ll bring: 5+ years in InfoSec, IT Security or Ops within a regulated environment Certification required: CISSP, CISM, CRISC, or equivalent Strong knowledge of ISO27001:2022, SOC2 Type II, NIST CSF, PCI DSS, GDPR, DORA Confident with security risk assessments, audit responses, and policy governance Hands-on cloud security experience: ideally with Azure and the Shared Responsibility Model Comfort with More ❯
ll bring: 5+ years in InfoSec, IT Security or Ops within a regulated environment Certification required: CISSP, CISM, CRISC, or equivalent Strong knowledge of ISO27001:2022, SOC2 Type II, NIST CSF, PCI DSS, GDPR, DORA Confident with security risk assessments, audit responses, and policy governance Hands-on cloud security experience: ideally with Azure and the Shared Responsibility Model Comfort with More ❯
workflows. Define service level objectives (SLOs) and key performance indicators (KPIs) for all security services. Compliance, Governance & Risk Management: Ensure alignment with global compliance requirements such as ISO 27001, NIST, SOC 2, GDPR, and others. Partner with governance, legal, and ISRM teams to implement enforceable policies andstandards across identity, endpoint, and data domains. Operationalize policy enforcement through automated controls More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Robert Half
controls, including RBAC and Conditional Access, within Azure AD and Microsoft 365. Collaborate with Risk and Compliance teams to ensure infrastructure aligns with enterprise security frameworks (e.g. ISO 27001, NIST, CIS). Support incident response, vulnerability remediation, and disaster recovery planning. Promote a culture of continuous improvement and secure-by-design principles across the technology team. Provide technical leadership andMore ❯
regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM, IDS/IPS, and cloud security. Strong understanding of networking, infrastructure, and application security. More ❯
london (city of london), south east england, united kingdom
AirSearch
regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM, IDS/IPS, and cloud security. Strong understanding of networking, infrastructure, and application security. More ❯
regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM, IDS/IPS, and cloud security. Strong understanding of networking, infrastructure, and application security. More ❯
regulators, auditors, and third-party assessments. About You: Proven track record in cybersecurity management, including threat detection, incident response, and vulnerability management. Strong knowledge of security frameworks (ISO 27001, NIST, CIS Controls) and regulatory compliance requirements (GDPR, NIS2). Hands-on expertise with firewalls, SIEM, IAM, IDS/IPS, and cloud security. Strong understanding of networking, infrastructure, and application security. More ❯
Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business risk and cloud native threats. More ❯
Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business risk and cloud native threats. More ❯
london (city of london), south east england, united kingdom
Aker Systems Limited
Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business risk and cloud native threats. More ❯
Bash). Familiarity with infrastructure-as-code tools , such as Terraform or Ansible. Understanding of SASE (Secure Access Service Edge) frameworks. Exposure to cloud security standards (e.g. CIS Benchmarks, NIST, CSA). Experience with ITSM tools like ServiceNow. Knowledge of endpoint protection platforms (e.g. CrowdStrike, SentinelOne). Working knowledge of Active Directory and Azure Active Directory. Involvement in security audits More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
AWD online
awareness of clients and third parties Program Development: Assist in the development and delivery of security awareness programs Standards Implementation: Implement industry security standards such as Cyber Essentials, ISO27001, NIST-800-53, & Cloud Security Alliance CCM Report Generation: Generate reports for both technical and non-technical staff and stakeholders Product Evaluation: Test and evaluate security products Disaster Recovery Planning: Plan More ❯
analytical and problem-solving skills, with the ability to make sound decisions under pressure. Demonstrated experience in incident detection, triage, containment, and remediation. Knowledge of security frameworks, such as NIST, ISO 27001, or similar. Excellent communication skills, with the ability to clearly convey technical details to diverse audiences. Previous experience in SIEM/SOAR within large-scale, complex environments. Familiarity More ❯
network observability and predictive analytics to proactively prevent outages. Security, Compliance & Risk Management: Drive zero-trust security frameworks, ensuring secure and resilient network access. Ensure adherence to ISO 27001, NIST, SOC 2, GDPR, and industry best practices. Collaborate with cybersecurity teams to enhance network threat detection and mitigation. Implement automated security policy enforcement, reducing human intervention in risk mitigation. Financial More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
practices. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Knowledge of security standardsand frameworks (e.g., ISO 27001, NIST, CIS). Familiarity with security technologies such as firewalls, web proxies/remote access solutions. Experience with ZTNA, CTI, threat modelling is beneficial. Bachelor’s degree in information security, Computer More ❯
especially AWS), application security, and modern DevSecOps. Proven experience securing systems involving digital assets, cryptographic components, or distributed infrastructure. Strong grasp of regulatory frameworks: SOC 2, ISO 27001, GDPR, NIST, etc. Background in threat modeling, incident response, and risk management. Excellent leadership, communication, and stakeholder skills. Bachelor's or advanced degree in Computer Science, Information Security, or related field. Bonus More ❯
enterprise networks. Implement secure identity and access management using Azure AD and Microsoft Entra. Consulting & Advisory: Provide expert guidance to clients on cybersecurity best practices, compliance (e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloud security postures. Deliver workshops and training sessions on M365 and Azure security capabilities. Incident Response & Monitoring: Collaborate with More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
enterprise networks. Implement secure identity and access management using Azure AD and Microsoft Entra. Consulting & Advisory: Provide expert guidance to clients on cybersecurity best practices, compliance (e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloud security postures. Deliver workshops and training sessions on M365 and Azure security capabilities. Incident Response & Monitoring: Collaborate with More ❯
Sunbury-On-Thames, London, United Kingdom Hybrid / WFH Options
BP Energy
Security or equivelent. Certified Information Security Manager (CISM) or Certified Information Systems Security Professional (CISSP) or working towards certification. Knowledge of security frameworks such as ISO 27001/2, NIST, and CIS framework is highly advantageous. Desirable Experience and Capability Previous track record in similar roles in Finance, HR, Trading, Retail, Supply or Oil and Gas companies. Strong influencing skills More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
while building your own leadership brand What we’re looking for: Proven experience in cyber strategy, cyber risk, transformation, or security governance Strong understanding of industry frameworks such as NIST CSF, ISO27001, CAF or CRI2.0 Ability to communicate clearly with stakeholders at all levels — from technical teams through to board-level A blend of consulting and hands-on delivery experience More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
while building your own leadership brand What we’re looking for: Proven experience in cyber strategy, cyber risk, transformation, or security governance Strong understanding of industry frameworks such as NIST CSF, ISO27001, CAF or CRI2.0 Ability to communicate clearly with stakeholders at all levels — from technical teams through to board-level A blend of consulting and hands-on delivery experience More ❯