Head of Cybersecurity Salary £60 - 70k 3 days on site per week in London Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies … bridge between the business and technical, overseeing with technical knowledge but not hands on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. … Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations More ❯
Head of Cybersecurity Salary £60 - 70k 3 days on site per week in London Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies … bridge between the business and technical, overseeing with technical knowledge but not hands on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. … Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations More ❯
london, south east england, united kingdom Hybrid / WFH Options
Intec Select
Experience: Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience) 2+ years of experience in an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
Experience: Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience) 2+ years of experience in an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
Experience: Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience) 2+ years of experience in an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS More ❯
services are robust, cost-effective, and aligned with business needs and the Strategic IT vision. They will also play a key role in enhancing cybersecurity, protecting data and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of More ❯
services are robust, cost-effective, and aligned with business needs and the Strategic IT vision. They will also play a key role in enhancing cybersecurity, protecting data and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of More ❯
desirable 5+ years of experience in information security or a related role, with at least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration More ❯
desirable 5+ years of experience in information security or a related role, with at least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration More ❯
pressure situations. Ethical Integrity: Strong sense of responsibility for data confidentiality and compliance with privacy regulations. Education & Certifications: Bachelor’s degree in Computer Engineering, Cybersecurity, or a related field. 3+ years of experience in a DevOps or DevSecOps role . Bonus Certifications (Preferred, not required): AWS Certified DevOps Engineer AWS More ❯
pressure situations. Ethical Integrity: Strong sense of responsibility for data confidentiality and compliance with privacy regulations. Education & Certifications: Bachelor’s degree in Computer Engineering, Cybersecurity, or a related field. 3+ years of experience in a DevOps or DevSecOps role . Bonus Certifications (Preferred, not required): AWS Certified DevOps Engineer AWS More ❯
vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze … an international enterprise environment is essential. Responsibilities: Collaborate with IT teams for input and operational requirements to design and implement the company's overall cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated … privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. Actively participate in proofs-of-concept for new security technologies by developing selection criteria to identify appropriate security solutions to support strategic, operational needs More ❯
will be responsible for designing, developing a platform capable of analyzing large datasets for security and compliance requirements. You will leverage your expertise in cybersecurity to proactively identify and address emerging threats, ensuring that secure coding practices are seamlessly integrated into every stage of development. What You’ll Bring Bachelor More ❯
will be responsible for designing, developing a platform capable of analyzing large datasets for security and compliance requirements. You will leverage your expertise in cybersecurity to proactively identify and address emerging threats, ensuring that secure coding practices are seamlessly integrated into every stage of development. What You’ll Bring Bachelor More ❯
south west london, south east england, united kingdom
Oracle
will be responsible for designing, developing a platform capable of analyzing large datasets for security and compliance requirements. You will leverage your expertise in cybersecurity to proactively identify and address emerging threats, ensuring that secure coding practices are seamlessly integrated into every stage of development. What You’ll Bring Bachelor More ❯
principles and best practices Ability to communicate effectively with senior management and stakeholders on security issues and risks Expertise in ensuring compliance with relevant cybersecurity regulations and frameworks, such as FCA, NIST, GDPR Experience in one or a combination of the following: systems, applications, or architecture planning Experience driving securityMore ❯
principles and best practices Ability to communicate effectively with senior management and stakeholders on security issues and risks Expertise in ensuring compliance with relevant cybersecurity regulations and frameworks, such as FCA, NIST, GDPR Experience in one or a combination of the following: systems, applications, or architecture planning Experience driving securityMore ❯
will be responsible for designing, developing a platform capable of analyzing large datasets for security and compliance requirements. You will leverage your expertise in cybersecurity to proactively identify and address emerging threats, ensuring that secure coding practices are seamlessly integrated into every stage of development. What You’ll Bring Bachelor More ❯
south west london, south east england, united kingdom
Oracle
will be responsible for designing, developing a platform capable of analyzing large datasets for security and compliance requirements. You will leverage your expertise in cybersecurity to proactively identify and address emerging threats, ensuring that secure coding practices are seamlessly integrated into every stage of development. What You’ll Bring Bachelor More ❯
will be responsible for designing, developing a platform capable of analyzing large datasets for security and compliance requirements. You will leverage your expertise in cybersecurity to proactively identify and address emerging threats, ensuring that secure coding practices are seamlessly integrated into every stage of development. What You’ll Bring Bachelor More ❯
Microsoft stack (Microsoft 365, MDM, OS, protocols etc) VMware (Horizon ideal) Deep understanding of Active Directory, Entra, GPO, DNS, DHCP PowerShell scripting Knowledge of CyberSecurity tooling and best practice Assisting with InfoSec policy adherence and incident response Software troubleshooting What’s in it for you? Though initially joining on More ❯
london (city of london), south east england, United Kingdom
Crone Corkill
Microsoft stack (Microsoft 365, MDM, OS, protocols etc) VMware (Horizon ideal) Deep understanding of Active Directory, Entra, GPO, DNS, DHCP PowerShell scripting Knowledge of CyberSecurity tooling and best practice Assisting with InfoSec policy adherence and incident response Software troubleshooting What’s in it for you? Though initially joining on More ❯
Microsoft stack (Microsoft 365, MDM, OS, protocols etc) VMware (Horizon ideal) Deep understanding of Active Directory, Entra, GPO, DNS, DHCP PowerShell scripting Knowledge of CyberSecurity tooling and best practice Assisting with InfoSec policy adherence and incident response Software troubleshooting What’s in it for you? Though initially joining on More ❯
in technical support roles, demonstrating strong autonomy and problem-solving skills. Strong communication skills for interacting with customers and translating technical information. Familiarity with cybersecurity standards like Cyber Essentials or ISO27001 is a plus. Relevant certifications (e.g., Cisco CCNA, MCSA, MS SC-200, CompTIA Network+/Security+, Microsoft Fundamentals). More ❯
in technical support roles, demonstrating strong autonomy and problem-solving skills. Strong communication skills for interacting with customers and translating technical information. Familiarity with cybersecurity standards like Cyber Essentials or ISO27001 is a plus. Relevant certifications (e.g., Cisco CCNA, MCSA, MS SC-200, CompTIA Network+/Security+, Microsoft Fundamentals). More ❯