Jam Management Consultancy Limited T/A JAM RECRUITMENT
Information SecuritySpecialist (ISO Certified) About the Role Our client, a leading organisation in Berkshire, is seeking an experienced Information SecuritySpecialist with in-depth knowledge of ISO 9001, ISO 14001, ISO 22301, ISO 27001, and PCI-DSS compliance. This role will be central to designing, implementing, and maintaining best-in-class security and compliance … that all information assets and operational processes are safeguarded to the highest standards. Key Responsibilities Develop, implement, and maintain compliance with ISO , and PCI-DSS standards. Conduct risk assessments, security audits, and vulnerability testing across systems and processes. Lead incident response activities, ensuring rapid and effective mitigation. Collaborate with internal stakeholders and external auditors to achieve and maintain certifications. … Deliver organisation-wide security and compliance awareness training. Monitor and report on security performance, providing actionable recommendations. Essential Skills & Qualifications ISO 27001 Lead Implementer or Lead Auditor certification (or equivalent). Demonstrable experience managing compliance for ISO , and PCI-DSS. Strong understanding of governance, risk management, and regulatory compliance. Proficiency with security monitoring tools and incident management More ❯
and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Cyber Supply Chain SecuritySpecialist will deliver key aspects of the supply chain security strategy including delivering contract clauses and support to negotiations and assurance for critical third party suppliers. They will work … and the business to understand risks and drive actions to minimise impacts on SSE. You will Support the creation of procedures and contract requirements that clearly define and embed security responsibilities within supply chain operations, ensuring compliance with NIS regulations. Work with business and procurement colleagues to understand cyber security supply chain risks and support supplier due diligence … selection and contractual negotiations. Deliver self or work with an outsourced third party to deliver supplier assurance reviews to confirm that legislative, regulatory and SSE cyber security standards are adhered to by critical suppliers. Record operational assurance findings and where required, drive a list of mitigating recommendations for stakeholder management and cyber risk assessment. Support supply chain securityMore ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 Create & Maintain an information security management system (ISMS) capable of demonstrating compliance against internal security requirements and external commitments including certification and regulatory requirements. Provide subject matter expertise in the application of established … to any new or existing programme of work. Prepare and support internal and/or external compliance audit activities. Manage remediation of any audit (internal & External) non-conformities. Ensure security policies (on a risk-based approach) are produced, signed off by relevant stakeholders, published, and communicated. Also, ensure that policies are managed throughout their lifecycle and updated through yearly … or ad-hoc reviews. Produce relevant security standards documentation in consultation with Technical teams. Lead on providing information to Three UK Customers (B2B) regarding Three UK's security practices. Support proactive and effective oversight of technology and security risk management frameworks, methodologies, processes, assurance, remediation, and reporting activities across the company. Assist in designing, building, and implementing More ❯