South Central Ambulance Service NHS Foundation Trust
Job summary An exciting opportunity has arisen within the Digital Senior Leadership team at South Central Ambulance Service for a Head of Cyber Security (HCOS). We are looking for an enthusiastic, highly motivated, and flexible individual with excellent leadership, technical, interpersonal, communication and organisational skills to lead the Cyber Security Team responsible for safeguarding the Trust's … information, physical assets and cyber infrastructure. Strong stakeholder relationships are vital to this role, both within the trust and with external partners. With a proven track record in management and leadership, you will provide guidance, direction and mentorship to the team and help to develop junior members of staff in their careers. Alongside these responsibilities, it will be important … be Northern House, Bicester. However, ability to attend SCAS sites as required is an important element of the post'. Main duties of the job The Head of Cyber Security (HCOS) will develop, implement and oversee the Trusts cyber security policies, procedures, and strategies. The post holder has operational responsibility for the management of the Cyber SecurityMore ❯
The Role We are looking for an exceptionally seasoned Security Architect with over 15 years of progressive experience, including extensive leadership in designing and implementing robust security architectures, particularly within large-scale cloud environments and the highly regulated financial domain. This role demands a deep understanding of complex security challenges, a proven track record of strategic influence … and the ability to translate business requirements into secure, scalable, and compliant technical solutions. Your responsibilities: Strategic Security Leadership: Define, evangelize, and evolve the overall cloud security architecture strategy and roadmap, aligning with business objectives, relevant European regulatory requirements (e.g., GDPR, DORA, PSD2, NIS2 Directive), and industry best practices. Act as a trusted security advisor to senior … leadership, engineering teams, and business units on all aspects of cloud security. Lead the development and implementation of security architectural standards, patterns, and guidelines for cloud-native and hybrid-cloud deployments. Solution Design & Assurance: Provide expert security architecture guidance for critical enterprise applications, infrastructure, and data platforms, with a strong focus on secure-by-design principles. Conduct comprehensive More ❯
Woodstock, Oxfordshire, South East, United Kingdom
Ridge & Partners LLP
and its subsequence updates are fully tested before entering the production environment Proactively look at ways of making improvements in all areas of the clients IT Apply knowledge of InformationSecurity to ensure all company data and systems are kept safe from threats Attend and/or host regular status meetings with the team and management Effectively communicate … IT or any other relevant information to colleagues in a timely manner Technical Skills Essential understanding of: Security Infrastructure Cyber Security best practices Windows Desktop environments, including the latest Windows Version Windows Server OS Microsoft 365 Cloud Platform Networking systems and services Virtualisation technologies such as VMware/Hyper-V InformationSecurity best practices ITIL More ❯
its subsequence updates are fully tested before entering the production environment Proactively look at ways of making improvements in all areas of the client’s IT Applies knowledge of InformationSecurity to ensure all company and client data and systems are kept safe from threats Approaches issues in a logical manner and takes ownership through to completion Technical … Skills and Qualifications Essential Security Infrastructure (Firewalls etc) Windows Desktop environments, including the latest Windows Version Windows Server (Apply online only) Microsoft Exchange Server 2013/2016/Office 365 Networking – LAN, VLAN’s, Wi-Fi, WAN, Firewalls Virtualisation – VMware/Hyper-V Understanding of InformationSecurity best practices Understanding of ITIL best practices Good knowledge of More ❯