Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
and application development. Maintain and enhance incident response procedures and disaster recovery plans. Investigate and document security breaches, providing root cause analysis and remediation plans. Conduct security awareness training for staff and ensure compliance with internal policies and regulatory requirements (e.g., FCA, GDPR, ISO 27001). Stay up More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
and application development. Maintain and enhance incident response procedures and disaster recovery plans. Investigate and document security breaches, providing root cause analysis and remediation plans. Conduct security awareness training for staff and ensure compliance with internal policies and regulatory requirements (e.g., FCA, GDPR, ISO 27001). Stay up More ❯
ensure compliance with company standards. Coordinate internal and external penetration testing activities, liaising between technical teams and external testers, tracking findings, and ensuring remediation plans are in place. About you The successful candidate will have previous experience working as a Security Governance Analyst, and be confident in governance More ❯
practice and regulatory standards. Take the lead on third-party risk assessments and security audits. Collaborate with technical teams on vulnerability management and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incident response processes. Drive awareness More ❯
practice and regulatory standards. Take the lead on third-party risk assessments and security audits. Collaborate with technical teams on vulnerability management and remediation planning. Provide input on secure design and architecture of new systems and solutions. Monitor and enhance security tooling and incident response processes. Drive awareness More ❯
yourself as a trusted partner. Track, manage, and review contract security obligations, ensuring risks are mitigated effectively. Oversee IT Health Checks and coordinate remediation plans. Maintain and evolve Information Security Management Systems (ISMS) in line with ISO27001. Drive vulnerability management, security incident response, and risk management initiatives. Guide More ❯
yourself as a trusted partner. Track, manage, and review contract security obligations, ensuring risks are mitigated effectively. Oversee IT Health Checks and coordinate remediation plans. Maintain and evolve Information Security Management Systems (ISMS) in line with ISO27001. Drive vulnerability management, security incident response, and risk management initiatives. Guide More ❯
departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g., GDPR) and addressing customer security requirements throughout the sales process. Developing More ❯
departments. Maintaining and evolving ISO 27001 certification and managing the Information Security Management System (ISMS) lifecycle. Performing regular risk assessments, developing and managing remediation plans, and conducting internal security audits. Ensuring compliance with data protection laws (e.g., GDPR) and addressing customer security requirements throughout the sales process. Developing More ❯
the firm’s Cyber Security posture. Elements of the role will include but not limited to the following: Lead Security incidents, driving Global remediation efforts. Run tabletop and simulation exercises based on insights shared from the CTI team. Identify the root cause of incidents and deliver clear, comprehensive … Senior Leadership. Ensure Vulnerabilities highlighted by the CTI team or Vulnerability Management team are correctly triaged and if required prepare a remediationplan and ensure an incident is stood up to coordinate this including any required detection rules to provide coverage pending remediation. Lesson learnt write up. More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Barclay Simpson
the firm’s Cyber Security posture. Elements of the role will include but not limited to the following: Lead Security incidents, driving Global remediation efforts. Run tabletop and simulation exercises based on insights shared from the CTI team. Identify the root cause of incidents and deliver clear, comprehensive … Senior Leadership. Ensure Vulnerabilities highlighted by the CTI team or Vulnerability Management team are correctly triaged and if required prepare a remediationplan and ensure an incident is stood up to coordinate this including any required detection rules to provide coverage pending remediation. Lesson learnt write up. More ❯
the NSOC meet customer and stakeholder requirements. Cross train with other team members to support professional development Help identify key trends and execute remediation plans for recurring incidents About you A degree in Cyber Security related discipline or equivalent experience Multiple end-to-end project examples of hands More ❯
the NSOC meet customer and stakeholder requirements. Cross train with other team members to support professional development Help identify key trends and execute remediation plans for recurring incidents About you A degree in Cyber Security related discipline or equivalent experience Multiple end-to-end project examples of hands More ❯
vendor systems. We also support all GM’s third-party trading platforms. What you’ll be doing Assist in devising a remediationplan and eventual implementation of all GM in-scope models to ensure SS1/23 compliance Discuss, formulate, validate and assist in proposing GM inspired More ❯
vendor systems. We also support all GM’s third-party trading platforms. What you’ll be doing Assist in devising a remediationplan and eventual implementation of all GM in-scope models to ensure SS1/23 compliance Discuss, formulate, validate and assist in proposing GM inspired More ❯
Management Continuously monitor account health indicators (usage data, user sentiment, support tickets). Anticipate potential roadblocks or low adoption signals. Propose and execute remediation plans before issues escalate. 7. AI Proficiency Use AI tools to: Draft communications, QBR decks, and user adoption strategies more efficiently. Triage routine customer More ❯
Management Continuously monitor account health indicators (usage data, user sentiment, support tickets). Anticipate potential roadblocks or low adoption signals. Propose and execute remediation plans before issues escalate. 7. AI Proficiency Use AI tools to: Draft communications, QBR decks, and user adoption strategies more efficiently. Triage routine customer More ❯
review across integration's, configurations, and custom developments. Identify potential risks or gaps that could impact the success of go-live and formulate remediation plans. Partner with supply chain, finance, production, and IT teams to ensure the system supports real-time, high-volume FMCG processes. Lead technical improvements More ❯
review across integration's, configurations, and custom developments. Identify potential risks or gaps that could impact the success of go-live and formulate remediation plans. Partner with supply chain, finance, production, and IT teams to ensure the system supports real-time, high-volume FMCG processes. Lead technical improvements More ❯
the Senior Leadership team. Mentor junior team members to support their professional development Lead problem management initiatives to identify key trends and execute remediation plans for recurring incidents. Skills & Experience: Hands-on experience with security technologies, including Palo Alto and Cisco ASA Extensive experience in leading and responding More ❯
the Senior Leadership team. Mentor junior team members to support their professional development Lead problem management initiatives to identify key trends and execute remediation plans for recurring incidents. Skills & Experience: Hands-on experience with security technologies, including Palo Alto and Cisco ASA Extensive experience in leading and responding More ❯
improve the global information security program’s maturity by encouraging collaboration, ensuring relevance, and driving results. Key Accountabilities Defining and implementing a Cybersecurity Strategic Plan incorporating entities in-scope Determining methods to implement, enforce and advise entities in-scope on cybersecurity related issues. Mitigating risk exposure at entities in … regionally and drive change. Experience of managing teams and developing staff Demonstrated experience understanding security risks, identifying gaps, and creating risk-mitigating and remediation plans, drawing up IT Security roadmap. Demonstrated experience understanding technical aspects of information and IT technology and core security components. In-depth knowledge of More ❯
improve the global information security program’s maturity by encouraging collaboration, ensuring relevance, and driving results. Key Accountabilities Defining and implementing a Cybersecurity Strategic Plan incorporating entities in-scope Determining methods to implement, enforce and advise entities in-scope on cybersecurity related issues. Mitigating risk exposure at entities in … regionally and drive change. Experience of managing teams and developing staff Demonstrated experience understanding security risks, identifying gaps, and creating risk-mitigating and remediation plans, drawing up IT Security roadmap. Demonstrated experience understanding technical aspects of information and IT technology and core security components. In-depth knowledge of More ❯
outcomes are recorded within the Risk Management System. Monitoring key risk indicators (KRIs), tracking breaches, and reporting on risk trends, control weaknesses, and remediation plans. Supporting the development and tracking of risk remediation actions and promoting risk-awareness across IT operations. Conducting regular IT risk assessments More ❯
outcomes are recorded within the Risk Management System. Monitoring key risk indicators (KRIs), tracking breaches, and reporting on risk trends, control weaknesses, and remediation plans. Supporting the development and tracking of risk remediation actions and promoting risk-awareness across IT operations. Conducting regular IT risk assessments More ❯