Responsibilities Plan, coordinate and support the ongoing maintenance and improvement of the InformationSecurity Management System. Maintain and improve the framework of informationsecurity policies, standards, processes and procedures. Gather and report on informationsecurity Key Risk Indicators and Key Performance Indicators. Collaborate and prepare content for informationsecurity governance groups. Support … risk assessment and control improvement activity. Support tracking and delivery of informationsecurity activities, including projects, cases, assurance actions, and stakeholder due diligence requests. Requirements Experience of working within a corporate environment. Demonstrable knowledge of an InformationSecurity Management System. Strong understanding of the ISO 27001 standard. Established knowledge of informationsecurity risk management. … Familiar with informationsecurity control frameworks. Implementing and/or maintaining an InformationSecurity Management System to a recognised security standard. Reviewing policies, standards, processes and procedures. Producing presentations and reports. Personal Strong organisational skills, preferably with project management experience. Strong verbal and written communication skills. Strong presentation skills and an ability to articulate complex More ❯
InformationSecurity Compliance Analyst Are you passionate about informationsecurity and data privacy, and looking for a role where you can make an immediate impact? We’re working with a leading global law firm seeking a InformationSecurity Compliance Analyst to join their Technology Compliance & InformationSecurity team on a … you’ll be doing: Supporting the maintenance of ISO27001 ISMS certification Coordinating internal and external audits, including evidence collation and remediation tracking Aligning data privacy policies and processes with security standards Managing client and supplier informationsecurity reviews, questionnaires, and audits Acting as a point of escalation for informationsecurity and data privacy queries Supporting … the implementation of systems to meet information and data privacy objectives What we’re looking for: At least 3 years’ experience with ISO27001 certification Solid understanding of informationsecurity and data privacy frameworks (ISO27001, NIST, ISO27701) Experience in risk management processes Strong organisational and documentation skills, with the ability to manage multiple projects Clear communicator, able to More ❯
Job purpose: The securityanalyst will join a small security team for one of our clients in Central London. you will be a subject matter expert on all aspects of security to include mail security, web security, infrastructure security and end user device security. The securityanalyst plays a key role … in driving and improving and technology security at the organisation, providing expert advice and reliable guidance to a broad range of colleagues and stakeholders to achieve this. Key Accountabilities: • Proactively assess device and application logs for security vulnerabilities, as well as investigate causes and ultimately resolve or mitigate those vulnerabilities • Lead and investigate security breaches and cyber … incidents, providing timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of securityMore ❯
Job purpose: The securityanalyst will join a small security team for one of our clients in Central London. you will be a subject matter expert on all aspects of security to include mail security, web security, infrastructure security and end user device security. The securityanalyst plays a key role … in driving and improving and technology security at the organisation, providing expert advice and reliable guidance to a broad range of colleagues and stakeholders to achieve this. Key Accountabilities: • Proactively assess device and application logs for security vulnerabilities, as well as investigate causes and ultimately resolve or mitigate those vulnerabilities • Lead and investigate security breaches and cyber … incidents, providing timely resolution to agreed service level agreements/expectations • Install Security updates/measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of securityMore ❯