our organisation's data and IT infrastructure. This role focusses on the operational aspects of data protection - from technical risk assessments and secure system configuration reviews to incident response, vulnerabilityremediation tracking, and regulatory compliance audits. You will work closely with engineering, DevOps, and IT teams to embed privacy and information security controls into our technology stack. This … is a full-time position. Occasional after-hours work may be required to support incident response, high-priority vulnerability fixes, or audit activities. Develop and implement data protection governance: Design, implement, and enforce data protection and information security policies and procedures aligned with business objectives and regulatory requirements Support the development of strategies to mitigate and monitor data protection … data protection risks across systems and processes Support administration of data protection systems and risk reporting. Provide advice and guidance to teams on how to mitigate any identified risks Vulnerability management: Coordinate data protection assurance testing and vulnerability management Provide advice and guidance to teams on how to mitigate vulnerabilities, and following up on remediation progress Collaborate More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Littlefish
or similar technical positions. Fundamental understanding of security threats and compromise methods. Proficiency in server, client, and network technologies. Knowledge of malware, network reconnaissance, and emerging threats. Competence in vulnerability assessment and remediation procedures. Strong analytical skills, logical thinking, and sound judgment. Proficiency in KQL. Familiarity with the Microsoft Defender Suite. Education/Qualifications: CompTIA Security+ or equivalent More ❯
Your role and responsibilities As a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud-native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC) security, and cloud security posture More ❯
and wants to make a meaningful impact in complex, real-world environments. Key Responsibilities Support the development and implementation of OT cyber security practices Contribute to the identification and remediation of vulnerabilities in OT systems Work with engineering, operations, and IT teams to embed cyber resilience across environments Help monitor and improve security controls, networks, and access policies Assist More ❯