Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
PEXA Group
Proven experience leading cyber security operations in a regulated or financial services environment (FCA exposure preferred). Strong understanding of security governance, assurance frameworks, and audit processes (ISO 27001, NIST, GDPR, Cyber Essentials Plus). Experience with modern security tooling such as:o Cortex XDR/Palo Alto Networkso Splunk (SIEM and dashboarding)o Abnormal Security (email security)o Prisma More ❯
and constructive feedback SKILLS AND EXPERIENCE Functional/Technical Competencies Essential: Good understanding of cybersecurity/IT control frameworks including but not limited to frameworks from SOX, FFIEC, ISO27001, NIST, Cloud Security Alliance, and PCI-DSS Good managerial skills Experience of working as an IT auditor, security auditor or governance, risk and compliance analyst Proven understanding of current best practice More ❯
risk registers. o Working knowledge of risk assessment methodologies (e.g. ISO 31000, FAIR, OWASP risk rating). o Strong understanding of Gov Assure, CAF, ISO 27001, Cyber Essentials, andNIST frameworks. o Experience conducting or supporting security audits and implementing remediation plans. o Proficiency in assessing and securing platforms such as Entra ID (Azure AD), Microsoft 365 E5, Azure IaaS More ❯
Linux), network protocols, and packet analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NISTand MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic More ❯
Linux), network protocols, and packet analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NISTand MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic More ❯
Linux), network protocols, and packet analysis tools. Familiarity with scripting languages (Python, Bash, PowerShell). Experience with cloud security monitoring (AWS, Azure, GCP). Knowledge of frameworks such as NISTand MITRE ATT&CK. Qualifications Bachelor’s degree in Cyber Security, IT, or related field. 3–5 years in SOC operations, incident response, or threat intelligence. Practical experience with forensic More ❯
workflows. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies andstandards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls More ❯
Architect, with a focus on Security Assurance. Strong knowledge of cloud platforms such as AWS, Azure, Google Cloud, and M365. Familiarity with security frameworks andstandards (e.g., ISO 27001, NIST, CIS). Experience with security tools and technologies, including firewalls, intrusion detection/prevention systems, and encryption. Excellent problem-solving skills and the ability to think critically and strategically. Strong More ❯
services. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies andstandards across identity, endpoint, and data domains. Implement automated compliance controls and continuous More ❯
compensating controls. Maintain asset inventories and ensure patching and configuration baselines are followed. Security Governance & Compliance Contribute to maintaining security standardsand aligning with frameworks such as ISO 27001, NIST, CIS, or SOC 2. Support audits, evidence collection, and compliance reporting (e.g., GDPR, PCI-DSS). Develop and maintain documentation for policies, procedures, architecture, and runbooks. Collaboration & Knowledge Sharing Work More ❯
compensating controls. Maintain asset inventories and ensure patching and configuration baselines are followed. Security Governance & Compliance Contribute to maintaining security standardsand aligning with frameworks such as ISO 27001, NIST, CIS, or SOC 2. Support audits, evidence collection, and compliance reporting (e.g., GDPR, PCI-DSS). Develop and maintain documentation for policies, procedures, architecture, and runbooks. Collaboration & Knowledge Sharing Work More ❯
compensating controls. Maintain asset inventories and ensure patching and configuration baselines are followed. Security Governance & Compliance Contribute to maintaining security standardsand aligning with frameworks such as ISO 27001, NIST, CIS, or SOC 2. Support audits, evidence collection, and compliance reporting (e.g., GDPR, PCI-DSS). Develop and maintain documentation for policies, procedures, architecture, and runbooks. Collaboration & Knowledge Sharing Work More ❯
threats, secure architecture, identity, and data protection. Establish metrics and reporting to demonstrate effectiveness, risk reduction, and compliance with regulatory requirements (e.g., NationalInstituteofStandards Cyber Security Framework (NIST CSF), Digital Operations Resilience Act (DORA), New Tork State Department of Financial Services (NYDFS), Sarbanes-Oxyley (SOX), and the Financia Conduct Authority(FCA . Cyber Engineering Oversight Lead engineering teams More ❯
automated solutions for vulnerability scanning, threat detection, and incident response, with a focus on continuous process improvement. Risk Management & Threat Intelligence Strong familiarity with security frameworks andstandards (e.g. NIST, ISO 27001), and deep understanding of security concepts including vulnerability management, threat intelligence, incident response, and offensive security techniques. Experience in gathering and analysing threat intelligence to understand emerging threats More ❯
Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security More ❯
Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security More ❯
in Computer Science, Information Security, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. Knowledge of regulatory frameworks andstandards such as ISO 27001, NIST, and GDPR. More ❯
in Computer Science, Information Security, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. Knowledge of regulatory frameworks andstandards such as ISO 27001, NIST, and GDPR. More ❯
infrastructure security roles. Strong technical skills across Microsoft environments (on-prem and cloud). Knowledge of security controls such as IAM, firewalls, and endpoint protection. Familiarity with frameworks like NIST, CIS, ISO 27001, and Cyber Essentials Plus. Experience with monitoring and SIEM tools, threat detection, and incident response. Strong communication and stakeholder management skills. Desirable experience: Security certifications (e.g. CISSP More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Stott and May
Leadership & Strategy Define and implement the company's security strategy across AI, blockchain, and cloud environments. Establish policies, standards, and governance frameworks aligned with industry best practices (ISO 27001, NIST, SOC2). Lead incident response, risk assessment, and threat modelling programmes. Build and mentor a world-class security team. AI Data Security Protect proprietary AI models, training data, and pipelines More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
Detection and Response), and network architecture. Practical experience managing cyber incidents and implementing secure configurations. Excellent analytical and problem-solving skills, with clear documentation and communication abilities. Familiarity with NIST, ISO 27001, and CIS Controls frameworks. Ability to work under pressure, prioritise effectively, and maintain attention to detail. Desirable: Professional certifications such as GSEC, CISSP, OSCP, CISA, CompTIA Sec+, or More ❯