap Lead enterprise security governance and represent security at senior / board level Own policies, frameworks, compliance, DPIAs, and operating models Oversee incident response, vulnerability management, SOC integration, and threat monitoring Secure hybrid platforms (Azure, AWS, Nutanix, SD-WAN, Zero … days Strong GDPR & PCI audit outcomes Reduction in vulnerabilities and phishing incidents Improved audit ratings and team engagement What We're Looking For Senior leadership experience in cyber / security CISSP, CISM, CISA or equivalent Strong track record with ISO27001, NIST, PCI DSS, Cyber Essentials Plus Hands-on background across Azure, AWS, hybrid infrastructure … dependent upon your experience, qualifications and training. If you wish to apply, please read our Privacy Notice describing how we may process, disclose and store your personal data: gb / en / privacy-notice. More ❯
internal teams, consultants, partners, and customers. Use downtime effectively to practice installations, test upgrades, and explore new technologies. Maintain internal information management systems and follow company standards, including ISO 27001. Mentor junior team members and contribute to knowledge sharing across the team. ? Technical research to identify new ideas and ways of working, as well as presentations to team … Leading and contributing to technical discussions and planning Working as part of a team; mentoring and learning from others Maintaining and improving information management systems according to the ISO27001 standard Linux administration (Red Hat, Ubuntu): file systems, networking, LVM, backups, clustering, upgrades, installation, and scripting Windows Server administration and Microsoft enterprise software. Database management: DB2 … throughout the year. These have included visits to indoor electric go-karting, mini golf and driving ranges, escape rooms, and more. Check out some of our socials here: https: // responsiv.co.uk / social-events / Continuous ProfessionalDevelopment: Responsiv provide access to self-paced training, distance learning, and residential courses as appropriate to support your work. More ❯
ICT Infrastructure Supervisor - Redhill / Croydon Salary Range: £40,000 - £45,000 You will be supporting both Redhill and Croydon sites We are seeking an enthusiastic and experienced ICT Infrastructure Supervisor to join our dynamic in-house IT team. In this pivotal role, you’ll lead and support a skilled team responsible for maintaining and developing the organisation’s … or a related field (or equivalent experience) Experience working in an educational or similarly complex environment Ability to develop IT policies, procedures, and information security standards Understanding of ISO27001 principles Proven experience in strategic IT operations, project delivery, and service improvement Strong technical knowledge in: Microsoft Server Environments VMware SQL Networking Backup systems Due to … personal data very seriously. Any information provided to us will be processed as detailed in our Privacy Notice, a copy of which can be found on our website http: // proactive.it / privacy-notice /More ❯
Microsoft Entra ID and Active Directory Domain Services. Provide security requirements for Conditional Access, MFA, SSO, passwordless authentication, and identity governance, implemented by the IAM teams. Partner with IAM / Infrastructure teams to ensure privileged access (PIM), RBAC models, and least-privilege designs meet security requirements. Harden identity infrastructure including domain controllers, authentication protocols (Kerberos / NTLM), secure … LDAP, and hybrid identity components. Monitor identity-related security signals (Identity Protection, risky users / sign-ins) and support investigation of identity-based attacks. Validate secure delegation models, access review processes, and identity lifecycle controls defined by IAM. Threat Detection, Monitoring & Incident Response Own and operate SIEM and SOAR tooling, including Microsoft Sentinel, Defender XDR, Identity Protection, and threat … security tools. Produce incident reports, RCA documentation, and post-incident improvement plans. Coordinate with SOC teams or third-party providers when required. Endpoint, Server, and Infrastructure Security Implement CIS / NIST-aligned hardening across Windows Server, domain controllers, virtual machines, and Azure workloads. Deploy and manage endpoint protection and EDR platforms (e.g., Microsoft Defender for Endpoint). Enforce secure More ❯
Chandler's Ford, Eastleigh, Hampshire, England, United Kingdom
Hartley Resourcing
to the Head of IT on service compliance, health and technical risks Champion best practice across service delivery, patch management and system resilience Contribute directly to the ongoing ISO27001 certification and Cyber Essentials Plus compliance Act as deputy to the Head of IT, maintaining continuity of leadership Some specific tasks include: Operational leadership – ie lead … the following in the successful candidate: Solid, progressive experience in IT operations or Service delivery in a 200-500 user Organisation. Hands on experience with Microsoft 365, Azure AD / Entra ID and Intune endpoint management (or very close experience to this) Understanding of networking fundamentals, patch management and system monitoring. Practical knowledge of ITIL principles Confident in coaching … / mentoring / motivating others. In terms of personal attributes, it’s important you are methodical, calm and able to make decisions, work independently and take ownership. The team and company are super nice, so you need to be a decent, ethical person who works well in a team. Additional Information Salary is dependent upon experience. This is More ❯
technical cyber security environment and wider information security management piece for the business. This role is responsible for ensuring robust cyber security controls with a strong emphasis on ISO27001 readiness. You'll liaise with assessors and internal teams … drive ISO-related strategies and use prior experience to ensure certification plans stay on track. Working with external teams to align processes, you'll also oversee InfoSec / Cyber services, conduct risk assessments and recommend security improvements. … Responsibilities: Ownership and maintenance of all security related policies and procedures, implementing Security by Design and driving a culture of cyber security awareness in the business Liaise with external ISO27001 assessors and internal teams to ensure smooth assessments Actively contribute to ISO processes, strategies and problem-solving Use prior ISO experience to support certification readiness Working More ❯
handling of goods-in, order picking, returns processing, and inventory control. This role manages staff performance, drives continuous improvement of warehouse processes, and ensures compliance with Hamilton Rentals ISO standards. The Warehouse Manager supports the wider business through collaboration with other department heads and plays a key role in maintaining operational effectiveness, safety, and customer service quality Responsibilities … warehouse plant. Develop and implement process improvements to maximise warehouse efficiency. Ensure daily checks are completed for all warehouse equipment (e.g., forklifts, lifting aids). Support compliance with ISO 9001, ISO 14001, ISO 45001, and ISO27001 standards. Coordinate with the Stock Auditor to ensure timely completion of audit tasks … collaboratively with other department leads to align procedures and resolve operational issues. Requirements: Strong Leadership Skills Experience managing warehouse operations within a technical or rental environment. Familiarity with IT / AV products and their logistical handling. Experience with rental systems or warehouse management systems (e.g. RMS). Strong understanding of ISO standards, especially 9001, 14001, 45001, and More ❯