Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: Job Description Leonardo UK is seeking a proven, experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires co-ordination with engineering teams and delivery of all facets of cyber and informationsecurity related to the delivery across the engineering lifecycle - from requirements all the way through to in-service support and maintenance. This is an exciting opportunity to be part of significant programmes, during which you will ensure that products meet the highest standards, in accordance with customer's requirements and risk appetite. You will be supported in this … team and with our customers. Talk to us to find out more. Key Responsibility Areas Leading a team or operating independently to meet all aspects of the cyber and informationsecurity delivery across an engineering lifecycle. Interpreting customer requirements into actionable security management plans, statements of work, and activities to be delivered across the lifecycle. Become the More ❯
Easter Howgate, Midlothian, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: Job Description Leonardo UK is seeking a Senior Consultant to join the Cyber & Security Solutions Division team. This role is focused on supporting the delivery of security aspects to the company's core products and to external stakeholders. This requires engaging with engineering teams and delivery of all facets of cyber and informationsecurity … to us to find out more. Key Responsibility Areas Work as part of a larger team, delivering streams of work independently, to meet all aspects of the cyber and informationsecurity delivery across an engineering lifecycle. Interpreting customer requirements into actionable security management plans, statements of work, and activities to be delivered across the lifecycle. Oversight and … statements of work and artefacts to time, cost and quality constraints. Identification, management and escalation of technical and delivery risks and issues. Maintain customer relationships for the cyber and informationsecurity workstream, both internal and external. Mentoring of consultants within your team as required. Skills, Qualifications, Knowledge & Experience Required In addition to a passion for cyber and informationMore ❯
Ready to Make an Impact in Cybersecurity? InformationSecurity Analyst - 6-Month FTC Global Law Firm London/Hybrid Our client, a leading global law firm , is looking for an experienced InformationSecurity Analyst to join their London team on a 6-month fixed-term contract . This is a fantastic opportunity to work in a … high-impact role where informationsecurity is at the heart of global legal operations. Salary: Up to £70,000 per annum (pro rata) Hybrid Working: 3 days in the office, 2 days from home The Role: Support the delivery of robust informationsecurity and privacy practices across global operations. Conduct security risk assessments, support incident More ❯
Clydebank, Dunbartonshire, United Kingdom Hybrid / WFH Options
Nine Twenty
IT Security Manager Location: Clydebank, Hybrid Options Available Employment Type: Permanent Full-Time We are currently looking for an experienced and proactive IT Security Manager to lead our informationsecurity function. This is a hands-on leadership role responsible for managing day-to-day cybersecurity operations, defining and implementing security policies, and supporting both technical … and strategic initiatives across the business. Role Overview: The IT Security Manager will be responsible for overseeing daily security operations, managing a skilled technical team, and defining the processes, standards, and policies that underpin secure business operations. They will play a key role in shaping and executing the IT security strategy, acting as a subject matter expert … while supporting compliance, training, incident management, and continuous improvement efforts across the organisation. Key Responsibilities: Oversees the daily operations of the IT Security team, ensuring service levels and internal objectives are consistently met. Leads the delivery of IT security projects, aligning them with broader strategic objectives and deadlines. Contributes expert guidance into IT strategy and supports its implementation More ❯
thinking organization committed to innovation, resilience, and trust. As we continue to grow and evolve in a digital-first world, we are seeking a strategic and business-savvy Business InformationSecurity Officer (BISO) to bridge the gap between cybersecurity and business operations. The BISO is expected to be adaptable and have the ability to implement the integration of … cybersecurity into our IT and operational technology (OT) ecosystems. As the BISO, you will serve as the primary liaison between the BA Customers & Solutions Security & Resilience team and business units, ensuring that information and cybersecurity strategies align with business goals. You will be responsible for embedding security into business processes, managing risk, and driving a culture of … security awareness across the organization. The BISO will report directly to the Head of Business Excellence, with additional reporting to the Director of Asset Management on the OT topics. Main tasks Act as the trusted information and cybersecurity advisor to management and stakeholders Establishing, developing and implementing the Security Management System in the BU Heat UK through More ❯
benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role We are seeking an experienced and visionary Head of Cyber Security Technology who will work across the SSE Group and deputise for the Group Chief InformationSecurity Officer. The role holder will lead a small team to drive … IT and OT cyber security strategic direction and define and govern enterprise security architecture and will be the technical cyber security authority for the Group while also leading the Group wide IT security risk position working closely with Group IT. You will Develop and maintain the enterprise cyber security architecture for the Group including development … the requirements of both IT and OT that aligns with industry standards, regulatory requirements and best practice in support of high risk and critical programmes and projects. Lead IT security risk position and lead consulting and assurance engagement into Group IT products and services. This includes overseeing the IT security risk position and mitigation planning. Management and challenge More ❯
benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role We are seeking an experienced and visionary Head of Cyber Security Technology who will work across the SSE Group and deputise for the Group Chief InformationSecurity Officer. The role holder will lead a small team to drive … IT and OT cyber security strategic direction and define and govern enterprise security architecture and will be the technical cyber security authority for the Group while also leading the Group wide IT security risk position working closely with Group IT. You will Develop and maintain the enterprise cyber security architecture for the Group including development … the requirements of both IT and OT that aligns with industry standards, regulatory requirements and best practice in support of high risk and critical programmes and projects. Lead IT security risk position and lead consulting and assurance engagement into Group IT products and services. This includes overseeing the IT security risk position and mitigation planning. Management and challenge More ❯
As an InformationSecurity Analyst, you serve as a digital guardian for the organisation, protecting critical information assets and systems from cyber threats. You are part of the Governance, Risk & Compliance team, and report to the Compliance & InformationSecurity Manager. Our team works alongside other parts of the business to carry out audits, compliance continual … improvements, investigations and risk assessments. Your role is critical in maintaining security measures that safeguard sensitive data, ensure business continuity, and maintain stakeholder trust. You act as both a strategic advisor and hands-on practitioner, translating complex security concepts into actionable business solutions while staying ahead of an ever-evolving threat landscape. What I Do Is: Maintain and … support the internal audit schedule and requirements for all QC required frameworks using the GRC platform and planning tool to ensure security controls are in place and operating effectively Assist in the external audit process and support any development or implementation of remediation required Participate in the review, update and validation of our Policies, Procedures and Documentation, ensuring accuracy More ❯
The Chief InformationSecurity Office (CISO) is a global team supporting the confidentiality, integrity, and availability of the firm's information assets across Europe, Asia, and the Americas. It implements security solutions to meet business needs and ensures trustworthiness of customer data and infrastructure. The Principal Security Architect is a cybersecurity expert collaborating with the … CTO and CIOs to design and govern security patterns for application development, ensuring security is integrated into technology infrastructure and business applications. This role requires cross-departmental collaboration within the organization to embed security as an emergent property of design decisions made across technology teams. The Principal Security Architect will lead a team of architects to … review solutions, ensuring security controls are incorporated and best practices are followed, particularly in infrastructure projects like cloud environments. The role involves overseeing efforts to identify requirements, evaluate technologies, and support product development to address security challenges globally. Purpose of the role Develop, implement, and manage the bank's cloud and security infrastructure, including security administration More ❯
to evolving regulations, general Health & Safety tasks, managing risk assessments, and supporting incident response processes. Key responsibilities include: Compliance Accreditations Overall management of Compliance areas of responsibility within our InformationSecurity Management System (ISMS) including leading the ISO Committee, management and scheduling of internal audits and ensuring existing policies are updated to reflect organisational practises Responsibility of the … of risk assessments and assisting in our monthly risk reports to the senior leadership team Assist, or own in some cases, incident response proceedings in the event of an InformationSecurity Incident or Health and Safety Incident Collaboration with internal and external teams to raise awareness of Compliance procedures Supporting key stakeholders with raising NDA’s and Data … knowledge working with and implementing ISO 27001 Knowledge and awareness of Health & Safety procedures and best practise with knowledge of the Health & Safety at Work Act 1994 advantageous Further informationsecurity accreditations or general ISO knowledge is advantageous but not a requirement A confident communicator with demonstrable Project Management skills, able to work on multiple projects simultaneously Comfortable More ❯
Senior Product Security Engineer Develop and implement global regulatory compliance strategies for Sonos products Location: Glasgow, Scotland, United Kingdom Job Tags: Operations About The Role Senior Product Security Engineer - Regulatory Compliance At Sonos we want to create the ultimate listening experience for our customers and know that it starts by listening to each other. As part of the … applicants must live within commuting distance of our Glasgow office location and should expect to be in office a minimum of 4 days per week. At Sonos, our Product Security Vision is to protect our products by implementing proven security practices and leveraging expertise to create experiences that both delight our customers and safeguard them and their information from cyber threats. We are seeking an experienced and strategically-minded Senior Product Security Engineer - Regulatory Compliance to join our Product Security team. This is a critical new role central to establishing and maturing our Governance, Risk, and Compliance (GRC) capabilities specifically for our world class products and services. You will be the internal subject matter expert More ❯
Net Talent are delighted to be partnering with an ambitious Managed Security Service Provider established in Scotland with a growing global footprint. They are driven to help protect organisations against the rising threat of cyber-attacks in an ever-evolving digital world. The have become a known Microsoft Security Partner with NCSC status as well as several prestigious … all down to the employees who make it happen. This is their biggest achievement! Due to ambitious growth plans for 2024, they are looking to add a Lead Data Security Consultant to their team. This can be a home-based role anywhere in the UK. This will require someone who knows IT Security and Data Loss Prevention while … being capable of recommending solutions to a varied client base. The Lead Data Security Consultant is responsible for delivering high-quality professional services engagements across both the Cyber and InformationSecurity realms. They are also here to coach junior consultants within engagements, to help refine consultancy offerings and to offer current and prospective customers a professional touchpoint. More ❯
Senior Cyber Security Engineer - 12 months Contract Hybrid 2 days Tuesday & Wednesday, other 3 remote OUTSIDE OF IR35 Preferred Locations: Aberdeen, Staines, Glasgow, or Reading Applicants must be able to pass the HMG Baseline Personnel Security Standard (BPSS) check. The Senior Cyber Engineer will support project implementation aligned with company objectives, including continuous improvement of margin, customer satisfaction … environments to support business, production, and operational goals. Key Objectives: Assess the cybersecurity robustness of architectures, technologies, & procedures in client facilities. Design solutions that meet client requirements and implement security measures (e.g., antivirus, patch management, insider threat protection, incident response, compliance). Conduct vulnerability assessments & audits on client systems & network devices, considering OT sensitivities. Provide expertise in network design … data communication, servers, VMs, switches, firewalls) and testing procedures (FAT). Prepare material requisitions & contribute to technical bid evaluations. Review vendor drawings & consolidate feedback from other disciplines. Undertake Cyber Security Risk Assessments and advise on mitigation actions. Support evaluation of clients' security posture, identifying vulnerabilities & areas for improvement. Stay updated on security trends, threats, & best practices. Apply More ❯
days left to apply) job requisition id 137415 End Date Friday 22 August 2025 Salary Range £90,440 - £106,400 We support flexible working - click here for more information on flexible working options Flexible Working Options Hybrid Working, Job Share Job Description Summary . Job Description JOB TITLE: Lead Infrastructure Engineer SALARY: £90,440 - £106,400 LOCATION: Edinburgh or … an office site About this opportunity At Lloyds Banking Group, we're moving to the next stages of our digital transformation, and it's our job within the Chief Security Office (CSO) to ensure that we keep our customers, colleagues and assets safe from threat! The Lead Infrastructure Engineer will lead a team of Engineers within the Security Operations Lab, being responsible for one or more technical products. This role is accountable for infrastructure and security strategy, as well as the technical product roadmaps across the Data Loss Management (DLM) feature team. A key focus will be on improving Data Loss Prevention (DLP) and Data Security Posture Management (DSPM) capabilities, ensuring alignment with business goals More ❯
an office site About this opportunity At Lloyds Banking Group, we're moving to the next stages of our digital transformation, and it's our job within the Chief Security Office (CSO) to ensure that we keep our customers, colleagues and assets safe from threat! The Lead Infrastructure Engineer will lead a team of Engineers within the Security Operations Lab, being responsible for one or more technical products. This role is accountable for infrastructure and security strategy, as well as the technical product roadmaps across the Data Loss Management (DLM) feature team. A key focus will be on improving Data Loss Prevention (DLP) and Data Security Posture Management (DSPM) capabilities, ensuring alignment with business goals … collaboration is crucial for building a resilient, scalable, and proactive data loss prevention strategy! What We're Looking For Strategic Leadership and Technical Direction Define and implement infrastructure and security strategies aligned with business and compliance objectives. Develop and maintain technical roadmaps for DLM, with a focus on DLP and DSPM capabilities. Collaborate closely with the DLM Product Owner More ❯
Net Talent are delighted to be partnering with an ambitious Managed Security Service Provider established in Scotland with a growing global footprint. They are driven to help protect organisations against the rising threat of cyber-attacks in an ever-evolving digital world. The have become a known Microsoft Security Partner with NCSC status as well as several prestigious … deliver exceptional client services. This role is critical in maintaining business continuity by providing first-line technical support, incident management, and problem resolution while upholding the highest standards of informationsecurity that our clients expect. Technical Support & Incident Management Provide technical support via phone, email, and ticketing systems for hardware, software, and network issues Triage and prioritise incoming … rights across various systems and applications Deploy and configure new hardware and software according to company standards Monitor system performance and proactively identify potential issues before they impact operations Security & Compliance Ensure all support activities comply with cybersecurity best practices and industry standards Assist with security incident response when required, following established protocols Maintain strict confidentiality of sensitive More ❯
ITC Infotech is looking for a Cyber Security Analyst to join our team in Edinburgh, UK. Your X-Factor Work ethic - You are a consummate professional. Aptitude - You have an innate capacity to transition from project to project without skipping a beat. Communication - You have excellent written and verbal communication skills for coordination across projects and teams. Impact - You … You have the drive to succeed paired with a continuous hunger to learn. Leadership - You are trusted, empathetic, accountable, and empower others around you. Working as a member of InformationSecurity team, the Cyber Cloud Monitoring Analyst is part of the global team that is responsible for providing 24/7 real-time monitoring of the firm's … cloud security posture within Azure, AWS, and CGP. This team is also responsible for incident identification, documentation, remediation and tracking for all cloud services. More specifically, the Supplier Personnel will support the global Cyber Cloud Monitoring function and have following key responsibilities: Perform investigation and escalation for complex or high severity security threats or incidents and handles and More ❯
costs, travel costs and training costs. People Management Actively participates in the recruitment of new employees Organises work and measures team performance Ensures that staff have had all the information/training related to the processes/actions to be deployed and implemented Identifies training needs in the team and support in the search for suitable development measures Prepares … and proposes corrective actions Actively Monitors performance indicators and takes actions to ensure live performance of the end-to-end customer experience is met. Act in accordance with Computacenter InformationSecurity Policies and report any potential or actual Security events or other Security risks to the organisation What youll need Previous people management experience in an More ❯
costs, travel costs and training costs. People Management Actively participates in the recruitment of new employees Organises work and measures team performance Ensures that staff have had all the information/training related to the processes/actions to be deployed and implemented Identifies training needs in the team and support in the search for suitable development measures Prepares … and proposes corrective actions Actively Monitors performance indicators and takes actions to ensure live performance of the end-to-end customer experience is met. Act in accordance with Computacenter InformationSecurity Policies and report any potential or actual Security events or other Security risks to the organisation W hat you'll need Previous people management experience More ❯
be able to demonstrable experience in writing and implementing data protection policies from scratch. Excellent communication skills, with the ability to engage and train colleagues at all levels. Cyber security experience or a strong understanding of informationsecurity principles and their relationship to data protection. Why join CR Smith: A competitive salary - £50,000 - £60,000 Pension More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
could be generated and putting in appropriate controls to help manage departmental budgets and produce reports for show back/charge back models. Work with EUS Engineers and Cyber Security to improve posture of Azure VM's, aligning to hardening and control standards. Creating and managing reporting in relation to AVD performance and usage metrics to improve end user … Desktops, creating and managing images, backups and understanding sizing options, impacts and costs. Experience working with Nerdio is beneficial. Intune, Azure Infrastructure, Azure Virtual Desktop, Azure Monitor & Cost Management. InformationSecurity and infrastructure/application/data resilience across AVD. Infrastructure as Code with Terraform and understanding of Scripting tools and languages (eg, PowerShell, Bash, Python) Knowledge of … models and reporting. Experience with Azure Monitor, Log Analytics and other monitoring tools to understand user experience and performance. Understanding of FSLogix and profile management. Knowledge of wider M365 & Security tooling beneficial (including but not limited to Defender for Endpoint, Intune, Entra ID) We are proud to be a Disability Confident Committed employer. If you have a disability and More ❯
support enterprise strategy and user needs Design cloud-based data solutions using platforms such as Azure, AWS, or GCP Contribute to data governance standards and ensure compliance with privacy, security, and access control requirements Build and maintain key architectural artefacts such as data dictionaries, ER models, and lineage documentation Engage in Agile delivery teams-supporting discovery, evaluating source systems … native tools (e.g. Snowflake, Databricks, Azure Data Services, etc.) High-level SQL skills and experience with tools like SSMS, SSIS, or SSRS Strong understanding of data governance, RBAC, and informationsecurity practices Able to evaluate APIs and source systems for integrity, content, and suitability Familiarity with Agile delivery and client-facing consultancy environments Experience designing and implementing end … to 2 days on-site per week depending on client needs. Remote-first delivery is common, though some flexibility is required for key workshops or planning sessions. For further information, feel free to reach me at 02895213213, or simply apply! Reference: AMC/RKI Reference: AMC/RKI - Lead Data Architect (Glasgow) Postcode: G2 3BY #riki More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
role that requires experience in design and administration of M365 and core infrastructure services. Key Responsibilities Implement and administer changes across M365 and Digital Workplace Technology. Ensure stability and security of M365 through effective assurance and assessment of our M365 tenant and other 3rd party software. Focus on FinOps; creating visibility around costs, highlighting where savings could be generated … and Azure Knowledge. M365 administration across Entra, Teams, SharePoint, Purview, Exchange, M365 Apps, PowerShell, CIS & Secure Score, Conditional Access. 3rd Party Software such as Mimecast and VFC Call Recording. InformationSecurity and infrastructure/application/data resilience across m365 platforms. Infrastructure as Code with Terraform and understanding of PowerShell. Experience with Scripting tools and languages (eg, PowerShell More ❯
role that requires experience in design and administration of M365 and core infrastructure services. Key Responsibilities Implement and administer changes across M365 and Digital Workplace Technology. Ensure stability and security of M365 through effective assurance and assessment of our M365 tenant and other 3rd party software. Focus on FinOps; creating visibility around costs, highlighting where savings could be generated … and Azure Knowledge. M365 administration across Entra, Teams, SharePoint, Purview, Exchange, M365 Apps, PowerShell, CIS & Secure Score, Conditional Access. 3rd Party Software such as Mimecast and VFC Call Recording. InformationSecurity and infrastructure/application/data resilience across m365 platforms. Infrastructure as Code with Terraform and understanding of PowerShell. Experience with scripting tools and languages (e.g., PowerShell More ❯
more efficiently. Manage tasks using the JIRA, ensuring all completed work is accurately documented. Operate effectively and independently in a fast-paced and dynamic working environment. Comply with all InformationSecurity Policies. Perform other duties as assigned. Your profile Key Skills and Technical Requirements: Excellent SQL knowledge Proficient in writing and maintaining complex SQL statements to meet business More ❯