more sustainable than single-use packaging. To strengthen our IT department, we are currently looking for a Cybersecurity & Compliance Manager. This is a key role focused on ensuring the security and regulatory compliance of our systems and processes. The position offers flexibility and can be fulfilled either remotely (within the Greater London area) or in a hybrid setup from … Dudley. Position purpose The Cybersecurity & Compliance Manager will lead Tosca’s efforts to ensure adherence to NIST CFS 2.0, ISO 27001, and other standards. This role focuses on developing security protocols, maintaining documentation, conducting risk assessments, and ensuring regulatory compliance. Responsibilities include managing security infrastructure, incident response, and promoting cybersecurity awareness. The position requires collaboration with Global IT … knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is a full-time role, with travel up to 30% of the time. Responsibilities Implement security protocols and manage informationsecurity programs Report performance, exceptions, and outages to all audiences transparently. Align disaster recovery with business continuity plans. Ensure compliance with ISO27001, NIST More ❯
more sustainable than single-use packaging. To strengthen our IT department, we are currently looking for a Cybersecurity & Compliance Manager. This is a key role focused on ensuring the security and regulatory compliance of our systems and processes. The position offers flexibility and can be fulfilled either remotely (within the Greater London area) or in a hybrid setup from … Dudley. Position purpose The Cybersecurity & Compliance Manager will lead Tosca’s efforts to ensure adherence to NIST CFS 2.0, ISO 27001, and other standards. This role focuses on developing security protocols, maintaining documentation, conducting risk assessments, and ensuring regulatory compliance. Responsibilities include managing security infrastructure, incident response, and promoting cybersecurity awareness. The position requires collaboration with Global IT … knowledge of NIST and ISO standards, risk management expertise, and effective communication skills. This is a full-time role, with travel up to 30% of the time. Responsibilities Implement security protocols and manage informationsecurity programs Report performance, exceptions, and outages to all audiences transparently. Align disaster recovery with business continuity plans. Ensure compliance with ISO27001, NIST More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
will: Assess that Cybersecurity is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential informationsecurity … vulnerabilities. These risk assessments will be presented to risk owners who are either Director or Partner level. Ensure that the project adheres to Deloitte's Cybersecurity capability framework, relevant informationsecurity regulations and industry standards. Examples include GDPR, EU AI Act, ISO 27001, NIST Cybersecurity Framework, and Cyber Essentials +. Communicate security awareness, concerns, and requirements to … project stakeholders, including developers, project managers, and business leaders, to ensure alignment and buy-in. Maintain documentation related to security assessments, risks, mitigation plans, and compliance status, providing regular reports to relevant stakeholders across waterfall and iterative deployment methodologies. Enable the business by being a trusted partner. This means working with Business Relationship Managers, Business Advisers, and Programme Managers More ❯
Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Telent Technology Services Ltd
deliver the vital services to ensure the continued success of our business divisions. These services include HR, Finance, Procurement, Marketing, Legal and Commercial, Estates and Facilities, Core Technology, Corporate Security, IT, and Fleet. Every person in every team is contributing the lasting impact our Team makes. Help build and keep the nation's critical infrastructure connected and protected …/7. Reporting into the Network Services Business Unit Security Manager, the Senior InformationSecurity officer will ensure security is embedded into all areas of the business and appropriate technical controls are in place throughout our infrastructure. This company facing role will assist new initiatives such as Threat Modelling and assist projects through the tender process. … to be in our Warwick a few times per month. What you'll do: Assist on all Governance, Risk and Compliance activities across Network Services Business Unit. Provide specialist security expertise for multiple internal projects across the Network Services business area. Provide guidance in secure software development throughout the lifecycle. Lead on risk and compliance technical assessments of all More ❯
Overview Rapiscan Systems is a global leader in detection technology, delivering advanced cargo and vehicle inspection systems for ports, borders, military installations, high-security facilities, and checkpoints. Our solutions help combat terrorism, drug trafficking, illegal immigration, and trade fraud. We offer a wide range of scanning configurations using low-, medium-, and high-energy X-ray technologies-often in combination … to meet diverse security needs. Our commitment to innovation, imaging excellence, and quality ensures our systems consistently deliver superior performance, reliability, and user satisfaction Role Overview Weare seeking a skilled Cyber Security Manager to lead the operations of our cyber security testing lab and oversee the development of product security documentation. This role works closely with … the Cargo Engineering Software Team to manage cyber risks across our Cargo X-ray software suite and is integrated into the broader OSI Systems corporate cyber security team. Responsibilities Cyber Security Design Ownership Define and maintain cyber security design requirements and documentation within a standardized security framework. Risk Management Identify, analyze, and report on securityMore ❯
Provides technical evaluation and analysis in a specific Security area. Supports activities, process, and tools needed to improve overall security posture of the organization. Primary responsibilities do not include Architect or Engineering responsibilities. Applies security concepts, reviews information, executes defined tasks, analyzes requirements, reviews logs, and creates documentation. Performs investigation and data loss prevention, data manipulation … and coordination of activities. Performs actions to address or mitigate risks and vulnerabilities. Reviews and defines controls. Advises on more complex security procedures and products for clients, security administrators and network operations. Participates in enforcement of control security risks and threats; potential of one more controls subject to manager discretion. Shares knowledge with staff. Conducts security assessments and other informationsecurity routines consistently. Investigates and recommends corrective actions for data security related to established guidelines. Develops policies and procedures to standardize security functions and eliminate potential vulnerabilities and threats. Oversees that business needs are being met during development.PNC's total rewards package includes things like time off, benefits, learning and career More ❯
Cheadle, Staffordshire, United Kingdom Hybrid / WFH Options
Pets at Home
core IT contracts and technology legal matters across the Group, including SaaS agreements, software licensing, IT communications and infrastructure arrangements, and outsourcing agreements. Working closely with data privacy and informationsecurity teams to ensure we maintain best practice across the organisation. Supporting IT-related forums across the Group, such as the InformationSecurity Steering Committee. Drafting More ❯
meets business needs and supports organisational goals. Key Responsibilities as a Dynamics 365 Administrator: Manage the day-to-day administration of the Dynamics 365 environment: Including user account management, security roles, and permissions. Configure and customise Dynamics 365: To meet business needs, including creating and modifying entities, forms, workflows, and reports. Monitor system performance and troubleshoot issues: Ensure optimal … Create and maintain comprehensive documentation :For system configurations, processes, and procedures. Ensure compliance: That the Dynamics 365 environment complies with organisational policies and industry standards, including data privacy and security regulations. Stay updated with the latest features and best practices for Dynamics 365 :Apply this knowledge to improve system functionality and user experience. Key Skills and Experience for a … Administrator: Essential: 3+ Years of experience in administration and development in Dynamics 365 CRM Modules Sales, Customer Service, Project Operations. Proficiency in Dynamics 365 administration, including user management, security roles, and system configuration. Knowledge of Power Platform tools (Power Apps, Power Automate, Power BI). Significant prior experience in data management including imports, exports, and regular data audits. Knowledge More ❯
the area Supervise a team of specialists Deliver risk management services to Hitachi Energy in cooperation with the team Work closely with stakeholders to prioritize, create reports, and oversee security findings Improve management of security risks/issues and help identify areas of risk Report on the services and their continuous improvement Background: 8+ years of experience in … IT/InformationSecurity Governance in large, global organizations (consulting, audit, or industry/operations) Experience in planning and operating security risk/issue management-related processes and services Experience in Risk Management aligned with certification requirements (ISO27001, ISO31000, or similar) Knowledge of relevant security/governance frameworks (NIST CSF, ISO27001, CobiT, etc.) Experience in service … build-up is a plus Security Governance/Risk Management certification (CISSP, CGEIT, CISM, CRISC, etc.) is a plus Hitachi Energy is a global technology leader advancing a sustainable energy future for all. We serve customers in utility, industry, and infrastructure sectors with innovative solutions and services across the value chain. We pioneer technologies and enable digital transformation to More ❯
Operations & System Health Design and test robust backup and disaster recovery strategies. Perform patching, upgrades, and maintenance to ensure availability and compliance. Monitor system health, capacity, and performance trends. Security & Governance Review and harden database security configurations. Manage access controls and support compliance with Cyber Essentials and data protection standards. Documentation & Collaboration Maintain clear documentation of system architecture … tuning, and T-SQL. Proven experience conducting architectural reviews and producing actionable improvement plans. Strong analytical and documentation skills. Experience with backup/recovery, capacity planning, and SQL Server security best practices. Excellent communication and stakeholder engagement skills. Desirable Skills Experience with business-critical platforms (e.g., CRM, ERP, Portals). Familiarity with MySQL or other RDBMS. Knowledge of SSIS … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
Coventry, England, United Kingdom Hybrid / WFH Options
WEG Tech
team to operate and maintain any of the facilities with special focus on the storage and virtualisation systems using expert skills in Linux system administration. Develop and manage appropriate informationsecurity polices, within university policy and in articulation with the central security team, to ensure an ongoing process of software maintenance and patching is in place on … monitoring and alerting systems to ensure problems are detected and downtime reduced. Plan and implement physical infrastructure deployments within the data centre working with the Estates Office and the Information and Digital Group where needed. Test and evaluate new technology for future use as part of the facilities. Provide reasonable and appropriate out-of-hours systems support where warranted … and deployment techniques as well as experience with automated software packaging, deployment techniques, configuration management, revision control and support tracking systems. Good awareness of cluster and HPC technology. A security-conscious approach to system administration including knowledge of encryption technologies, network security, operating system hardening, vulnerability awareness, system logging and security auditing. Practical knowledge of programming and More ❯
sunsetting and retirement of outdated products and services. Ensure technical, sales, and commercial readiness across the portfolio. Operational Excellence Define service architecture including APIs, SLAs, and technical documentation. Ensure security, sustainability, and compliance standards are met. Support training, onboarding, and enablement across teams. Performance & Optimisation Monitor KPIs including revenue, margin, pipeline growth, and roadmap delivery. Use data-driven insights … goals. What Were Looking For: Essential Experience & Skills 4+ years in a product management role, ideally in managed services or IT. Deep understanding of UK business cloud, infrastructure, and security markets. Proven success in vendor management and go-to-market execution. Strong commercial acumen and strategic thinking. Excellent communication and cross-functional collaboration skills. Familiarity with CRM platforms such … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Belcan Technical Recruiting (UK) Ltd
Belcan Workforce Solutions are looking for an experienced Common Data Environment (CDE) & Building Information Modelling (BIM) Consultant/Subject Matter Expert (SME) to join our clients team. Hybrid working 2 to 3 days onsite in Warwick - 6 month Inside IR35 contract. Position Summary You will manage digital workflows for construction projects, drive BIM adoption, and ensure secure and coordinated … information exchange among stakeholders. As the authoritative resource on BIM implementation best practises, you'll help shape the future of our projects. Required Qualifications and Skills Extensive hands-on experience with Common Data Environments within Autodesk BIM 360. Proven expertise in BIM implementation, including federated models, clash detection, and data coordination. Comprehensive knowledge of BIM-related standards (ISO … . Strong project management skills with excellent communication and stakeholder engagement capabilities. Analytical mindset with the ability to audit and troubleshoot complex BIM/CDE data flows. Familiarity with informationsecurity principles and data governance best practises. Key Responsibilities Leading from the front: Implement and optimise Common Data Environments (CDE) to enhance collaborative project data management. Expert Guidance More ❯
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Belcan Technical Recruiting (UK) Ltd
Belcan Workforce Solutions are looking for an experienced Common Data Environment (CDE) & Building Information Modelling (BIM) Consultant/Subject Matter Expert (SME) to join our clients team. Hybrid working 2 to 3 days onsite in Warwick - 6 month Inside IR35 contract. Position Summary You will manage digital workflows for construction projects, drive BIM adoption, and ensure secure and coordinated … information exchange among stakeholders. As the authoritative resource on BIM implementation best practises, you'll help shape the future of our projects. Required Qualifications and Skills Extensive hands-on experience with Common Data Environments within Autodesk BIM 360. Proven expertise in BIM implementation, including federated models, clash detection, and data coordination. Comprehensive knowledge of BIM-related standards (ISO … . Strong project management skills with excellent communication and stakeholder engagement capabilities. Analytical mindset with the ability to audit and troubleshoot complex BIM/CDE data flows. Familiarity with informationsecurity principles and data governance best practises. Key Responsibilities Leading from the front: Implement and optimise Common Data Environments (CDE) to enhance collaborative project data management. Expert Guidance More ❯
Warwick, north west england, united kingdom Hybrid / WFH Options
Belcan Technical Recruiting (UK) Ltd
Belcan Workforce Solutions are looking for an experienced Common Data Environment (CDE) & Building Information Modelling (BIM) Consultant/Subject Matter Expert (SME) to join our clients team. Hybrid working 2 to 3 days onsite in Warwick - 6 month Inside IR35 contract. Position Summary You will manage digital workflows for construction projects, drive BIM adoption, and ensure secure and coordinated … information exchange among stakeholders. As the authoritative resource on BIM implementation best practises, you'll help shape the future of our projects. Required Qualifications and Skills Extensive hands-on experience with Common Data Environments within Autodesk BIM 360. Proven expertise in BIM implementation, including federated models, clash detection, and data coordination. Comprehensive knowledge of BIM-related standards (ISO … . Strong project management skills with excellent communication and stakeholder engagement capabilities. Analytical mindset with the ability to audit and troubleshoot complex BIM/CDE data flows. Familiarity with informationsecurity principles and data governance best practises. Key Responsibilities Leading from the front: Implement and optimise Common Data Environments (CDE) to enhance collaborative project data management. Expert Guidance More ❯
and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
and cross sale opportunities to underpin the ongoing growth and development of Intercity. All members of the sales team are responsible for selling Intercitys complete range of Communications, Cloud & Security and Managed Services solutions within their assigned accounts whilst ensuring the successful retention of existing services. The sales team is results driven, with individuals responsible for achieving their own … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯