Information Security Compliance Officer Required Qualifications & Certifications: Education Bachelor's degree in Cybersecurity, Information Technology, Computer Science , or a related field. A master's degree in information security , Risk Management, or Compliance is a plus. Certifications (Highly Valued) CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CISA (Certified Information Systems Auditor) ISO … Certified in Risk and Information Systems Control) GDPR Certification (e.g., IAPP CIPP/E, CIPM for data protection compliance) Experience Requirements: 3-5+ years of experience in Information Security, Compliance, or IT Risk Management. Experience with regulatory frameworks in UK & EU : GDPR (General Data Protection Regulation) ISO 27001 (Information SecurityManagement Systems) Cyber Essentials Plus (UK … government-backed security framework) DORA (Digital Operational Resilience Act) - EU financial sector PCI-DSS (if handling payment data) Experience in: Managing vendor risk assessments for third-party compliance. Handling incident response & reporting (e.g., Data Breach Notifications under GDPR). Key Skills & Technical Knowledge: Deep understanding of data protection laws (UK GDPR, EU GDPR, DPA 2018) . Familiarity with risk More ❯
Senior Cyber Security (GRC) Analyst This Senior Cyber Security (GRC) Analyst will report to the Cyber Security Governance, Risk & Compliance Manager and will work within the Information Systems directorate based in either our London or Crawley office. You will be a permanent employee. You will attract a salary of up to £75,000.00 and a bonus of … On - scheme providing discount on hundreds of retailers' products. Discounted gym membership. Employee Assistance Programme. Job Purpose The Senior Governance Risk and Compliance (GRC) Analyst will support the Cyber Security GRC Manager in developing IT governance, risk management, and compliance strategies across UK Power Networks information applications and users to safeguard essential business services and operations from cyber … Industry and Regulatory: Deputise for the GRC manager to represent UKPN in energy sector industry forums and regulatory working groups, working collaboratively with Ofgem and the Department for Energy Security and Net Zero. Communication: Communicate and work with all teams and partners in UK Power Networks. Good verbal, written, and presentational skills to express risks and the potential possible More ❯
to our success and of great importance to our clients, our partners and to our team. This is why we are currently looking for someone to help evolve the security function. As the Information Security Manager in the team, you will be working with our Security engineers as well as other teams and stakeholders to drive improvements … to our security program and ensure a pragmatic approach to security and risk. Responsibilities Develop, implement, and maintain the organization's information security policies, standards, and procedures in alignment with business objectives, while considering operational needs. Direct the management and continuous improvement of the Information SecurityManagement System (ISMS). Oversee and manage Ravelin … s PCI DSS and PCI 3DS compliance program, ensuring requirements are fulfilled, maintained, and areas for enhancement are identified. Conduct routine risk assessments to determine and reduce information security risks across the business through the establishment of risk treatment plans. Serve as the primary liaison for security matters, both internally and externally. Collaborate with leadership and internal stakeholders More ❯
Information Security Manager Role Description This is a full-time role as an Information Security Manager for a bank in Central London. The Information Security Manager will be responsible for day-to-day tasks related to information securitymanagement, including implementing and maintaining Information SecurityManagement Systems (ISMS), ensuring cybersecurity and network security, and protecting sensitive information. This is a hybrid role, based in London with the flexibility for some remote work. Qualifications Information SecurityManagement, ISMS, and Cybersecurity skills Network Security and Information Security knowledge Experience in implementing and maintaining ISMS Proficient in identifying and addressing information security vulnerabilities Strong analytical and problem-solving skills Excellent … communication and interpersonal skills Certifications such as CISSP, CISM, or equivalent are preferred Bachelor's degree in Information Security, Computer Science, or related field Additional Skills Strong hands-on network and security background Cisco networking Cisco firewalls (Firepower/Threat Detection) Palo Alto firewalls SIEM experience (Logarithm desirable) Web proxy (Forcepoint desirable) Governance skills Policy writing/reviewing More ❯
The opportunity We're looking for an Information Security Manager to take ownership of Attest's security posture as we scale. Our consumer research platform helps brands make better decisions; keeping our data, people, and customers secure is critical to our success. If you're excited about shaping security in a fast-growing SaaS company - without the … to collaborate in person while ensuring enough time remotely for deep, focused work. Learn more about our hybrid working philosophy here . What You'll Do As our Information Security Manager, you will define and implement security strategies, ensuring we maintain a strong security foundation without slowing down innovation. You'll work cross-functionally with Engineering, IT … and Legal to embed security across the business, enhance compliance, and proactively manage risks. Key Responsibilities Develop and implement security strategy : aligning security plans with business goals. Own our security program : building and maintaining an information securitymanagement system. Promote security culture : working closely with IT to educate and enable teams across Attest. More ❯
Job Title: Information Security Manager Basis: Full-time, permanent Location: Canary Wharf, London - WeWork Reporting to: Co-founder About Onetrace Great products start with great people. Our relentless focus on user experience has been the cornerstone of our growth, helping us become the market leading software for fire protection subcontractors across the UK. We've grown by staying obsessed … matter, and your work shapes what comes next. Want to learn more about our journey? Check out our LinkedIn page. About the Role We're looking for an Information Security Manager to lead the systems, practices, and frameworks that protect Onetrace's data, people and infrastructure as we grow. This is a cross-functional, hands-on role with a … strong strategic lens -you'll own our information security posture end-to-end, ensuring we maintain our ISO 27001 accreditation, while preparing for other relevant accreditations (such as SOC2 and Cyber Essentials). You'll proactively manage risks and help create a secure environment where teams can move fast without compromising on trust or safety. You'll also guide More ❯
Senior Information Security GRC Analyst Senior Information Security GRC Analyst Locations: London, United Kingdom; Manassas, United States Posted on: 4 Days Ago ABOUT US We're the world's leading provider of secure financial messaging services, headquartered in Belgium. We are the way the world moves value - across borders, through cities and overseas. No other organisation can address … relevant. Swift now has a presence in 200+ countries and legal territories to serve a community of more than 12,000 banks and financial institutions. Are you passionate about security Governance, Risk and Compliance (GRC)? Do you thrive in a dynamic environment where your experience and your security expertise can shape the future of our organization? We are … looking for a GRC Specialist like you to join our growing Information Security Governance team. In this role, you will: Develop and implement robust GRC frameworks to ensure compliance with increasingly stringent industry regulations and standards. Lead the reporting and presentation of our GRC activities to internal and external stakeholders, ensuring transparency and accountability. Collaborate with cross-functional securityMore ❯
Job Title: Head of Technology & Data About Us BGIS is a global leader in technical integrated building facility management services. Offering a full range of facility and real estate management services, BGIS partners with clients globally to bring forward innovative solutions. At BGIS, we believe there is always a better way. We seek out opportunities, encourage change and … communities, and planet. In-depth As the Head of Technology and Data, you will be leading and managing a diverse suite of service technologies such as Computer Aided Facilities Management (CAFM), Finance and Workflow management systems and the associated data ensuring the information can be transformed into tactical actions and decisions. You will provide leadership and management … and introduce continuous improvement process and manage technology vendors stakeholders to ensuring their performance and value for money. You will support and lead good standards and practices around workflow management and roll out awareness programmes to the organisation ensuring the business processes are adhered. You will work closely with global technology team and provide UK centric reporting strategy and More ❯
Role Description This is a full-time hybrid role for an Information Security Manager with 2nd and 3rd Line IT support experience. The role involves day-to-day tasks associated with planning, implementing, and maintaining an Information SecurityManagement System (ISMS), including managing cybersecurity risks, implementing network security measures, and ensuring compliance with industry standards. The … Information Security Manager will also provide IT support to the company and will be based in the London office, with flexibility for some remote work. Your past experience must include 2nd and 3rd line infrastructure support where you are able to advise and direct the technical team. Qualifications Experience in Information SecurityManagement and creating and implementing … an ISMS Experience in Cybersecurity and Network Security Expertise in Information security best practices and standards Excellent problem-solving skills and attention to detail Strong communication and collaboration skills Bachelor's or Master's degree in Computer Science, Information Technology, or related field Certifications such as CISSP, CISM, CCNA, or equivalent are a plus Experience in IT support More ❯
Job Purpose The Data Security Manager will partner with multiple divisions and technical managers to enhance security aspects of the data security program. Extensive oversight and control of CLS information assets, mitigating the risks of data loss at CLS in all aspects of day-to-day business. The individual will be accountable for the Data Security Program, setting strategic direction and driving operational excellence while leveraging resources distributed across several functional teams. The Data Security Manager will be responsible for analyzing potential weaknesses and identifying a roadmap to improve the security of information assets across CLS. The candidate will advise Business Owners, developers, and technical teams on options to mitigate risk. The candidate … must have excellent verbal, written, analytical and interpersonal communication skills. Essential Functions/Major Duties and Responsibilities Strategic Provide strategic direction specific to data security management. Build and maintain a robust data security program while aligning closely with CLS's mission. Improve and manage the data security program and the company-wide security standards for the More ❯
Social network you want to login/join with: We are looking for a security-focused, results-oriented individual who thrives in a collaborative, team-focused culture. You will work closely with IT and OT network managers, suppliers, business stakeholders, service owners, and your team to ensure the delivery of secure, reliable, and resilient network services across Thames Water. … We are seeking a Network Security Manager to lead and manage the end-to-end BAU (Business As Usual) service delivery for network security across Operational Technology (OT) and Information Technology (IT). You will be responsible for maintaining robust security controls, managing suppliers, mitigating operational risk, and ensuring compliance with industry standards to protect Thames Water … s critical infrastructure. What you'll do as a Network Security Manager Network SecurityManagement: Maintain oversight of IT and OT network systems, including VPNs, SDWAN, and firewalls. Ensure all network security services are fit for purpose and aligned with business outcomes. Approve and manage all changes affecting the network threat surface. Governance & Compliance: Ensure network More ❯
We are seeking an experienced Network and Information Security Engineer to join our team. In this role, you will be responsible for managing and configuration of network equipment (Cisco, Juniper,etc.) , and ensuring the smooth operation of our ZSTACK cloud environment. Key Responsibilities: (1) Strictly abide by the local laws, regulations and company rules and regulations of the country … or region to do the relative network maintenance or information security jobs; 1-3 years of experience in network maintenance, configuration, cyber security and information; Hardworking and quick learning. (2) Experience with the details and practical application of current data protection legislation, and possess an in-depth understanding of the GDPR. (3) Following the guidance of CTG HQ … network and information security department to do the relative jobs, reports, support internal and external networks, including VPN setup, DNS management, AP management, firewall configuration, WAF (e.g. Akaimai),SIEM(e.g. IBM QRada),etc. (4) Familiar with IP network, familiar with Cisco and Juniper, etc. equipment’s maintenance and configuration. (5) Experience with the Linux system administration, preferred More ❯
We are seeking an experienced Network and Information Security Engineer to join our team. In this role, you will be responsible for managing and configuration of network equipment (Cisco, Juniper,etc.) , and ensuring the smooth operation of our ZSTACK cloud environment. Key Responsibilities: (1) Strictly abide by the local laws, regulations and company rules and regulations of the country … or region to do the relative network maintenance or information security jobs; 1-3 years of experience in network maintenance, configuration, cyber security and information; Hardworking and quick learning. (2) Experience with the details and practical application of current data protection legislation, and possess an in-depth understanding of the GDPR. (3) Following the guidance of CTG HQ … network and information security department to do the relative jobs, reports, support internal and external networks, including VPN setup, DNS management, AP management, firewall configuration, WAF (e.g. Akaimai),SIEM(e.g. IBM QRada),etc. (4) Familiar with IP network, familiar with Cisco and Juniper, etc. equipment’s maintenance and configuration. (5) Experience with the Linux system administration, preferred More ❯
based MIS solution for the UK education sector. We are committed to innovation, service excellence, and data security. To support our growing needs, we are seeking an experienced IT & Security Manager to lead and oversee our entire IT infrastructure and cybersecurity strategy. As IT & Security Manager, you will be responsible for managing all aspects of Bromcom's IT … systems, infrastructure, and security framework. You will lead initiatives to ensure performance, scalability, and resilience while embedding a security-first culture across the organisation. This is a critical cross-functional leadership role reporting to senior management and working closely with technical and compliance teams. Travel Requires infrequent but regular travel to Bromcom Head quarters in Bromley and … to offices in Northern Ireland. Key Responsibilities IT Management Lead daily IT operations, infrastructure maintenance, and support services. Ensure efficient performance of systems, networks, and business-critical applications. Manage IT documentation, inventory, and reporting (e.g., SharePoint, SupportDesk). Oversee IT budgeting, procurement, and vendor relations. Plan and execute hardware/software upgrades and replacements. Maintain and update Employee and More ❯
Information Security Manager - Corporation Information Security Manager - Corporation Please note we only accept online application via our website Role Overview We're looking for a pragmatic, risk focussed Information Security Manager to work within Nest and maintain our ISO 27001 certified corporation Information SecurityManagement System (ISMS). We sit in the second line of … defence and advise the business on security risks, incidents, audits, assurance and the implementation and monitoring of security controls that protects Nest. You'll have a solid background in information securitymanagement systems, technology and love communicating technical concepts to non-technical people. Please note the minimum criteria for this role is: Practical experience of operating … certified ISMS using ISO 27001/2, NIST CSF and other security standards in the design and management of information security controls. Practical experience working with third party suppliers to audit and evidence compliance with security policies, standards etc. Understanding and experience of various Information Security domains including Security Architecture, Information Security Governance More ❯
About this Role Writer is seeking a highly skilled and experienced Security Engineer to join our dynamic and innovative team. The Security Engineer will play a crucial role in enhancing our information security and privacy posture by engaging with engineering and operations teams to perform security reviews, threat modeling, and other critical security activities. This … role requires a deep understanding of information security principles, a strong technical background, and the ability to collaborate effectively across various teams. The Security Engineer will report to the Head of Information Security & Compliance, and will work closely with the Information SecurityManagement Leadership, the Engineering, Product, and Design Team, and other relevant stakeholders. Location … s): London; New York, Austin, Chicago, San Francisco, Remote ️ Your Responsibilities Design and implement robust security architectures that align with industry standards and best practices; ensure that security controls are integrated into the design and implementation of new systems and applications. Provide technical guidance and recommendations to engineering and operations teams to enhance the security of our More ❯
may include: Software selection, procurement, and implementation. Implementation of standard Mace software solutions. Office infrastructure setup and office moves. Whole IT strategy delivery for a project or programme. Information security projects including implementation of an Information SecurityManagement System (ISMS) and certification to ISO27001. Disaster recovery and business continuity planning. Selection of outsourced and managed IT services … training materials, and post-implementation documents. Building professional relationships with stakeholders at all levels to manage expectations around scope, delivery, and timelines. Collaborating with project teams to understand data management and reporting practices. Contributing to standard practices and processes for the business analysis centre of excellence. Supporting the development of resources and materials for the business analysis toolkit. Establishing … assessments related to IT processes and services. You'll need to have: Experience as a Business Analyst across various IT projects. Formal Business Analysis certification (e.g., IIBA) preferred. Project management certifications such as PRINCE2, Agile, APM, CAPM are desirable. Proven success in delivering full lifecycle IT projects. Knowledge of IT project management methodologies including waterfall and agile. Strong More ❯
for leadership, action and results. Privately held since its founding in 1983, A&M is a leading global professional services firm that provides advisory, business performance improvement and turnaround management services. When conventional approaches are not enough to create transformation and drive change, clients seek our deep expertise and ability to deliver practical solutions to their unique problems. With … for turning change into a strategic business asset, managing risk and unlocking value at every stage of growth. To learn more, visit: The team: Alvarez and Marsal's Global Security Office is committed to delivering the highest standards of security and compliance. We are seeking a highly skilled and motivated Information Security Risk Manager to lead on … A&M wide information security risk management program and join our dynamic and growing team based in either our London or Tampa office. Position Summary: The Information Security Risk Manager will play a critical role in, and will be responsible for, driving risk strategy, overseeing risk governance, managing senior-level reporting, and leading key information securityMore ❯
As a BITSO at Vattenfall, you'll lead vital IT security measures in a dynamic environment that spans onshore and offshore wind operations. You'll collaborate with cross-functional teams to implement security controls, handle incidents, and uphold compliance-shaping the safe, resilient backbone of our mission toward fossil freedom. If you thrive on driving meaningful change in … critical infrastructure, join us and make your mark in the future of sustainable energy. In Business Area (BA) Wind, the Security & Resilience (SnR) Department plays a pivotal role in safeguarding our journey toward a fossil-free future. SnR oversees functional areas such as Information & Cybersecurity, Physical Security, Personnel Security, and Resilience. Through a robust securitymanagement … system (SMS) and structured risk assessment processes, the department ensures that Vattenfall's wind operations remain secure and compliant with both internal and external requirements. By setting policies, coordinating security initiatives, and collaborating with stakeholders at all levels, the SnR team helps uphold our commitment to "always act secure & resilient." Be in your element with BA Wind Our business More ❯
remote). Manage end-user computer estate (laptops, mobile devices – Windows & macOS) using tools like Manage Engine/Intune. Process joiners, movers, and leavers including equipment provisioning and access management Push to Automate processes where applicable. Support and manage various software tools (Jira, ServiceNow, Microsoft Office, Teams, Salesforce, Miro, Moorepay HR, and finance systems). Administer and troubleshoot office … equipment including video conferencing tools, networking equipment, and printers. Conduct quarterly software access reviews and scheduled information security checks (e.g., antivirus, updates, access control). Maintain and manage the IT Asset Register and ITOPs third-party supplier register Liaise with third party suppliers for procurement of IT equipment. Assist with audits (internal/external) and GDPR data access requests … authority. Support ISO27001 ISMS compliance including documentation, checks, and reporting. Contribute to the development of Service Desk standards, processes, and KPIs. Provide flexible support to CMS, infrastructure, and information security teams within capability and bandwidth. Collaborate with third-party vendors for efficient resolution of issues. Create and maintain up-to-date procedural and process documentation. Support mkodo in the More ❯
City of London, London, United Kingdom Hybrid / WFH Options
mkodo
remote). Manage end-user computer estate (laptops, mobile devices – Windows & macOS) using tools like Manage Engine/Intune. Process joiners, movers, and leavers including equipment provisioning and access management Push to Automate processes where applicable. Support and manage various software tools (Jira, ServiceNow, Microsoft Office, Teams, Salesforce, Miro, Moorepay HR, and finance systems). Administer and troubleshoot office … equipment including video conferencing tools, networking equipment, and printers. Conduct quarterly software access reviews and scheduled information security checks (e.g., antivirus, updates, access control). Maintain and manage the IT Asset Register and ITOPs third-party supplier register Liaise with third party suppliers for procurement of IT equipment. Assist with audits (internal/external) and GDPR data access requests … authority. Support ISO27001 ISMS compliance including documentation, checks, and reporting. Contribute to the development of Service Desk standards, processes, and KPIs. Provide flexible support to CMS, infrastructure, and information security teams within capability and bandwidth. Collaborate with third-party vendors for efficient resolution of issues. Create and maintain up-to-date procedural and process documentation. Support mkodo in the More ❯
South East London, England, United Kingdom Hybrid / WFH Options
mkodo
remote). Manage end-user computer estate (laptops, mobile devices – Windows & macOS) using tools like Manage Engine/Intune. Process joiners, movers, and leavers including equipment provisioning and access management Push to Automate processes where applicable. Support and manage various software tools (Jira, ServiceNow, Microsoft Office, Teams, Salesforce, Miro, Moorepay HR, and finance systems). Administer and troubleshoot office … equipment including video conferencing tools, networking equipment, and printers. Conduct quarterly software access reviews and scheduled information security checks (e.g., antivirus, updates, access control). Maintain and manage the IT Asset Register and ITOPs third-party supplier register Liaise with third party suppliers for procurement of IT equipment. Assist with audits (internal/external) and GDPR data access requests … authority. Support ISO27001 ISMS compliance including documentation, checks, and reporting. Contribute to the development of Service Desk standards, processes, and KPIs. Provide flexible support to CMS, infrastructure, and information security teams within capability and bandwidth. Collaborate with third-party vendors for efficient resolution of issues. Create and maintain up-to-date procedural and process documentation. Support mkodo in the More ❯
Information Security Lead - create the security strategy for a SaaS startup - £60,000 - £75,000 + 10% Bonus A dynamic and rapidly expanding technology company focused on revolutionizing learning and upskilling is seeking its first dedicated Information Security Lead. This is a crucial role for a fast-growing SaaS platform that empowers individuals to learn what they … need, when they need it, and is already trusted by major organizations. This is an exciting opportunity for an experienced Information Security professional to be the subject matter expert and build the security function from the ground up. You will take ownership of identifying, assessing, and mitigating information security risks across the business, as well as establishing … and maintaining robust security processes and controls to support commercial, engineering, and product teams. The ideal Information Security Lead will be responsible for: Owning and leading the information security function, working collaboratively across all departments. Maintaining and evolving ISO 27001 certification and managing the Information SecurityManagement System (ISMS) lifecycle. Performing regular risk assessments, developing More ❯
happy business? We are an innovative, agile, and continuously growing modern tech company on a path to improving the work lives of millions around the world. We develop workforce management solutions - software that makes scheduling and time reporting more smooth and more flexible for almost a million users worldwide! We value passion, quality, innovation, trust, and collaboration . You … establishing and maintaining the enterprise vision , strategy , and program to ensure information assets and technologies are adequately protected. The role is broken into three key areas of responsibility: Information security IT, infrastructure and networks Internal data and reporting As CIO you will be responsible for developing integrated strategies and programs of work covering all three areas listed above delivering … maximum value to the business, as well as acting as a chief information security officer (CISO). The CIO role directs staff in developing, implementing, and maintaining processes across the business for IT procurement, deployment and usage within Quinyx. This role also includes the development and deployment of internal data strategies and assets that can be used by the More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
SiSU Health UK
Help build and maintain the infrastructure powering a leading digital health platform. SiSU Health is seeking an experienced DevOps Engineer to ensure the reliability, scalability, and security of our AWS infrastructure and IoT-connected health stations. This is a critical role supporting the operational excellence and future readiness of our infrastructure as we scale across the UK and internationally. … The DevOps Engineer maintains and optimises our cloud platform and health station infrastructure and ensures platform reliability, availability, scalability, recoverability, security and compliance to relevant standards. 🛠️ In this role, you'll: Own and optimise our AWS stack and CI/CD pipelines Maintain our Health Station platform, networks and infrastructure Improve observability, resilience, compliance, security and uptime Collaborate … Work at the intersection of healthcare, infrastructure, and innovation Must haves 4+ years in DevOps/SRE Strong AWS experience and familiarity with Well Architected frameworks Familiarity with Information Securitymanagement, ISO 27001 and digital healthcare technology, compliance, standards and risk management Familiarity with Azure IOT and remote Windows configuration Experience managing databases (backup/recovery, securityMore ❯