Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
science, management information systems, or a relevant field, or equivalent demonstrable experience. 5+ years' of experience in Information Security or Information Technology 3+ years' experience performing ITAudit or security control testing. Knowledge of internal audit methodologies, including risk assessment, execution, and reporting. Proficiency in industry standards and frameworks (e.g., NIST 800-53, ISO 27001/… working together. We believe that diversity, equity and inclusion is necessary to our purpose of creating a better tomorrow. For us, this is The Power of YOU and it ensures that we live what we believe. More ❯
computer science, management information systems, relevant field, or equivalent demonstrable experience. 3+ year's experience leading a team of control assessors. 8+ years of experience performing ITAudit or Information Security control assessments, with specific experience in testing cloud security controls. Professional certification such as CISA, CISM, CISSP, ISO 27001 Lead Auditor, or equivalent. Knowledge of industry More ❯
Grant Thornton is one of the world’s leading professional services networks with member firms in 150 markets, 76,000 people and global revenues of $8bn. Member firms offer audit, tax, and advisory services to privately owned companies, publicly listed companies, public sector and not for profit organisations, both domestically and internationally. Grant Thornton International Ltd (GTIL) is the … The ideal candidate will have experience evaluating IT Infrastructure Security technologies, IT general computer controls, industry frameworks (e.g. NIST) and will bring strong information technology audit or security consulting experience to the programme. Location United Kingdom/Europe Main responsibilities The Senior Associate will support with the implementation of the cybersecurity compliance programme, including: Collaboration … with IT assurance engagement teams across the GT network Review of data and evidence obtained in the field, including reviews for completeness, consistency and clarity. Evaluate cybersecurity risks and advise on risk mitigation activities. Engagement with compliance colleagues, Technology and Business leaders, including the delivery of reporting material and presentations. Tracking and coordination of follow up remediation cycles More ❯