Exeter, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (Security Operations/SOC), exeter col-narrow-left Client: Location: exeter, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (Security Operations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Plymouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (Security Operations/SOC), plymouth col-narrow-left Client: Location: plymouth, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (Security Operations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
in the workplace, home, insurance and wealth areas. Joining us means helping create brighter financial futures for all our customers. Job Description We have an incredible opportunity for an InformationSecurity Analyst to join us in Cardiff, Hove or Solihull! You'll play a key role in providing the technology expertise required to implement and support the information and cyber security strategy, policy and standards in our Retail division. Working in close collaboration with risk, audit, and technology teams, you'll reduce and mitigate InformationSecurity risks according to an agreed risk appetite. Perhaps you come from a technical background and you're looking for a move into governance? If so, this could be … the ideal opportunity for you! What you'll be doing: Supporting the InformationSecurity Manager and other key stakeholders in securing the information assets of the UK Protection business Providing technical security consultancy to internal projects and key system enhancements, ensuring IT security best practice is adhered to and that key company projects are compliant More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Bowerford Associates
to promote the use of technology throughout the business. In this role you will be responsible for the following: Designing and deploying network services in line with design and security policies. Monitoring and administering the installation and integration of corporate network communications, including routers, switches, firewalls, DMZ, servers, telephony and LAN/WAN communication services. Managing the IP space … testing failover of critical operational services. Researching latest networking developments and recommend any actions that will improve network performance and security. Work closely with NIBE SOC Teams and internal Security Engineers to ensure all preventative security measures are implemented. Ensuring all network hardware assets are identifiable and updated in the asset management system. Providing technical support to the … including network schematics, of all relevant systems. Assisting with the build, deployment and administration of desktop, mobile and peripheral hardware equipment. Administration of MS Windows Active Directory including profiles, Security Groups and Group Policies. Assist with the management of multiple firewall hardware and security policies. Person Specification A computer related degree or relevant professional certification and accreditation is More ❯
to promote the use of technology throughout the business. In this role you will be responsible for the following: Designing and deploying network services in line with design and security policies. Monitoring and administering the installation and integration of corporate network communications, including routers, switches, firewalls, DMZ, servers, telephony and LAN/WAN communication services. Managing the IP space … testing failover of critical operational services. Researching latest networking developments and recommend any actions that will improve network performance and security. Work closely with NIBE SOC Teams and internal Security Engineers to ensure all preventative security measures are implemented. Ensuring all network hardware assets are identifiable and updated in the asset management system. Providing technical support to the … including network schematics, of all relevant systems. Assisting with the build, deployment and administration of desktop, mobile and peripheral hardware equipment. Administration of MS Windows Active Directory including profiles, Security Groups and Group Policies. Assist with the management of multiple firewall hardware and security policies. Person Specification A computer related degree or relevant professional certification and accreditation is More ❯
Exeter, England, United Kingdom Hybrid / WFH Options
TieTalent
to promote the use of technology throughout the business. In this role you will be responsible for the following: Designing and deploying network services in line with design and security policies.Monitoring and administering the installation and integration of corporate network communications, including routers, switches, firewalls, DMZ, servers, telephony and LAN/WAN communication services.Managing the IP space across the … Planning and testing failover of critical operational services.Researching latest networking developments and recommend any actions that will improve network performance and security.Work closely with NIBE SOC Teams and internal Security Engineers to ensure all preventative security measures are implemented.Ensuring all network hardware assets are identifiable and updated in the asset management system.Providing technical support to the maintenance of … technical documentation, including network schematics, of all relevant systems.Assisting with the build, deployment and administration of desktop, mobile and peripheral hardware equipment.Administration of MS Windows Active Directory including profiles, Security Groups and Group Policies.Assist with the management of multiple firewall hardware and security policies. Person Specification A computer related degree or relevant professional certification and accreditation is preferred.Experience More ❯
Kingdom, and Australia. Together, they will deliver a unique 24/7 all-weather capability, tracking objects in geosynchronous orbit - a testament to Northrop Grumman's commitment to enhancing security and safety in deep space on a global scale. Your Role The Information Systems Security Officer (ISSO) is responsible for the day-to-day onsite execution of … the Systems Security Engineering activities required for the ongoing maintenance and uplift of the cybersecurity posture within the project. This spans systems, subsystems, products and external interfaces, and may include a mixture of operational cybersecurity functions and governance, risk and compliance (GRC) activities. Key responsibilities include: Perform systems security risk management activities, including identifying security threats, analysing … the risk exposure and presenting treatment options to mitigate security risk. Conduct asset management including maintaining accurate inventories of all hardware and software configuration items. Maintain change management, through evaluation of system changes for cybersecurity impact and updating any affected security authorisation artefacts. Perform vulnerability management, including conducting automated vulnerability scans, using the provided toolset, to identify any More ❯
Social network you want to login/join with: Security Data Loss Prevention DLP Engineer, plymouth col-narrow-left Client: Harrington Starr Location: plymouth, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 2 Posted: 31.05.2025 Expiry Date: 15.07.2025 col-wide Job Description: Data Loss Prevention/DLP/Insider Threat Analyst required … by Harrington Starr’s global client to play a key role in their Cyber Security Engineering team. The role will play a key role in protecting the organisation from exposure to data loss/theft. Key accountabilities will include: Developing and administering DLP policies Perform analysis and triage of DLP violations Play an integral role in any cyber incidents … with a DLP focus Working with the Security Operations and Engineering teams on DLP strategy Provide reporting on DLP incidents Developing Firmwide strategy for Data Loss Prevention Regular usage of DLP tools such as Microsoft Purview In order to be suitable, you will need: Experience in a dedicated DLP role or a cyber security role with a heavy More ❯
Social network you want to login/join with: Security Data Loss Prevention DLP Engineer, exeter col-narrow-left Client: Harrington Starr Location: exeter, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 3 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Data Loss Prevention/DLP/Insider Threat Analyst required … by Harrington Starr’s global client to play a key role in their Cyber Security Engineering team. The role will play a key role in protecting the organisation from exposure to data loss/theft. Key accountabilities will include: Developing and administering DLP policies Perform analysis and triage of DLP violations Play an integral role in any cyber incidents … with a DLP focus Working with the Security Operations and Engineering teams on DLP strategy Provide reporting on DLP incidents Developing Firmwide strategy for Data Loss Prevention Regular usage of DLP tools such as Microsoft Purview In order to be suitable, you will need: Experience in a dedicated DLP role or a cyber security role with a heavy More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Womble Bond Dickinson (UK) LLP
to maintain a cutting-edge offering. Ownership: Acting as the application owner for all of our legal technology applications. Compliance: ensuring that our legal technology applications comply with our informationsecurity requirements and that such compliance is appropriately documented. So what are we looking for? To excel in this role, a growth mindset is essential. This involves a … feedback to find effective solutions and drive improvements. Strong problem-solving skills and attention to detail are necessary. Excellent verbal and written communication skills are required to convey technical information to non-technical stakeholders, build compelling business cases, and effectively negotiate contracts. Additionally, strong project management skills are needed to manage multiple projects simultaneously, with familiarity in agile methodologies … strong interpersonal skills are essential for working collaboratively across teams. To be successful for the role you must have: A combination of relevant experience and/or qualifications in information technology, computer science, project management, or law. Strong project management skills with the ability to manage multiple projects simultaneously. Solid understanding of legal technology tools and platforms. Proficiency in More ❯
abilities, and excellent communication skills to efficiently manage and resolve complex issues. By continually enhancing their skills and collaborating with other IT professionals, they ensure the robust functionality and security of the organisation's IT infrastructure. Utilise ITIL-aligned support management processes and tools to log and categorise incidents, assess their impact, and assign appropriate priority levels according to … implementing opportunities for process improvement and optimisation of service delivery Provide comprehensive Identity Management support services, ensuring all PC access requests are processed accurately and in line with agreed InformationSecurity practices and processes, providing regular audit assurances Escalate complex incidents and service requests to appropriate internal IT teams (2nd and 3rd line) for resolution, ensuring thorough documentation More ❯
Social network you want to login/join with: Head of InformationSecurity – UK remote - £90,000 - £120,000 Our client, a leading technology innovator, is looking for an experienced InformationSecurity leader … to shape and drive their security strategy. As the Head of InformationSecurity, you will be responsible for overseeing the development and implementation of an improved InfoSec strategy. You will work closely with the CISO to align security processes, policies, and procedures with compliance requirements and emerging security standards. Main responsibilities Lead the InformationSecurity function, setting a clear vision for strategy, governance, and risk management. Develop and implement security policies, standards, and guidelines that align with industry best practices and regulatory requirements. Partner with the CISO to assess current security posture and drive necessary improvements to achieve compliance with new standards. Collaborate with IT and engineering teams to ensure More ❯
Social network you want to login/join with: Head of InformationSecurity – UK remote - £90,000 - £120,000 Our client, a leading technology innovator, is looking for an experienced InformationSecurity leader … to shape and drive their security strategy. As the Head of InformationSecurity, you will be responsible for overseeing the development and implementation of an improved InfoSec strategy. You will work closely with the CISO to align security processes, policies, and procedures with compliance requirements and emerging security standards. Main responsibilities Lead the InformationSecurity function, setting a clear vision for strategy, governance, and risk management. Develop and implement security policies, standards, and guidelines that align with industry best practices and regulatory requirements. Partner with the CISO to assess current security posture and drive necessary improvements to achieve compliance with new standards. Collaborate with IT and engineering teams to ensure More ❯
Plymouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
tracking against key product metrics • Preparing and presenting reports as needed on product roadmap, budgets, and performance for senior management. PROCESSES • Accurate record-keeping and administration. • Adhere to Idox InformationSecurity & Management System Policies. To be successful you will need: • Proven experience in a similar senior technical role • To understand the importance of digital asset management and metadata … practice with a long-term focus for regulated environments. Through the automation of tasks, the simplification of complex operations, finding scalability as operations evolve, and more effective management of information, we help our customers harness the power of Digital, so they can do more. We employ around 700 staff in the UK and worldwide, including Europe, North America and … salary expectation, and current remuneration) explaining why you feel you would be suited to this role. Please note successful applicants will need to satisfy the BPSS guidelines (Baseline Personnel Security Standards) which consist of the receipt of satisfactory references covering the last 3 years of employment; an identity check; verification of eligibility to work in the UK; and a More ❯
Exeter, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
tracking against key product metrics • Preparing and presenting reports as needed on product roadmap, budgets, and performance for senior management. PROCESSES • Accurate record-keeping and administration. • Adhere to Idox InformationSecurity & Management System Policies. To be successful you will need: • Proven experience in a similar senior technical role • To understand the importance of digital asset management and metadata … practice with a long-term focus for regulated environments. Through the automation of tasks, the simplification of complex operations, finding scalability as operations evolve, and more effective management of information, we help our customers harness the power of Digital, so they can do more. We employ around 700 staff in the UK and worldwide, including Europe, North America and … salary expectation, and current remuneration) explaining why you feel you would be suited to this role. Please note successful applicants will need to satisfy the BPSS guidelines (Baseline Personnel Security Standards) which consist of the receipt of satisfactory references covering the last 3 years of employment; an identity check; verification of eligibility to work in the UK; and a More ❯
effort estimation Escalating project risks when needed and supporting mitigation planning Promoting a culture of continuous improvement across processes and documentation standards Ensuring all activity is aligned with our InformationSecurity Management Systems (ISMS) Who you are: You’re someone who brings clarity to complexity. You know how to make sense of technical detail and communicate it in More ❯
effort estimation Escalating project risks when needed and supporting mitigation planning Promoting a culture of continuous improvement across processes and documentation standards Ensuring all activity is aligned with our InformationSecurity Management Systems (ISMS) Who you are: You’re someone who brings clarity to complexity. You know how to make sense of technical detail and communicate it in More ❯
Plymouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
protection impact assessments (DPIAs) under supervision. Monitor and document data flows and assist in mapping personal data across systems and services. Collaborate with cross-functional teams (e.g., Product, Engineering, InfoSec) to gather information for privacy reviews. Support the implementation and maintenance of privacy policies, procedures, and training materials. Assist with privacy-related audits and internal reporting using tools such More ❯
Exeter, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
protection impact assessments (DPIAs) under supervision. Monitor and document data flows and assist in mapping personal data across systems and services. Collaborate with cross-functional teams (e.g., Product, Engineering, InfoSec) to gather information for privacy reviews. Support the implementation and maintenance of privacy policies, procedures, and training materials. Assist with privacy-related audits and internal reporting using tools such More ❯
the scoping of penetration tests and the analysis of the findings, to be fed into the product roadmap (aligned to the group remediation schedule) Support the Compliance team on informationsecurity assessments, coordinating with the Development team and other technical stakeholders to provide guidance on answers We are looking for: In-depth knowledge of C# on both .NET … Expert level proficiency with test automation and test automation frameworks Understanding of architectural patterns Strong experience working with APIs (both SOAP and REST) High level of understanding of technical security and secure development methodologies In addition to a competitive salary, our benefits package is second to none. Employee wellbeing is at the heart of our people strategy, with a More ❯
the Compliance team with the scoping of penetration tests and analysis of findings, feeding into the product roadmap (aligned to the group remediation schedule) Support the Compliance team on informationsecurity assessments, coordinating with the Development team and other technical stakeholders to provide guidance on answers We are looking for: In-depth knowledge of C# on both .NET … infrastructure is beneficial Expert-level proficiency with test automation and frameworks Understanding of architectural patterns Strong experience working with APIs (SOAP and REST) High level of understanding of technical security and secure development methodologies In addition to a competitive salary, our benefits package is second to none. Employee wellbeing is at the heart of our people strategy, with innovative More ❯
Exeter, England, United Kingdom Hybrid / WFH Options
MBN Solutions
Have: Extensive data engineering experience in both Cloud and On-prem environments Excellent knowledge of data technology, data transformation tools, and data governance techniques Good understanding of Quality and InformationSecurity principles Experience with Azure, ETL Tools such as ADF and Databricks Advanced Database and SQL skills, along with SQL, Python, Pyspark, Spark SQL Strong understanding of data More ❯
Plymouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
s goals and priorities. Our commitment is to design solutions that meet our clients' specific business needs. Role Description This is a full-time remote role for a Network Security Consultant. The Network Security Consultant will be responsible for assessing and improving network security, implementing cybersecurity measures, managing informationsecurity protocols, and troubleshooting network issues. More ❯
Exeter, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
s goals and priorities. Our commitment is to design solutions that meet our clients' specific business needs. Role Description This is a full-time remote role for a Network Security Consultant. The Network Security Consultant will be responsible for assessing and improving network security, implementing cybersecurity measures, managing informationsecurity protocols, and troubleshooting network issues. More ❯
Plymouth, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
presentation skills. Strategic thinker with the ability to turn vision into action. Experience with CRM systems (e.g., Salesforce, HubSpot). A proactive, adaptable, and results-focused mindset. Experience within InfoSec, RegTech, Compliance-Tech or GRC solutions. The package: £85,000 basic with a £45k bonus, and uncapped) OTE Fully remote working available with multiple offices across the South 25 days More ❯