Job Description Job Title: InformationSecurity … Analyst Location: Nottingham Contract: Perm Recruiter: Noaman Hussain About the role We are looking for an experienced and proactive InformationSecurity Analyst to join our growing IT2A InfoSec team. You will serve as a critical liaison between InformationSecurity and internal business units, ensuring the implementation of security strategies and the management of informationsecurity risks across the organisation. Reporting to the Senior Manager, the Security Analyst will join the Project Advisory team. Key responsibilities Provide high quality security advice to mitigate identified risks and ensure compliance with internal standards and industry best practices. Guide the implementation and operation of physical, procedural, and technical security controls. Conduct securityMore ❯
Grantham, England, United Kingdom Hybrid / WFH Options
Homeloan Management
working week. Find out more about our culture of flexible working. We give you a world of potential Computershare has an exciting opportunity available for a permanent full-time Security Solutions Architect to join our Global InformationSecurity (GIS) team. A role you will love As a Security Solutions Architect, you’ll be responsible for delivering … executing and implementing security solution architectures for assigned projects in line with the enterprise security architecture and vision. You’ll also maintain strong vendor relationships and provide IT insight and innovation to our Business and Technology Services Teams and enhance overall security posture and awareness of security best practice as you deliver on project engagements. Key … responsibilities include: Defining and maintaining security solutions architecture, definitions and articulate associated benefits and costs aligned to technology solutions to delivering projects advancing the security architecture direction. Consulting for and engaging with our Technology Services teams including architecture teams in delivering security solutions architecture with a passion for working collaboratively across global teams. Initiating significant change, identify More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Schools Choice
Job Title: Cyber Security Manager Location: Flexible Hybrid Working - Around 2 days in the office at NNC Rate of Pay: £400 per day Umbrella OR £ PAYE £311.12 per day PAYE Working Hours: Full time - 37 hours per week Type: Temporary role - Inside IR35 - Up to 9 months Opus People Solutions are working with North Northamptonshire Council to recruit for … a Cyber Security Manager. Purpose of the job North Northamptonshire Council is going through a period of large-scale strategy and transformation to bring together our estates as well as create world leading services for our citizens. We have an ambition to create brilliant and modernised services; to use modern platforms and infrastructure; and to make the best out … of our investments in our technology and teams. This is a vital role in that journey, responsible for ensuring that we design and implement security right from the beginning of our journey, mitigating and managing technical risks to data and the organisation. This role is responsible to the Chief Information Officer of North Northants Council for: Providing expert More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Opus People Solutions Ltd
Job Title: Cyber Security Manager Location: Flexible Hybrid Working - Around 2 days in the office at NNC Rate of Pay: £400 per day Umbrella OR £ PAYE £311.12 per day PAYE Working Hours: Full time - 37 hours per week Type: Temporary role - Inside IR35 - Up to 9 months Opus People Solutions are working with North Northamptonshire Council to recruit for … a Cyber Security Manager. Purpose of the job North Northamptonshire Council is going through a period of large-scale strategy and transformation to bring together our estates as well as create world leading services for our citizens. We have an ambition to create brilliant and modernised services; to use modern platforms and infrastructure; and to make the best out … of our investments in our technology and teams. This is a vital role in that journey, responsible for ensuring that we design and implement security right from the beginning of our journey, mitigating and managing technical risks to data and the organisation. This role is responsible to the Chief Information Officer of North Northants Council for: Providing expert More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Walsh Employment
Cyber Security Analyst Location: Lincoln hybrid role working from home 3 days per week Salary: £38-40K plus excellent benefits package Our client is a forward-thinking organisation currently strengthening its cyber security capabilities ahead of an ISO27001 certification process. This role offers an exciting opportunity to work at the heart of cyber operations, playing a key … role in monitoring, analysis, and continuous protection of systems and data. We are now seeking a Cyber Security Analyst to join the informationsecurity function. Reporting to the InformationSecurity Manager , you will support critical activities related to threat monitoring, incident response, vulnerability management and risk mitigation, while also acting as a key advocate for … cyber awareness across the wider organisation Key Requirements Essential: 3+ years experience in cyber security Proficiency in SIEM , antivirus , and vulnerability management tools Understanding of AD , Office 365 , Windows Server , and infrastructure security Strong IT skills with experience across networks, OS, and security protocols Incident response and threat analysis expertise Familiar with Azure/Microsoft Defender and More ❯
As a Lead Security Control Assessor, you will be responsible for leading the assessment and evaluation of security controls across systems and processes both on-premise and in the cloud, to ensure they effectively mitigate risks and comply with regulatory and industry standards. You will oversee and conduct security control testing, to verify the design, implementation, and … operational effectiveness of controls. In this role, you will work in an agile environment, ensuring the quality of security assessments through thorough testing, automation, and collaboration with cross-functional teams and various stakeholders. Summary of Primary Responsibilities Design and deliver repeatable testing methodologies to support control assurance testing, including automated testing steps for cloud environments. Ensure control tests are … well-planned, including risk identification, sampling, selection of controls, testing methods, and reporting criteria. Lead control testing teams to perform design and operating effectiveness testing of informationsecurity controls, including fieldwork, testing, and reporting activities. Provide quality assurance for control testing documentation produced during testing, ensuring accurate and timely completion of all required control testing documentation. Identify and More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
UKRI
position is primarily remote, with in-office presence only requested for key meetings or specific operational needs. Closing Date: Sunday 22nd June 2025 Interviews: Week commencing 14th July 2025 Security As a minimum, due to the nature of this role, candidates must be eligible for clearance in line with UK National vetting guidelines and willing to undertake the process. … Please indicate eligibility in the written submission. Candidates not meeting this level of clearance will not be considered The level of clearance required is security check About us The UKRI CIO Group plays a pivotal role in managing and optimising the organisations critical enterprise technical services that underpin and enable UKRI’s business capabilities. Within the group a team … of InformationSecurity Professionals support the delivery of modern, secure, resilient and scalable services across a larger federated team of Digital, Data and Technology professionals to deliver impact across the organisation and the wider UK research and innovation system. Benefits We recognise and value our employees as individuals and aim to provide a favourable pay and rewards package More ❯
new attestations (SOC 2/ISAE 3000) for key products that can be shared with our customers within Europe This role involves assessing and improving the organization's resilience security posture in line with Digital Operational Resiliency Act (DORA), developing the necessary frameworks, readiness assessments and conducting audit in partnership with our external auditors to obtain clean reports. The … framework status. Engage in risk management processes, including risk identification, assessment, mitigation, and supervising to ensure compliance and safeguard company assets. Essential Criteria: Industry qualification relating to audit/informationsecurity or business subject area! At least five years of experience in an informationsecurity or compliance-related role! Deep experience and knowledge in implementing and … managing SOC 1/2 and ISAE 3000 frameworks within a Global Company. Strong solid understanding of informationsecurity compliance frameworks, standards, such as ISO 27001, 9001, 22301, SOC 1 or 2, PCI DSS 4.0, NIST, Swift and Cyber Essentials Plus ensuring continued certification and attestation. Superb communication, analytical, and problem-solving skills. High attention to detail and More ❯
Leicester, England, United Kingdom Hybrid / WFH Options
McCabe & Barton
A leading Financial Services client is now looking for an InformationSecurity Consultant on a permanent basis. The role offers a base salary of £75,000 (with flexibility) plus an attractive benefits package. The client has offices across the UK and hybrid/remote working is available, with occasional travel. As a pivotal second-line team member, you … will collaborate closely with the InformationSecurity Manager to safeguard the organisation against cyber, information, physical, and technical security risks. Your expertise will drive robust governance frameworks, policy management, and compliance with industry standards, ensuring the protection of our systems, suppliers, and people. You’ll play a key role in ensuring the systems, suppliers, and people … comply with security standards and regulations. From assessing technical controls and supplier risks to supporting incident response and contributing to the PCI-DSS and ISO 27002:2022 compliance, this is a role where you’ll make a visible impact. Candidate Qualifications and Skills Experience in Financial Services: Proven background working within the financial services sector, with an understanding of More ❯
Join to apply for the Senior InformationSecurity Analyst role at TieTalent 1 day ago Be among the first 25 applicants About Are you a qualified Cyber expert looking for your next challenge? Then read on! We are recruiting for a Senior InformationSecurity Analyst at Public Sector Partnership Services. This senior role focuses on our … Confident employer and is an equal opportunities employer. Note: The closing date may change. Nice-to-have skills CISSP Active Directory Firewalls Switches Location: Horncastle, England Work experience Cyber Security Specialist Security Analyst Languages English Seniority level Mid-Senior level Employment type Full-time Job function Information Technology Industries Technology, Information and Internet Referrals increase your … chances of interviewing at TieTalent by 2x. Set job alerts for “Senior InformationSecurity Analyst” roles by signing in. Locations: Lincoln, England, United Kingdom (2 weeks ago); Lincolnshire, England, United Kingdom (2 days ago) We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI. #J More ❯
Security Analyst Howdens is expanding our team and looking for a skilled InformationSecurity Analyst to help drive and maintain the security of our systems and data. In this role, you'll be the voice of InformationSecurity -interpreting technical designs and ensuring best practices are embedded across our operations. You'll play a … key role in supporting the development, implementation, and monitoring of our corporate informationsecurity policies, standards, procedures, and guidelines. At Howdens , we value innovation, integrity, and collaboration. If you're passionate about protecting information and driving best practices in a dynamic environment, we'd love to hear from you. What will I be doing as InformationSecurity Analyst? Provide project support representing informationsecurity Play an active role in incident management activities. Support the PMO (Project Management Office) to ensure appropriate security is assessed within projects alongside overseeing supplier compliance to Howdens needs for Cyber Security Lead with incident management investigations and conduct risk and vulnerability assessments where appropriate. Conduct More ❯
appreciation for your time and effort in applying to us. Interview Process: Telephone interview with a member of recruitment (30 mins) Competency based interview with Hiring Manager & Head of InfoSec (60 mins) Final interview - informal chat with senior leaders (30 mins) Are you ready to join an award-winning business that is reshaping the insurance landscape? Our organisation has transformed … The Role: As our Data Protection Manager, you’ll be the guardian of our data protection policies and procedures. You’ll ensure compliance with GDPR and other regulations, oversee informationsecurity practices, and integrate AI technologies responsibly. You’ll also be the go-to person for data protection queries and issues. What will you do? Develop and maintain … . Handle data subject access requests (DSARs) and other rights requests. Oversee data breach management and reporting. Develop a privacy monitoring plan to ensure ongoing compliance. Develop and enforce security policies and procedures. Monitor and assess security risks. Collaborate with IT and other departments to ensure data security. Ensure compliance with ISO 27001 and other ISO standards. Lead More ❯
Responsibilities: Develop or adopt risk assessment methodologies for use across the Digital and IT organisation including Risk Logging, remediation, and acceptance Develop, implement and monitor a strategic, comprehensive enterprise informationsecurity and IT risk management program Ensure compliance with any related legislation, such as Export Control, Data Protection Act and relevant government regulations Own, develop and implement an … InformationSecurity Management System (ISMS) to address Digital and IT risks impacting organisational safety and operations. Lead risk assessments to identify, prioritise, and mitigate threats to critical systems. Collaborate with the Digital and IT leadership teams to align risk management with business objectives. Oversee compliance with national and international cybersecurity and IT standards, coordinating with regulatory bodies (e.g. … demonstrate understanding of the appliable health and safety standards and we are looking for someone who is/has: Proven experience (8+ years) in digital risk management, cybersecurity or informationsecurity, with at least 3 years in a leadership role. Deep knowledge of regulatory frameworks such as Export Control/ITAR, EASA Part-IS, GDPR, ISO 27001, or More ❯
Nottingham, England, United Kingdom Hybrid / WFH Options
The Nottingham
require any adjustments to assist you in applying, please contact [email protected] We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our InformationSecurity team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing … collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Here's a taste of what you will be doing as an Identity Governance Access Analyst at Nottingham Building Society: - Daily Operations: Collaborate with the IGA Manager to … compliance standards such as GDPR, FCA guidelines, and ISO 27001. Detail-Oriented: Strong attention to detail and a process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2-4 years of experience in identity and access management, preferably in financial services or regulated environments, with beneficial qualifications like a More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
Ventula Consulting
GRC Analyst – InformationSecurity - FTSE 100 Market Leader Get AI-powered advice on this job and more exclusive features. This range is provided by Ventula Consulting. Your actual pay will be based on your skills and experience — talk … with your recruiter to learn more. Base pay range GRC Analyst – InformationSecurity - FTSE 100 Market Leader We are seeking a GRC Analyst with a focus on infosec governance, risk, and compliance for a market-leading brand. The successful candidate will assist in establishing and monitoring the corporate informationsecurity policy, standards, procedures, guidelines, internal controls … and business continuity plans to ensure critical information is protected in line with cybersecurity best practices and data protection regulations. The ideal candidate will have specific knowledge of PCI DSS, and experience helping organizations achieve PCI DSS compliance, ideally working with third-party experts. The role requires the ability to interpret technical designs, apply informationsecurity best More ❯
Security Consultant (Security Operations) Location: Hybrid; with occasional travel expected to client site or Logiq’s offices in Bristol, Chippenham or Exeter. Salary: Negotiable, plus car allowance, plus up to 10% performance bonus*, plus excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due … to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to … ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a More ❯
Security Consultant (Security Operations) Location: Hybrid; with occasional travel expected to client site or Logiq’s offices in Bristol, Chippenham or Exeter. Salary: Negotiable, plus car allowance, plus up to 10% performance bonus*, plus excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due … to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to … ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a More ❯
Derby, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (Security Operations/SOC), derby col-narrow-left Client: Location: derby, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (Security Operations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Chesterfield, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (Security Operations/SOC), chesterfield col-narrow-left Client: Location: chesterfield, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (Security Operations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Lincoln, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (Security Operations/SOC), lincoln col-narrow-left Client: Location: lincoln, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (Security Operations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
Northampton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
Social network you want to login/join with: Security Consultant (Security Operations/SOC), northampton col-narrow-left Client: Location: northampton, United Kingdom Job Category: Other - EU work permit required: Yes col-narrow-right Job Views: 7 Posted: 06.06.2025 Expiry Date: 21.07.2025 col-wide Job Description: Security Consultant (Security Operations) Location: Hybrid; with occasional travel … excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover … from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Direct message the job poster from SR2 | Socially Responsible Recruitment | Certified B Corporation The Go to OT Security Recruiter! Senior Recruitment Consultant @ SR2 | Socially Responsible Recruitment | Certified B Corporation. Join one of the UK’s leading energy providers as an Operational Technology Cyber Analyst, where you'll play a critical role in securing our nation’s infrastructure. You’ll … Support vulnerability management initiatives and penetration testing exercises. Contribute to policy development and ensure alignment with IEC62443, NIS, CAF, OG86, and HSE regulations. Work collaboratively with IT, engineering, and security stakeholders to maintain compliance and operational resilience. Support the maintenance and development of the OT Security Operations Centre technology stack. Deliver technical assurance across the OT security ecosystem. Strong understanding of OT/ICS cybersecurity or relevant control systems (SCADA/PLC) – training provided where required. Experience with network security, threat detection, and incident response. Knowledge of security frameworks and regulations including NIST, IEC, NIS Directive, and Cyber Kill Chain. Analytical mindset with the ability to manage complex investigations and deliver root cause analysis. More ❯
be doing: Be responsible for the management of work within cost and budget Report on team progress and performance with an awareness of financial forecasting and estimating Oversee the Security Assurance Case Capture and agree on technical requirements in accordance with company and programme processes Maintain compliant technical solutions against contractual requirements and regulations Have a technical input and … appropriate consideration of product security activities and issues for LCM deliverables and Design Reviews, including Sub-Contract Design Reviews Capture and agree on input to appropriate Verification and Qualification Plans Provide specialist advice and contribution to other project documentation, such as Training Needs Analysis, Technical Publications, Cyber Incident Plans and Operating Instructions (list is not exhaustive) Your skills and … experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or InformationSecurity related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of informationsecurity principles and its potential impact on Product Systems Experience of Consultancy on the application of Product More ❯
be doing: Be responsible for the management of work within cost and budget Report on team progress and performance with an awareness of financial forecasting and estimating Oversee the Security Assurance Case Capture and agree on technical requirements in accordance with company and programme processes Maintain compliant technical solutions against contractual requirements and regulations Have a technical input and … appropriate consideration of product security activities and issues for LCM deliverables and Design Reviews, including Sub-Contract Design Reviews Capture and agree on input to appropriate Verification and Qualification Plans Provide specialist advice and contribution to other project documentation, such as Training Needs Analysis, Technical Publications, Cyber Incident Plans and Operating Instructions (list is not exhaustive) Your skills and … experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or InformationSecurity related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of informationsecurity principles and its potential impact on Product Systems Experience of Consultancy on the application of Product More ❯
Job Description: We are seeking a motivated Application Security Code Reviewer to join our team. The ideal candidate will be responsible for ensuring the security and integrity of our software applications using comprehensive code review tools and security testing. This role involves performing static code analysis, dynamic code analysis, and software composition analysis to identify and mitigate … security vulnerabilities. The role could also include other tasks such as penetration tests and retests, automations, pipeline configurations, and more. Contract Duration: 12 MONTH CONTRACT Key Responsibilities: Configure and manage automated security testing tools to perform regular scans of the codebase in static code analysis, dynamic, and API tests. Analyze the results of security scans and identify … true positive findings. Collaborate with the development team to provide detailed feedback and recommendations for remediation of identified security issues. Document and report security findings, including mitigation strategies. Qualifications and Tech Skills: Bachelor's degree in Computer Science, InformationSecurity, or a related field. Experience in application security, code review, and security testing. Basic More ❯