As our Information SecurityManagement Specialist (m/f/d) , you'll provide experienced support in the implementation and management of the Information SecurityManagement System (ISMS) framework in alignment of current ISO 27001 standard and guidelines. With a focus on cybersecurity, this role involves leading risk assessments, ensuring alignment with industry standards and … regulations, and following information security practices and policies. What you will do Contribute to implementation, maintenance along with continuous improvement and associated instructional documentation of ISMS and its controls in line with the requirements of ISO 27001:2022 and similar standards. Ensure compliance and maintenance of ISO 27001:2022 standard as well as all Information Security requirements with … respect to laws, regulations, client requirements, NTT DATA and Group requirements including active participation in internal and external ISMS audits. Support in information security audits, performed by organization or third-party personnel. Ensure that IT systems are assessed against Information Security criteria and operate in compliance with the instructional Information Security documentation. Conduct company-wide gap assessment More ❯
Location: London or Cheltenham, 3 days in the office Clearance: Active SC Clearance Salary: £45,000 - £70,000 + Benefits This is an exciting opportunity for a Technical Cyber Security Consultant to join an expanding technical consultancy as they support public sector clients across cyber, telecoms, and data. This role involves designing secure networks, analysing complex datasets, and contributing … to protecting UK security through data driven insights and solutions. Key Responsibilities Assessing your client's' needs, understanding how their needs may differ from their wants, and appropriately managing stakeholder relationships. Selecting, understanding and adapting security control frameworks. Designing, justifying and implementing securitymanagement strategies. Identifying risks from design documentation and proposing proportionate cyber security controls. Ensuring security principles are applied during design and development to reduce risk. Developing and communicating corporate information security policy, standards and guidelines. Developing organisational strategies that address information control requirements. Identifying and monitoring environmental and market trends and proactively assessing impact on business strategies, benefits and risks. Performing threat modelling and risk assessments to develop a More ❯
Security Architect Are you the right candidate for this opportunity Make sure to read the full description below. • Newport – 4 days per week onsite • 6 month contract initially • £85 per hour umbrella (inside IR35) • 35 hours per week – 4 days onsite and Fridays offsite Please note active SC clearance is required and applicants must be SOLE British nationals Join … a high-profile defence programme where your expertise as a Security Architect will directly shape the protection of national security systems and platforms. This is a hands-on role for an architect who thrives in complex, high-assurance environments, working alongside government security authorities and engineering teams to deliver robust, secure solutions. Responsibilities • Design, develop, and maintain … applications, and networks • Ensure alignment with relevant standards and frameworks including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance • Produce and maintain security documentation including Security Architecture Documents, Security Risk Assessments and SecurityManagement Plans • Lead and support secure design reviews and contribute to engineering assurance gates • Liaise More ❯
The Information Security Specialist will play a key role in strengthening the organization's security posture. This role covers a broad range of responsibilities, including enhancing security controls, conducting security assessments, overseeing patch management, and supporting the implementation of information security solutions and related projects. What you'll do: Oversee the implementation, audit, and … assurance of information security policies, standards, guidelines, and procedures to maintain strong security practices. Ensure all business processes are aligned with the Group's information security policies and standards, driving consistency across operations. Contribute to the development and delivery of information security awareness, training, and education programs to strengthen staff knowledge and practices. Collaborate with internal … and external stakeholders to assess the effectiveness of security controls and ensure compliance with regulatory and organizational requirements. Assist in performing information security risk assessments, identifying vulnerabilities, and recommending preventive measures to mitigate risks. Support and participate in information security projects, contributing to the continuous enhancement of security measures across the organization. Provide support in handling More ❯
Head of Cyber Governance, Risk and Compliance" - London Hybrid Full-time Personal Contract REQ5121 As a strategic leader in Governance, Risk and Compliance, you will guide SGN's cyber security and regulatory approach, ensuring our operations remain secure, resilient and fully compliant. We deliver safety, warmth, and comfort to homes and businesses. Every role, whether in the office or … compliance with NIS-R, ISO27001/2, and NIST-2. Oversee delivery plans, resource allocation, and stakeholder engagement for GRC initiatives. Training & Awareness Develop and maintain SGN's Information Security training and awareness materials. Integrate lessons learned from incidents and address feedback from training delivery. Information Security Policy & ISMS Maintain a robust portfolio of security policies, standards … and procedures to support ISO27001, NIST, and NIS eCAF compliance. Ensure policies are current, reviewed regularly, and approved by key stakeholders. Manage SGN's Information SecurityManagement System (ISMS) and policy exceptions. Compliance & Assurance Monitor and report on compliance across SGN and third-party partners. Lead assurance reviews and support internal/external audits for ISO27001, NIST, and More ❯
pension scheme – Enhanced maternity/paternity pay – Life assurance – HolidayPlus – Cycle2work Scheme & more REQ5121 As a strategic leader in Governance, Risk and Compliance, you will guide SGN’s cyber security and regulatory approach, ensuring our operations remain secure, resilient and fully compliant. We deliver safety, warmth, and comfort to homes and businesses. Every role, whether in the office or … compliance with NIS-R, ISO27001/2, and NIST-2. Oversee delivery plans, resource allocation, and stakeholder engagement for GRC initiatives. Training & Awareness Develop and maintain SGN’s Information Security training and awareness materials. Integrate lessons learned from incidents and address feedback from training delivery. Information Security Policy & ISMS Maintain a robust portfolio of security policies, standards … and procedures to support ISO27001, NIST, and NIS eCAF compliance. Ensure policies are current, reviewed regularly, and approved by key stakeholders. Manage SGN’s Information SecurityManagement System (ISMS) and policy exceptions. Compliance & Assurance Monitor and report on compliance across SGN and third-party partners. Lead assurance reviews and support internal/external audits for ISO27001, NIST, and More ❯
Overview London - UK/IT/Navro - Pioneering the Future of Payments Architecting Trust: Information Security Manager This isn't just another Information Security role. No legacy systems. No corporate red tape. No coasting. This is about building something from the ground up. Fast. You won't have layers of approval slowing you down. You will have the … passenger role. We're bringing you in for your expertise and your relentless drive. You will be responsible for understanding our information assets, identifying emerging threats, and implementing robust security measures that protect Navro and our clients. Who We Are We are transforming payments for global platforms and e-commerce businesses. As the world's first payments curation platform … is inconsistent, you dive in, solve, and fix it. You're Hands-On - One hour you're leading on an external audit, the next assessing a critical vendor's security posture, the next you're deep in the vulnerability rating details with DevOps. You Thrive in Chaos - Startups are messy. Deadlines change, priorities shift, and ambiguity is constant. You More ❯
both Head Office and Field staff and escalate issues to 3rd line as appropriate Configuring/decommissioning users Building and configuring desktops/laptops Monitoring and checking backups, capacity, security, hardware/software and operating system issues with the fileservers and network equipment Monitoring and checking system logs Ensuring anti-virus/anti-spam is current and kept up … Office and Field users (SCCM knowledge would be beneficial to this role) Overseeing stock allocation in the Computer Room Comprehensive support for Microsoft environments Advanced troubleshooting of Microsoft Office & security applications Incident management and resolution User account lifecycle management Hardware and device setup Backup and system monitoring Log analysis and proactive maintenance Endpoint securitymanagement Collaboration with 1st Line Support Participation in IT projects Software deployment and patch management Asset and inventory management What we need from you: Proven experience working in a Service Desk function/1st Line Support Strong expertise in Windows 10/11 Proven experience with MS Office 365 Ability to work independently on 2nd line technical issues More ❯
What You'll Do: Provide accurate, valid, and appropriate responses to externally initiated security and data protection queries, questionnaires, or requests for information (RFI)/requests for proposals (RFP). Manage client-requested security reviews (on-site or virtual) including explanation of controls within the environment, presentation of evidence, planning and co-ordination of pre and post audit … activities. Assess the security risks associated with third party entities the Company works with to ensure appropriate controls are in place to maintain the Confidentiality, Integrity, and Availability of their environment(s). Perform the necessary on-site and/or remote third-party security assessments of critical third parties to ensure their controls are effective. Produce high … quality reports which articulate the risks associated with third parties and provide subject matter expertise guidance to support the next steps. Review contractual security clauses within agreements to ensure the Company can effectively meet its obligations and risks are managed. Take the lead on articulating the security posture and work with clients or third parties to find mutually More ❯
A well-established business is looking for an accomplished Head of Information Security to join its team based in London. Please note this is an office-based role, so you will work from the office 5 days per week. In this role of significant responsibility, you will design and lead the information security strategy for the organisation. Supported … by a Cyber Security Analyst you will provide InfoSec expertise, ensuring that the business has a secure, resilient and robust technology estate, and will also ensure that effective security governance policies and procedures are in place. In order to be suitable for this role, you must be a highly capable information security leader with a proven track … of delivering secure, compliant and robust systems and procedures. CISSP or similar accreditation would be highly advantageous to your application. Key responsibilities will include:- Evolving a cyber and information security strategy aligned with ISO27001 standards and business objectives. - Lead the design, implementation, and continuous improvement of the Information SecurityManagement System (ISMS) - Oversee risk management activities More ❯
A well-established business is looking for an accomplished Head of Information Security to join its team based in Uxbridge, west London. Please note this is an office-based role, so you will work from the office 5 days per week. In this role of significant responsibility, you will design and lead the information security strategy for the … organisation. Supported by a Cyber Security Analyst you will provide InfoSec expertise, ensuring that the business has a secure, resilient and robust technology estate, and will also ensure that effective security governance policies and procedures are in place. In order to be suitable for this role, you must be a highly capable information security leader with a … of delivering secure, compliant and robust systems and procedures. CISSP or similar accreditation would be highly advantageous to your application. Key responsibilities will include: - Evolving a cyber and information security strategy aligned with ISO27001 standards and business objectives. - Lead the design, implementation, and continuous improvement of the Information SecurityManagement System (ISMS) - Oversee risk management activities More ❯
A well-established business is looking for an accomplished Information Security Manager to join its team based in Uxbridge, west London. Please note this is an office-based role, so you will work from the office 5 days per week. In this role of significant responsibility, you will design and lead the information security strategy for the organisation. … Supported by a Cyber Security Analyst you will provide InfoSec expertise, ensuring that the business has a secure, resilient and robust technology estate, and will also ensure that effective security governance policies and procedures are in place. In order to be suitable for this role, you must be a highly capable information security leader with a proven … of delivering secure, compliant and robust systems and procedures. CISSP or similar accreditation would be highly advantageous to your application. Key responsibilities will include: - Evolving a cyber and information security strategy to achieve ISO27001 accreditation - Lead the design, implementation, and continuous improvement of the Information SecurityManagement System (ISMS) - Work with senior stakeholders to ensure alignment between More ❯
the better our work will be. Skin Analytics manufactures medical devices and complies with ISO standards 13485 and 27001. As part of your employment, you will be assigned Quality Management System (QMS) and Information SecurityManagement System (ISMS). We require that our employees agree to complete their assigned training and diligently follow all company quality management and information security processes. More ❯
Quality Management is an integral part of process compliance and continuous improvement across all aspects of the SCSJV project. The Quality Manager will work as member of the Quality Team, that is responsible for developing and maintaining the Quality Management System which includes the monitoring, maintenance and improvement of SCSJV policies, plans, procedures and associated documentation. Direct Report … will explore what is possible for the role. Role Responsibility The Quality Manager will be responsible for assisting the SCS Quality Team in development and implementation of the Quality Management Systems on site and the maintenance of the ISO9001:2015 certification. Understand the Client and SCSJV's Policies, Processes, Works Information, statutory requirements and ensure that the set requirements … quality assurance activities to ensure that it complies with the Works Information and aligned with HS's Quality requirements. Accountable for reporting on the site-specific performance of the management system, on quality KPIs and ensuring records are produced contemporaneously and efficiently. Support the Package Manager to ensure that Supply Chain have develop their Quality Plan, ITPs and procedures More ❯
headquartered in the UK and FCA-regulated. The Role Goji is looking for a hands-on Head of IT to build and nurture our IT function, ensuring seamless infrastructure, security, and user support. This role provides an exciting opportunity to shape IT operations with a people-first approach, designing systems, processes, and policies that support our teams in doing … The Head of IT will report to the CTO and work closely with key stakeholders across the company to create and deliver an IT strategy that balances operational efficiency, security, and a positive employee experience. We are looking for someone who is collaborative, inclusive, and passionate about enabling teams through technology. How you'll contribute Develop and deliver a … term growth. Lead and uplift IT operations and support functions, ensuring a seamless and reliable experience for all teams across the organisation. Work in close partnership with the Information Security Officer (ISO) to continuously evolve our Information SecurityManagement System (ISMS), balancing strong protection with ease of adoption. Provide efficient, empathetic IT support across hardware, software, VPNs More ❯
Engineer with a solid range of skills. The role: This area of the business plans, builds and runs the global infrastructure and is additionally responsible for the IT service management to the operating entities of the various Group markets. The Virtual Infrastructure Services team is committed to bringing the best computing experience to the internal clients (platforms, office and … routine system audits and capacity planning Collaboration and Documentation: work with development teams and other IT staff to support infrastructure needs and maintain comprehensive documentation of systems and procedures SecurityManagement: implement and maintain security best practices for infrastructure, including patch management, antivirus solutions, and vulnerability assessments (Support) The automation of recurrent activities Propose harmonisation of … support (incident, alerts, changes. Provide on-call support during out-of-business hours (24/7 watch duty)- one is every eight weeks. Take part in the disaster recovery management for the virtual infrastructure. Offer consulting services to "OS" teams (Windows, Linux, Office, Tandem, Mainframe), projects and other customers Develop solutions based on analysis of business and technical requirements. More ❯