technical expertise to drive innovation and adoption of new technology. Your role and responsibilities As a Cybersecurity Architect, you will specialize in DevSecOps, integrating security into the software development lifecycle, automating security practices, and ensuring robust threat modeling and vulnerability management. Your primary focus will be on cloud … native and on-premises environments, with a strong emphasis on application security, infrastructure as code (IaC) security, and cloud securityposture management. Additionally, you will contribute to data security efforts, securing data at rest, managing key management systems, and ensuring strong governance across data access. … Responsibilities: Integrate security into the software development lifecycle, automating security practices into CI/CD pipelines. Implement automated security testing (SCA, SAST, DAST) to identify and remediate vulnerabilities at every stage of development. Secure IaC configurations, ensuring secure provisioning, configuration management, and continuous monitoring of infrastructure. Utilize More ❯
GRC Analyst – Information Security - FTSE 100 Market Leader GRC Analyst with a focus on infosec governance, risk and compliance required by a market leading brand. The information security analyst will assist in establishing and monitoring the corporate information security policy, standards, procedures, guidelines, internal controls and business … continuity to ensure critical Information is protected, in alignment to Cyber Security best practice and data protection regulation. This role requires a particular knowledge around PCI DSS, and ideally my client is looking for an individual who has worked to help an organisation achieve PCI DSS compliance working with … 3rd party experts. The focus of this role will be to represent information security being able to interpret technical design and how information security best practices should be applied. Also be able to lead with incident management investigations and conduct risk and vulnerability assessments where appropriate. Key Accountabilities More ❯
The Third-Party Security Assessor undertakes general Third-Party Security reviews. There are three major aspects to this position: Conducting reviews of NEW Third-Party entities (Supplier, Reseller, Joint Ventures) - identifying areas of conformance and non-conformance to Experian requirements; driving security contract language and inputs into … identifying areas of conformance and non-conformance to Experian requirements and inputs into the Risk Management Process. Supporting the Global Head of Third-Party Security to continuously improve the local Third-Party Security (TPS) Management System and ensure that it meets local regulatory, policy, and business requirements. Primary … Responsibilities Update the Third-Party inventory and program within the region. Perform security assessments for new and existing Third Parties using the Third-Party Security Framework. Support the development and improvement of the TPS program. Provide on-demand consultancy to other teams within Information Security, Governance, and More ❯
Lincoln, Lincolnshire, United Kingdom Hybrid / WFH Options
Michael Page
A charity is seeking a dedicated Cyber Security Analyst to safeguard computer networks and systems. The role will work alongside another Security Analyst, report to the Information Security Manager Client Details Our client is a charitable care provider offers support and housing across various regions in the … Focused on dignity, choice, and individual needs, it delivers a wide range of services and short-term support. Description Plan, implement, upgrade and monitor security measures for the protection of computer networks and information Ensure that the organisation's data and infrastructure are protected by enabling the appropriate security controls Manage, monitor and response to security incidents Participate in the change management process, ensuring that security is considered throughout Conduct vulnerability assessments Prepare comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement Coordinate with different department heads and team members More ❯
shape the future of eCommerce. Your Impact: We are seeking a talented and experienced DevSecOps leader to oversee and manage the company's information security strategies, DevOps team, and IT operations. You will ensure the smooth functioning of IT services, safeguard digital assets, maintain compliance with industry standards, and … support continuous integration and delivery practices through effective DevOps management. This position reports directly to the CTO. What you'll do: Develop and implement security policies, procedures, and standards to ensure compliance with regulatory requirements and industry best practices. Coordinate regular security assessments, vulnerability scans, and penetration tests … to identify and remediate security vulnerabilities. Monitor and analyze security events, investigate incidents, and provide response and remediation support. Collaborate with cross-functional teams to integrate security controls into software engineering, business processes, and IT systems. Stay updated on emerging threats and technologies, recommending enhancements to the More ❯
coalville, midlands, United Kingdom Hybrid / WFH Options
Mobius Networks Limited
record of delivering data, remote diagnostics, and improving services while reducing maintenance costs. Mobius Networks offers a select range of networks known for their security, reliability, and availability, setting them apart in the industry. Key responsibilities: Deliver projects and solutions related to the IT Infrastructure (internal and customer facing … critical services (internal and customer facing) Implement changes and upgrades for the IT Infrastructure and customer IoT Network Proactively monitor and enhance the Cyber Securityposture for all IT Infrastructure services (internal and customer facing) Create, maintain, and adhere to documented policies, processes, and procedures Where required, collaborate … Prevention (DLP) Desirable skills: CCNA or CCNP certification RADIUS: Experience with Steel-Belted RADIUS, FreeRADIUS, or nuRADIUS Database Management: Basic knowledge of MS SQL Security Appliances: Experience with filtering solutions, RSA authentication, and Data Leakage Prevention (DLP) SIEM solution exposure What Will Make You Shine at Mobius Strong multitasking More ❯