responsibilities throughout the project life cycle, collaborating with a broad spectrum of clients and pioneering technologies. Your tasks may encompass offering valuable insights on informationassurance matters, contributing to the formulation of IA strategies, policies, guidance, and awareness initiatives, orchestrating and overseeing security work programs, defining rigorous security … requirements, devising and implementing robust security architectures, and supervising the secure development and accreditation of information systems. Career Development: You'll specialise in applying your informationassurance and cyber security expertise to address diverse business challenges. Throughout your journey, you'll have the invaluable guidance of a … your security expertise in support of significant system procurements and Agile programs, ensuring the secure delivery of solutions Leading at identifying, analysing, and evaluating information risks across various programs, projects, and systems Communicating with risk owners and stakeholders to elucidate the origins, likelihood, and potential business impacts of informationMore ❯
646pa About the Job The main duties and responsibilities of this role are: Developing organisational policies, standards, and guidelines for information and records management, ensuring that the information required to support the organisation is defined Devising information and records management processes and planning and leading activities to … communicate and implement information management strategies and policies. Leading the council's efforts to protect its information systems and data from cyber threats, selecting, adopting, and adapting information security control frameworks, and designing, justifying, and implementing security management strategies. Developing, implementing, and monitoring organisational policies and processes … to maintain assurance in relation to the availability, integrity, authenticity, confidentiality, and non-repudiation of the organisation's records. Ensuring all staff are trained in information governance and security best practices and understand their roles in maintaining security and privacy. Monitoring the council's networks for security breaches More ❯
Information Security Officer – Cybersecurity - Banking Excellent opportunity opens for an Information Security Officer/Information Security Assurance Officer with Financial Services experience to join a London based bank’s team, helping to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring … the smooth operation of the Bank. Key Responsibilities: Collaborate with Information Security Engineering and Operations Teams to integrate security measures into business processes. Advise business units on security-related issues and initiatives. Oversee Second Line project activities to evaluate information security risks for new projects, products, systems, and … other significant changes within the bank. Supervise the resolution of risks and issues identified during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/Cyber Security Awareness training, educating staff on best practices. Maintain More ❯
Information Security Officer – Cybersecurity - Banking Excellent opportunity opens for an Information Security Officer/Information Security Assurance Officer with Financial Services experience to join a London based bank’s team, helping to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring … the smooth operation of the Bank. Key Responsibilities: Collaborate with Information Security Engineering and Operations Teams to integrate security measures into business processes. Advise business units on security-related issues and initiatives. Oversee Second Line project activities to evaluate information security risks for new projects, products, systems, and … other significant changes within the bank. Supervise the resolution of risks and issues identified during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/Cyber Security Awareness training, educating staff on best practices. Maintain More ❯
Information Security Officer – Cybersecurity - Banking Excellent opportunity opens for an Information Security Officer/Information Security Assurance Officer with Financial Services experience to join a London based bank’s team, helping to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring … the smooth operation of the Bank. Key Responsibilities: Collaborate with Information Security Engineering and Operations Teams to integrate security measures into business processes. Advise business units on security-related issues and initiatives. Oversee Second Line project activities to evaluate information security risks for new projects, products, systems, and … other significant changes within the bank. Supervise the resolution of risks and issues identified during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/Cyber Security Awareness training, educating staff on best practices. Maintain More ❯
Information Security Officer – Cybersecurity - Banking Excellent opportunity opens for an Information Security Officer/Information Security Assurance Officer with Financial Services experience to join a London based bank’s team, helping to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring … the smooth operation of the Bank. Key Responsibilities: Collaborate with Information Security Engineering and Operations Teams to integrate security measures into business processes. Advise business units on security-related issues and initiatives. Oversee Second Line project activities to evaluate information security risks for new projects, products, systems, and … other significant changes within the bank. Supervise the resolution of risks and issues identified during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/Cyber Security Awareness training, educating staff on best practices. Maintain More ❯
Time Reference: DDQAI Contract details: Fixed Term until May 2027 - Minimum 14 hours per week Interview date: 4th & 5th June 2025 Data & Digital Quality Assurance Lead Corporate Resources and Business Improvement The Corporate Resources and Business Improvement directorateis led by Executive Director, Dianne Tranmer. It's responsible for:People … Function, Business Improvement, Facilities Management, Digital Experience Unit, Technology Group, Information Governance, Executive Support Team, and leadership of all our shared services across the GLA Group. About the role The post holder will be responsible for: Planning, conducting reviews and assessments of the GLA's data, information and … both external and GLA's policies and standards Preparing detailed risk assessments; reporting findings and producing recommendations. Giving expert advisory and oversight guidance, supporting assurance activities. Building stakeholder and collaboration within the organisation as well as with partners and suppliers. Demonstrating leadership by assessing relevant risks and making informed More ❯
Information Security Officer - Banking London Permanent MUST HAVE PREVIOUS BANKING EXPERIENCE TO BE CONSIDERED Job purpose The Information Security Officer works within the Information Security Office of the Bank to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring the smooth operation … of the Bank. Where improvements are needed, the ISO will contribute to the Information/Cyber Security Strategy and Roadmap, enabling both defence-in-depth and, where appropriate, defence-in- breadth to safeguard normal banking operations. The ISO will collaborate closely with Security Engineering, Security Operations, and Business Resilience … security operating flaws. It ensures that Executive Management's risk targets are met and contributes to the continual improvement of the Bank's Cyber Assurance Framework, enhancing the control measures that defend the Bank. Key Responsibilities Collaborate with Information SecurityEngineering and Operations Teams to integrate security measures into More ❯
Information Security Officer - Banking London Permanent MUST HAVE PREVIOUS BANKING EXPERIENCE TO BE CONSIDERED Job purpose The Information Security Officer works within the Information Security Office of the Bank to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring the smooth operation … of the Bank. Where improvements are needed, the ISO will contribute to the Information/Cyber Security Strategy and Roadmap, enabling both defence-in-depth and, where appropriate, defence-in- breadth to safeguard normal banking operations. The ISO will collaborate closely with Security Engineering, Security Operations, and Business Resilience … security operating flaws. It ensures that Executive Management's risk targets are met and contributes to the continual improvement of the Bank's Cyber Assurance Framework, enhancing the control measures that defend the Bank. Key Responsibilities Collaborate with Information SecurityEngineering and Operations Teams to integrate security measures into More ❯
Information Security Officer - Banking London Permanent MUST HAVE PREVIOUS BANKING EXPERIENCE TO BE CONSIDERED Job purpose The Information Security Officer works within the Information Security Office of the Bank to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring the smooth operation … of the Bank. Where improvements are needed, the ISO will contribute to the Information/Cyber Security Strategy and Roadmap, enabling both defence-in-depth and, where appropriate, defence-in- breadth to safeguard normal banking operations. The ISO will collaborate closely with Security Engineering, Security Operations, and Business Resilience … security operating flaws. It ensures that Executive Management's risk targets are met and contributes to the continual improvement of the Bank's Cyber Assurance Framework, enhancing the control measures that defend the Bank. Key Responsibilities Collaborate with Information SecurityEngineering and Operations Teams to integrate security measures into More ❯
time. Locations: London, Guildford, Bristol. M4 corridor Roles and Responsibilities Working as part of an Actica team, your consultancy assignments could include: Providing technical assurance that proposed solutions are fit for purpose; Developing new architectures that mitigate the risks posed by new technologies and business practices; Providing advice to … customers on InformationAssurance and architectural problems and risks; Supporting the development of Risk Management Accreditation Document Sets (RMADS); Scoping security testing activities, and explaining the findings and required remedial actions to project stakeholders; Investigating security incidents; Promoting security awareness within project teams, and within the company; Conducting … Cyber Security Risk Assessments; Providing Assurance of cyber security management controls and processes. Amongst other things you will gain experience in a manner that will provide the right level of support and challenge to ease the transition from an academic environment, whilst enabling you to make a positive contribution More ❯
frameworks in conformity to NIST SP 800-171 and NIST SP 800-160 . Creating an ecosystem of practices and preparing incremental improvements. Creating information security requirements, classifying information sensitivity, and implementing information security architecture requirements. WHAT ARE WE LOOKING FOR: Executive level experience in the spectrum … proven leader with experience in edge protection strategies. Extensive experience in threat categories. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilizing necessary equipment to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization regulatory engineering division: MULTIDOMAIN DEFENCE … large data sets. Highly analytical individual with strong problem-solving skills and keen attention to details. Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) Certified Information Security Manager (CISM) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking More ❯
Information Security Officer - Banking London Permanent MUST HAVE PREVIOUS BANKING EXPERIENCE TO BE CONSIDERED Job purpose The Information Security Officer works within the Information Security Office of the Bank to ensure all information and cyber risks are identified, analysed, mitigated, and monitored, ensuring the smooth operation … of the Bank. Where improvements are needed, the ISO will contribute to the Information/Cyber Security Strategy and Roadmap, enabling both defence-in-depth and, where appropriate, defence-in- breadth to safeguard normal banking operations. The ISO will collaborate closely with Security Engineering, Security Operations, and Business Resilience … security operating flaws. It ensures that Executive Management's risk targets are met and contributes to the continual improvement of the Bank's Cyber Assurance Framework, enhancing the control measures that defend the Bank. Key Responsibilities Collaborate with Information SecurityEngineering and Operations Teams to integrate security measures into More ❯
with internal business objectives, industry good practices (including Secure by Design aligned to UK Government principles), and regulatory requirements (including GovAssure and NCSC Cyber Assurance Framework). What you'll be doing: Develop and execute GRC strategies that align with business objectives and support business processes. Drive pragmatic and … applying agile methodologies to adapt to new regulations, compliance requirements, and business changes. Advise on and foster continuous improvement of GRC processes, improving management information for better prioritization and risk-based decisions. Lead initiatives that build a culture of accountability and responsibility across engagements. Enhance governance processes and advise … Secure by Design). Provide security expertise across standards and accreditations, measure and control the effectiveness of the security controls framework, and maintain the Information Security Management System. Develop and deliver documented Information Security Management Plans, incorporating regulatory, legal, and compliance considerations. Assist in identifying risks, emerging cybersecurity More ❯
depth knowledge of cybersecurity compliance standards such as ISO, SOC, NIST, CMMC, EDRS, and ITAR. Certifications in (ISACA, CISM, CRISC, CISA, ITCA) . Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) . Information Systems Security Architecture Professional (ISSAP) . GIAC Security Leadership Certificate (GSLC) . … Information Systems Security Engineering Professional (ISSEP) . Informationassurance system architecture and engineer (IASAE) . It's a prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ASSESSMENT SCREENING: WITH A 30+ YEAR EXPERIENCE PSYCHOLOGIST: STAGE 2: PRE-SCREENING More ❯
evaluating the secure high-level and low-level design of major products, services, and complex solutions Experience guiding effective decisions on risks, based on informationassurance risk assessment methodology Proficiency in applying security concepts to a technical level, including working with security tools, network security infrastructure technologies and … information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level Desirable skills: Knowledge of Secure by Design principles Experience with penetration … location and technical skills as assessed at interview. London based range: £63,248 to £79,133 National range: £59,634 to £75,618. Additional information: Hybrid working includes 40% in-office working (typically 2 days/week) This role requires SC clearance, a condition of which is to have More ❯
startup enhancing the formation to the early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization ROCKET FUEL MISSION INTELLIGENCE DIVISION … in C++ experience in an embedded environment is essential. Extensive experience in computer aided design CAD -and computer aided engineering CAE is essential. Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP) Informationassurance system architecture and engineer (IASAE) Information Systems Security Engineering Professional … ISSEP) Information Systems Security Architecture Professional (ISSAP) is essential. It's prerequisite to be certified one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 3: PRE-SCREENING (verification checks & DV security clearance) STAGE More ❯
statutory regulations governing the operation of the gateway system must be complied with. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization: ROCKET FUEL MISSION INTELLIGENCE DIVISION … lifecycle. Proven project leadership on complex software architectures and end-to-end development, including cross-functional collaboration in the USA, UK, and Europe. Certified Information Systems Security Professional (CISSP). Certified Cloud Security Professional (CCSP). Informationassurance system architecture and engineer (IASAE). Information Systems … Security Engineering Professional (ISSEP). Information Systems Security Architecture Professional (ISSAP) is essential. It's prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 3: PRE-SCREENING (verification More ❯
the design and iterate through the design cycle capturing the changes getting real-time feedback from very high levels of details. Generate detailed design information, hand that over to the procurement teams within the platform, collaborating with each other, interacting with all the participants engineers, manufacturing pipeline that will … experience. Extensive experience in computer aided design CAD -and computer aided engineering CAE is essential. Extensive experience with Optical communications and laser communications. Certified Information Systems Security Professional (CISSP) . Certified Cloud Security Professional (CCSP) . Informationassurance system architecture and engineer (IASAE) . Information Systems … Security Engineering Professional (ISSEP) . Information Systems Security Architecture Professional (ISSAP) is essential. It's prerequisite to be certified one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 3: PRE-SCREENING (verification checks More ❯
upskill other members of the team to establish a lasting and functioning capability.● Help public sector bodies understand, assess and act on the vulnerability information they receive. Help public sector bodies plan and prioritise how vulnerabilities are addressed to meet organisational objectives, using a risk-based approach. Help public … other members of the team. Professional qualifications/accreditations, Such as: Certified Cyber Professional (CCP), CREST Registered Technical Security Architect, BCS Practitioner Certificate in InformationAssurance Architecture, ISC(2) Information Systems Security Architecture Professional, ISO27001 Lead Implementer. More ❯
upskill other members of the team to establish a lasting and functioning capability.● Help public sector bodies understand, assess and act on the vulnerability information they receive. Help public sector bodies plan and prioritise how vulnerabilities are addressed to meet organisational objectives, using a risk-based approach. Help public … other members of the team. Professional qualifications/accreditations, Such as: Certified Cyber Professional (CCP), CREST Registered Technical Security Architect, BCS Practitioner Certificate in InformationAssurance Architecture, ISC(2) Information Systems Security Architecture Professional, ISO27001 Lead Implementer. More ❯
upskill other members of the team to establish a lasting and functioning capability.● Help public sector bodies understand, assess and act on the vulnerability information they receive. Help public sector bodies plan and prioritise how vulnerabilities are addressed to meet organisational objectives, using a risk-based approach. Help public … other members of the team. Professional qualifications/accreditations, Such as: Certified Cyber Professional (CCP), CREST Registered Technical Security Architect, BCS Practitioner Certificate in InformationAssurance Architecture, ISC(2) Information Systems Security Architecture Professional, ISO27001 Lead Implementer. More ❯
upskill other members of the team to establish a lasting and functioning capability.● Help public sector bodies understand, assess and act on the vulnerability information they receive. Help public sector bodies plan and prioritise how vulnerabilities are addressed to meet organisational objectives, using a risk-based approach. Help public … other members of the team. Professional qualifications/accreditations, Such as: Certified Cyber Professional (CCP), CREST Registered Technical Security Architect, BCS Practitioner Certificate in InformationAssurance Architecture, ISC(2) Information Systems Security Architecture Professional, ISO27001 Lead Implementer. More ❯
We are a startup enhancing the early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information and utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization: ROCKET FUEL MISSION INTELLIGENCE … or hardware control. JTAG Boundary Scan Testing. PCB Design Experience via Altium. FPGA and Embedded Design Experience. Experience in multi-core embedded controllers. Certified Information Systems Security Professional (CISSP) . Certified Cloud Security Professional (CCSP) . Informationassurance system architecture and engineer (IASAE) . Information Systems … Security Engineering Professional (ISSEP) . Information Systems Security Architecture Professional (ISSAP) is essential. It's a prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING WITH A 30+ YEARS EXPERIENCE PSYCHOLOGIST STAGE 3: PRE More ❯
a startup enhancing the formation of early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization ROCKET FUEL MISSION INTELLIGENCE DIVISION … other disciplines such as Mechanics, AOCS , Propulsion, AIT and Optical ground station terminal operations. Preferably a degree in Hardware engineering design and physics. Certified Information Systems Security Professional (CISSP) . Certified Cloud Security Professional (CCSP) . Informationassurance system architecture and engineer (IASAE) . Information Systems … Security Engineering Professional (ISSEP) . Information Systems Security Architecture Professional (ISSAP) is essential. It's a prerequisite to be certified one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 2: PRE-SCREENING (verification checks & eDV security clearance) STAGE More ❯