services. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies andstandards across identity, endpoint, and data domains. Implement automated compliance controls and continuous More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Networking People (UK) Limited
enterprise-critical infrastructure (e.g., network security, data protection, vulnerability management, access control). Leading disaster recovery planning, business continuity strategies, and incident response. Familiarity with compliance standards such as NIST, ISO 27001, PCI-DSS, and GDPR in the context of data centers, critical IT infrastructure, and application resilience for business survivability. Excellent communication, presentation, and client-facing skills with the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
TDA TELECOM LIMITED
concepts that clearly communicate value and differentiation. Solution Architecture Design comprehensive security architectures across network, endpoint, identity, cloud, and data protection domains. Ensure alignment with industry frameworks such as NIST, ISO, and CIS, and compliance with regulatory standards (PCI-DSS, HIPAA, etc.). Produce proposals, Bills of Materials (BOMs), high-level designs, and Statements of Work (SOWs). Vendor & Partner More ❯
workflows. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies andstandards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls More ❯
Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security More ❯
Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security More ❯
Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security More ❯
technical solution design, e.g. Zero Trust, least privilege RBAC, Security by Design, PAM, Segregation of Duties Data Protection and DLP Experience Experience with the following would also be beneficial: NIST, SOC2 and additional compliance and regulatory frameworks Project Management and technical delivery Experience of, or a keen interest in, the business of sport Benefits We offer a benefits package to More ❯
Qualifications & Experience Strong background in cyber security, with extensive experience in managing security operations, policies, and risk management. Demonstrable knowledge of security standards, frameworks and compliance (e.g. ISO 27001, NIST, Cyber Essentials Plus). Proven experience in developing and delivering cyber security strategies within complex organisations. Hands-on expertise across infrastructure, applications, and cloud environments. Track record of leading incident More ❯
Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business risk and cloud native threats. More ❯
and adversarial assessments. Skills & Experience Extensive experience in cybersecurity, including AI/ML security architecture. Strong knowledge of AI/ML models, algorithms, and adversarial mitigation. Familiarity with frameworks: NIST, ISO 27001, TOGAF, SABSA. Certifications: CISSP or CISM. Experience with cloud security (Azure, AWS, or GCP). Excellent communication and stakeholder management skills. Eligible for UK Security Clearance (SC). More ❯
hands-on security engineering and resilience experience: Hands-on experience in disaster recovery, failover testing, and IT operational resilience. Solid knowledge of business continuity and security frameworks (ISO27001, ISO22301, NIST etc). Proficiency with infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or More ❯
london, south east england, united kingdom Hybrid / WFH Options
Janus Henderson Investors
to 5 years of professional experience in information security. Certification such as Certified Information Systems Security Professional (CISSP) strongly preferred. Deep understanding of cybersecurity principles, frameworks (such as NIST, ISO/IEC 27001), and compliance standards. Experience with financial service regulations and regulations such as FCA, SEC, MAS, DORA. Proficient knowledge of network security principles and controls such as Firewalls More ❯
network observability and predictive analytics to proactively prevent outages. Security, Compliance & Risk Management: Drive zero-trust security frameworks, ensuring secure and resilient network access. Ensure adherence to ISO 27001, NIST, SOC 2, GDPR, and industry best practices. Collaborate with cybersecurity teams to enhance network threat detection and mitigation. Implement automated security policy enforcement, reducing human intervention in risk mitigation. Financial More ❯
protocols, encryption technologies, and other security tools. - Experience in conducting security audits, risk assessments, and creating security policies. - Strong understanding of industry standards, regulations, and best practices (e.g. ISO, NIST, GDPR). - Excellent problem-solving and analytical skills with the ability to think critically and adapt to changing situations. - Excellent communication and interpersonal skills with the ability to collaborate effectively More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
practices. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Knowledge of security standardsand frameworks (e.g., ISO 27001, NIST, CIS). Familiarity with security technologies such as firewalls, web proxies/remote access solutions. Experience with ZTNA, CTI, threat modelling is beneficial. Bachelor’s degree in information security, Computer More ❯
especially AWS), application security, and modern DevSecOps. Proven experience securing systems involving digital assets, cryptographic components, or distributed infrastructure. Strong grasp of regulatory frameworks: SOC 2, ISO 27001, GDPR, NIST, etc. Background in threat modeling, incident response, and risk management. Excellent leadership, communication, and stakeholder skills. Bachelor's or advanced degree in Computer Science, Information Security, or related field. Bonus More ❯
london, south east england, united kingdom Hybrid / WFH Options
Citi
and verbal) and the ability to communicate with all levels of staff and management are also essential. Demonstrated knowledge of recognized security industry standardsand leading practices (e.g., FFIEC, NIST, C2M2, ISO) Relevant professional certifications: GIAC, CISA, CISM, CRISC, CISSP or equivalent desiredEffective strategic planning and execution abilities with exceptional planning, organizaDemonstratvanced and functional understanding of Security industry operations, technologies More ❯
scanning to operations. Strong interpersonal and communication skills, with the ability to influence and engage stakeholders across technical and non-technical domains. Familiarity with cyber security frameworks such as NIST, ISO-27001, ISF SOGP, and ISMS. Professional certifications such as CISSP, CCSP, TOGAF, or SABSA (advantageous). You bring a collaborative spirit, a proactive approach to risk management, and the More ❯
Data Lake, and Cortex XSOAR . Solid understanding of cloud security , network/system security fundamentals, and scripting for automation. Desirable: Familiarity with compliance and security standards (GDPR, HIPAA, NIST). Familiarity with Infrastructure as Code Role/responsibilities: Join the Monitoring and Integration Platform (MIP) team within Technology Services. Be responsible for all infrastructure, end user computing, onsite support More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Data Lake, and Cortex XSOAR . Solid understanding of cloud security , network/system security fundamentals, and scripting for automation. Desirable: Familiarity with compliance and security standards (GDPR, HIPAA, NIST). Familiarity with Infrastructure as Code Role/responsibilities: Join the Monitoring and Integration Platform (MIP) team within Technology Services. Be responsible for all infrastructure, end user computing, onsite support More ❯
senior leadership role Deep familiarity with security requirements in digital health, life sciences, or FDA-regulated software environments Proven track record managing security and compliance under HIPAA, FDA, andNIST Knowledge of GDPR, ISO 27001, SOC 2 and international security standards Experience with cloud-native environments (e.g., AWS), data encryption, identity management, and secure software development practices Strong communicator who More ❯
security incidents. Support vulnerability assessments and penetration testing activities. Help implement security policies, procedures, and compliance standards. Learn and apply industry best practices, tools, and frameworks (e.g., ISO 27001, NIST, CIS). Requirements: Bachelors degree in Cybersecurity, Computer Science, Information Technology, or a related field. Strong analytical and problem-solving skills with keen attention to detail. Basic understanding of networking More ❯
such as cyber strategy, cyber risk, cyber maturity, security architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cyber security relevant standardsand regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire to work with More ❯