3 of 3 Contract ISO/IEC 27001 Jobs in Central London

Interim Cybersecurity Auditor

Hiring Organisation
Grant Thornton
Location
City of London, London, England, United Kingdom
Employment Type
Contractor
Contract Rate
Salary negotiable
cybersecurity audits for client organisations in line with UK regulations. Assess compliance with: UK GDPR & Data Protection Act 2018 NIS Regulations ISO / IEC 27001 Cyber Essentials / Plus Telecommunications (Security) Act 2021 Identify risks and provide actionable recommendations. Produce clear audit … auditing, ideally in a consultancy or client-facing role. Strong knowledge of UK legal frameworks and compliance standards. Relevant certifications (e.g. CISA, CISSP, ISO 27001 Lead Auditor). Excellent communication and stakeholder engagement skills. Ability to work independently and manage multiple client engagements. This ...

AI Security Architect / AI Security Strategy Manager - London, contrac

Hiring Organisation
Staffworx Limited
Location
City of London, London, United Kingdom
Employment Type
Contract, Work From Home
Security Architect / AI Security Strategy Manager to play a key role in shaping and delivering the organisation s AI security agenda. This is a strategic leadership opportunity for a candidate with strong experience across AI governance, information security, target operating model design, and enterprise stakeholder engagement . … year planning Deep understanding of AI concepts, governance frameworks, enterprise adoption models, and associated risks Strong knowledge of information security frameworks and AI regulations / standards , including: ISO 27001 ISO 42001 NIST AI RMF EU AI Act Proven experience working with senior stakeholders ...

Secure Web Gateway SME (Forcepoint Specialist)

Hiring Organisation
INTEC SELECT LIMITED
Location
City of London, London, England, United Kingdom
Employment Type
Contractor
Contract Rate
£500 - £550 per day
premise experience is essential. Experience operating as a proxy SME in a complex, multi-regional enterprise environment. Deep understanding of proxy technologies: explicit / transparent proxies, PAC files, SSL decryption, authentication, etc. Strong understanding of TCP / IP, DNS, HTTP / S, and authentication technologies (Kerberos, SAML … Ability to convert business and security requirements into robust technical designs. Solid background producing technical documentation and design artefacts. Desirable Skills Any relevant proxy / security certifications. Familiarity with ISO 27001, NIST CSF or related security frameworks. Experience working within regulated environments or with ITIL ...