find a community to belong to. We believe that, by celebrating different backgrounds and different perspectives, together we’ll achieve the extraordinary. Job description Are you passionate about safeguarding information and shaping the future of cyber security within the Ministry of Defence? Do you thrive in roles where precision, policy, and protection intersect? This exciting opportunity places you at … the heart of informationassurance, where you'll support the Information Asset Owner in maintaining and developing key policy documentation used across the MoD and its supply chain. You'll play a vital role in ensuring that information is managed and protected in line with established policies, contributing to both internal and external audits and assurance … will need regular workplace attendance due to security constraints. Candidates are encouraged to discuss options with the recruiting line manager before submitting an application. Responsibilities: Lead a team of InformationAssurance analysts to ensure high quality work is delivered that meets the needs of the business and required standards Provide expert advice and guidance in supporting the delivery More ❯
Cleveland, England, United Kingdom Hybrid / WFH Options
Reed
Compliance Analyst (InformationAssurance) Location: Teesside Department: Digital/ICT Contract Type: Permanent Salary: Up to £45,000 per annum, depending on experience About the Role Are you a recent graduate with a keen interest in data protection, privacy, and information security? We’re looking for a motivated and detail-oriented Graduate Compliance Analyst to join our … team and support our informationassurance efforts. This is a fantastic opportunity to kickstart your career in a growing field, working alongside experienced professionals and gaining hands-on experience with GDPR, data governance, and security frameworks. What You’ll Learn and Do Support the team in monitoring compliance with GDPR and other data protection regulations. Help conduct and … the Register of Processing Activities (ROPA) . Contribute to the development and review of data protection policies. Learn about data classification and help ensure appropriate access controls. Collaborate on information security projects , including risk assessments. Provide guidance to internal teams on data protection best practices. Help respond to data subject access requests (DSARs) and regulatory queries. What We’re More ❯
Middlesbrough, North Yorkshire, North East, United Kingdom Hybrid / WFH Options
Reed Technology
Compliance Analyst (InformationAssurance) Location: Teesside Department: Digital/ICT Contract Type: Permanent Salary: Up to £45,000 per annum, depending on experience ?? About the Role Are you a recent graduate with a keen interest in data protection, privacy, and information security? We're looking for a motivated and detail-oriented Graduate Compliance Analyst to join our … team and support our informationassurance efforts. This is a fantastic opportunity to kickstart your career in a growing field, working alongside experienced professionals and gaining hands-on experience with GDPR, data governance, and security frameworks. ?? What You'll Learn and Do Support the team in monitoring compliance with GDPR and other data protection regulations. Help conduct and … the Register of Processing Activities (ROPA) . Contribute to the development and review of data protection policies. Learn about data classification and help ensure appropriate access controls. Collaborate on information security projects , including risk assessments. Provide guidance to internal teams on data protection best practices. Help respond to data subject access requests (DSARs) and regulatory queries. ?? What We're More ❯
Snelshall West, Milton Keynes, Buckinghamshire, England, United Kingdom
DS Smith
About the role Here at DS Smith, a multi-national sustainable packaging provider, we are looking for a Security Assurance Analyst to join our growing Security Team. The mission of the I&T Digital Security organisation is to deliver an efficient and effective service that has scalability and flexibility to support the demands of a FTSE 100 business.Supporting Head … of Information Security Architecture and Assurance as well as working closely with key stakeholders including Head of Governance, Risk and Compliance, Digital Security, IT and business teams you will focus on core areas such as risk management and security due-diligence reviews ensuring compliance with legal, regulatory and relevant security policies and best practices.In this position you will … provide assurance and guidance that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policies.Visibility and the ability to build close working relationships with Information & Technology (I&T) team members, business stakeholders as well as external partners is essential. This will require some ‘on site’ visits, on a planned More ❯
opportunity to take on various responsibilities throughout the project life cycle, collaborating with a broad spectrum of clients and pioneering technologies. Your tasks may encompass offering valuable insights on informationassurance matters, contributing to the formulation of IA strategies, policies, guidance, and awareness initiatives, orchestrating and overseeing security work programs, defining rigorous security requirements, devising and implementing robust … security architectures, and supervising the secure development and accreditation of information systems. Start a fulfilling consulting career where you'll specialise in applying your expertise in informationassurance and cyber security to address a diverse array of business challenges. Throughout your journey, you'll have the invaluable guidance of a dedicated career mentor who will offer support … activities. Your responsibilities may also involve: Offering your security expertise in support of significant system procurements and Agile programs, ensuring the secure delivery of solutions. Identifying, analysing, and evaluating information risks across various programs, projects, and systems. Communicating with risk owners and stakeholders to elucidate the origins, likelihood, and potential business impacts of information risks across the informationMore ❯
Save the Children International has an exciting opportunity for a Specialist, Information Security to join our global team. Team purpose The SCA Information Security and Data Protection Team is responsible for supporting our Members in safeguarding the confidentiality, integrity, availability of all information assets (data and systems). The team is responsible for identifying, assessing and managing … Member information security and data protection risks and helping Members improve their information security programmes. Role purpose The SCA Information Security Specialist will act as the primary contact for information security matters between SCA Member organisations and SCI within the region to which they are assigned and offer independent objective advice, guidance and support for the … teams. They will also be required to lead or assist with incident management processes both in SCI and SCA Members. This role will also work closely with the SCI Information Security and Data Protection Team to promote the sharing of best practice and ensure alignment between SCI and Member information security and data protection programmes. Job Title: Specialist More ❯
Middlesbrough, North Yorkshire, North East, United Kingdom Hybrid / WFH Options
Reed Technology
Compliance Analyst (InformationAssurance) Location: Teesside Department: Digital/ICT Contract Type: Permanent Salary: Up to £45,000 per annum, depending on experience About the Role We're looking for a proactive and detail-focused Compliance Analyst to support our informationassurance and data protection efforts. This is a great opportunity for someone with a solid … foundation in GDPR and data governance who's ready to take ownership of compliance processes and contribute to wider information security initiatives. You'll work closely with teams across IT, HR, and Operations to ensure our data handling practices meet legal and regulatory standards, while helping to embed a culture of privacy and security across the organisation. What You … Activities (ROPA) . Assist with the development and review of data protection policies and procedures. Support data classification initiatives and ensure appropriate access controls are in place. Collaborate on information security projects, including risk assessments and incident response planning. Liaise with internal teams to provide guidance on compliance and data protection matters. Help respond to data subject access requests More ❯
What You'll Be Working On: ️ Managing and enforcing information security policies, procedures, and standards to safeguard organizational data ️ Conducting risk assessments and ensuring compliance with relevant security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems … Providing expert guidance on data classification, encryption, and access controls to maintain the integrity and confidentiality of sensitive data What We're Looking For: ️ Proven experience as an InformationAssurance Specialist or in a similar role focused on data protection and compliance ️ Strong understanding of informationassurance frameworks (e.g., ISO 27001, NIST SP 800-53, COBIT More ❯
billion on behalf of major pension funds, endowments, foundations, governments and other investors based in the U.S. and abroad.Position Overview:The Senior Security Engineer, reporting to the Director of InformationAssurance, is responsible for cloud platform and DevOps security. This senior role will call upon the candidate's DevSecOps experience to help Acadian Shift Left, injecting security directly … Establish development best practices for working with code libraries such as docker, pypi and others, ensuring that libraries are only obtained from trusted sources, e.g. Jfrog Artifactory. Assist the InformationAssurance team with data leak prevention techniques aimed at preventing the exfiltration of code from the Acadian network. Work with the Identity and Config team to ensure least … zone architecture with autoscaling. Assist with code governing configuration of an AWS-based global network, including third-party security tools such as Zscaler and Palo Alto Networks. Help the InformationAssurance team support IT service delivery to Acadian business units 24x7 as part of an on-call rotation, including interaction with MSSP incident responders. Work with other IT More ❯
Chelsea and Westminster Hospital NHS Foundation Trust
business opportunities and services. Collecting, interpreting, and writing a wide range of technical specifications to support clinical and operational research and contracts for services. Leading on the data quality, information governance, data processing and informationassurance for the portfolio of projects within ICHP Using visualization or statistical applications such as R, Python, or Excel to present information … business opportunities and services. Collecting, interpreting, and writing a wide range of technical specifications to support clinical and operational research and contracts for services. Leading on the data quality, information governance, data processing and informationassurance for the portfolio of projects within ICHP Using visualization applications to present information and share findings in a creative and … SQL Management Studio, and having demonstrable understanding of the data warehousing frameworks. Writing complex R or Python scripts, utilizing AzureML, in the data and statistical analysis required. Handing conflicting information and making decisions under uncertainty in the absence of clear guidelines or precedent, seeking advice and verification as necessary from more senior management when appropriate. Undertaking ad-hoc analysis More ❯
in-house courses, leading to nationally recognized qualifications in areas such as Project Management, Agile methodologies, Business Analysis, IT Service Management, Cyber Security, and Technology Procurement. Responsibilities Providing technical assurance that proposed solutions are fit for purpose. Developing new architectures to mitigate risks posed by emerging technologies and business practices. Advising clients on informationassurance, architectural issues … findings, and recommending remedial actions to stakeholders. Investigating security incidents. Promoting security awareness within project teams and the organization. Candidate requirements: HMG Security Policy Framework (SPF) familiarity and NCSC InformationAssurance Portfolio knowledge gained through studies. Masters degree in Information, Cyber, or Systems Security, along with a strong Cyber/STEM background. Eligibility and willingness to obtain … Recruitment Limited. Note: Due to high application volume, responses may be delayed. If you haven't heard within 3 working days, your application may be unsuccessful. Contact/Further Information If interested in this vacancy or others, or to speak with a consultant, please use the contact details below. Job Title: Graduate Cyber Security Consultant - 5295 Job Reference More ❯
A great place to work. Careers At Solvere Technical Group Current job opportunities are posted here as they become available. Solvere Technical has an immediate need for an ONSITE Information Systems Security Engineer (ISSE) at Navy Information Warfighting Development Center (NIWDC) based in Norfolk, Virginia. MUST be a US CITIZEN, live close to NORFOLK, VA, have an ACTIVE … Supports our customer providing system Risk Management Framework (RMF) ATO security engineering services and documentation. Support the Government to ensure core security engineering principles are implemented into assigned programs information systems architecture. Determine client security control requirements and support security categorization of the system. Implement security controls utilizing eMASS and Xacta 360 support tools. Conduct certification and testing in … CompTIA Security+ CEU or equivalent certification (CISSP, SSCP, CSA+, or equivalent). MUST have an Active DoD 8570 IAT II certification. MUST have a Bachelor's degree in Cybersecurity, InformationAssurance, Computer Science, or equivalent 5+ years experience. Must be Proficient in Microsoft Office tools. (Power Point, Word, Visio, etc.). Must have excellent technical writing, reporting and More ❯
the market for assured Data at Rest solutions and is rapidly growing its business where we are looking for a System Design Engineer to work across multiple Cyber and InformationAssurance (IA) development projects within Viasat Government. You will work on identifying how to apply complex and innovative solutions to real world problems for the development of our … unique product range. You will play a key role by assuming the overall system engineering and technical lead role on one or more InformationAssurance developments. In addition to product development activities, you will also provide technical support to bid proposals. This involves collaborating closely with subsystem teams to develop technical solutions and ensuring coherency across technical subject More ❯
Technical Controls Assurance Specialist Lancashire £45,000 - £50,000 + Performance Bonus Permanent Role - On Site Your new role I'm currently looking for a Technical Risk Controls Assurance specialist to work for a Lancashire-based organisation to assist with the maintenance, enhancement and assurance of technical controls during a period of change. The ideal candidate will … have a firm knowledge of ITGCs and experience driving and testing controls, and may have come from an IT Audit or information security risk background, possessing the relevant framework knowledge that comes with this role history. Responsibilities: Technical control enhancement, development and implementation Testing business-wide IT controls against an annual schedule Supporting informationassurance and controls … teams Scheme attestations - thorough reviews of control statements Supporting technical operations, supplier management and operational resilience on risks, with the view to creating, driving and providing assurance on preventative, detective and directive technical controls Working with key stakeholders and embedding your understanding of information security from a controls perspective Taking ownership of assurance activities pertaining to technical More ❯
attributes to engage and influence audiences of all levels with patience, rationality and confidence. An ability to work autonomously and within a multi-disciplinary environment and draw out key information required from stakeholders to progress the security team's efforts. IT literate with an ability to deliver high-quality technical documentation under strict timescales and parameters. Comfortable delivering in … uncertain conditions and against competing requirements, where the picture can at times be unclear during the design process. Ability to apply expected informationassurance and compliance policies to everyday practice. A background of working in a physical security capacity within government, law enforcement or pertinent physical security experience in a corporate or similar setting, combined with demonstrable experience … and Adversarial pathways. Regulatory Requirements Experienced in engaging directly with regulators. Ideally understands nuclear security regulatory requirements, however, experience in other regulatory environments will be considered. Control of Classified Information Demonstratable understanding of the protection of classified information; e.g. Sensitive Nuclear Information, commercially sensitive information and Intellectual Property. More ❯
attributes to engage and influence audiences of all levels with patience, rationality and confidence. An ability to work autonomously and within a multi-disciplinary environment and draw out key information required from stakeholders to progress the security team's efforts. IT literate with an ability to deliver high-quality technical documentation under strict timescales and parameters. Comfortable delivering in … uncertain conditions and against competing requirements, where the picture can at times be unclear during the design process. Ability to apply expected informationassurance and compliance policies to everyday practice. A background of working in a physical security capacity within government, law enforcement or pertinent physical security experience in a corporate or similar setting, combined with demonstrable experience … and Adversarial pathways. Regulatory Requirements Experienced in engaging directly with regulators. Ideally understands nuclear security regulatory requirements, however, experience in other regulatory environments will be considered. Control of Classified Information Demonstratable understanding of the protection of classified information; e.g. Sensitive Nuclear Information, commercially sensitive information and Intellectual Property. More ❯
attributes to engage and influence audiences of all levels with patience, rationality and confidence. An ability to work autonomously and within a multi-disciplinary environment and draw out key information required from stakeholders to progress the security team's efforts. IT literate with an ability to deliver high-quality technical documentation under strict timescales and parameters. Comfortable delivering in … uncertain conditions and against competing requirements, where the picture can at times be unclear during the design process. Ability to apply expected informationassurance and compliance policies to everyday practice. A background of working in a physical security capacity within government, law enforcement or pertinent physical security experience in a corporate or similar setting, combined with demonstrable experience … and Adversarial pathways. Regulatory Requirements Experienced in engaging directly with regulators. Ideally understands nuclear security regulatory requirements, however, experience in other regulatory environments will be considered. Control of Classified Information Demonstratable understanding of the protection of classified information; e.g. Sensitive Nuclear Information, commercially sensitive information and Intellectual Property. More ❯
Senior Information Security Consultant NPPV3 Cleared (Law Enforcement) 6 month contract Outside IR35 - £650-£750 per day 1 day per week on site in London, 4 days WFH Starting ASAP (1-2 weeks' notice) IO Associates are currently looking for a NPPV3 Cleared Senior Information Security Consultant for a 6 month contract with one of our long-term … consultancy clients working in the UK law enforcement and cyber resilience sector . This role focuses on informationassurance, risk management, and compliance activities within a highly regulated environment. The ideal candidate will have a solid background working with UK policing or Home Office programmes , or directly with police forces across the UK. NPPV3 Clearance is essential, and … you must be based in the UK. Key Skills and Experience: Extensive experience applying standards such as ISO27001 , NIST , JSP440/JSP604 , and NCSC guidance Proven background in information risk management , governance , and security assurance Experience leading or contributing to risk assessments , audits , and security documentation Strong knowledge of technical and organisational controls , including endpoint and network security More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
About the Role We are seeking a highly experienced and motivated GRC Lead to join our Cyber Security team. This role is critical in shaping and delivering our informationassurance strategy, ensuring that cyber security risks are effectively managed across the organisation. As a senior member of the team, you will lead a small group of risk and … significant project pipeline launching in 2026, this is a unique opportunity to influence the future of cyber security governance in a regulated environment. Key Responsibilities Own and evolve the Information Security Assurance Framework and programme. Lead themed reviews to assess the effectiveness of security controls. Manage the organisation's technology risk management programme , ensuring risks are identified, assessed … and recommendations to senior stakeholders and leadership teams. Ensure timely and accurate submission of compliance documentation, including NHS audits and DSPT submissions. Skills & Experience Minimum 5 years' experience in information security , with a focus on governance, risk, and compliance. Proven ability to lead teams and manage complex programmes in regulated environments. Strong understanding of cyber security frameworks and regulations More ❯
Employment Type: Permanent, Part Time, Work From Home
network with hiring managers, discover roles not available online, and attend speaker sessions by leading employers from across the UK. Job Opportunities Security Engineer CISO Cloud Security DevSecOps Engineer InformationAssurance Specialist Information Security Analyst Threat Intelligence Director of Information Security The event is FREE to attend. Register today and meet your next employer. Subscribe Now … Cyber Shots Quick, punchy updates on cyber trends, news, and links to free resources. Only via Telegram and Signal. Join the groups now! CISOMAG is the handbook for Chief Information Security Officers (CISOs), CXOs, and all stakeholders of a safe internet. Contact us: More News CyberSecMY Conference 2025 - May 21, 2025 Cyber Secure Forum - May 21, 2025 CISO Indonesia More ❯
lead across multiple projects and platforms, with extensive latitude for independent judgment to drive the required outcomes for Aker and its customers. You will: Lead client-specific security and assurance of highly complex, cloud-centric data and digital services across entire lifecycle (strategy, design, implementation and operations) Provide specialist advice and knowledge of HMG government security architecture and assurance … external security testing (e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG InformationAssurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series … architecture experience across multiple domains: Cloud, Network, Infrastructure, Application, Data, IAM Cloud security concepts, technologies and best practices for delivering security across IaaS, PaaS, SaaS and Serverless architectures Implementing Information Security and Privacy Standards and Frameworks (e.g. ISO 27k, NIST800-53, CIS, GDPR) Leading security working groups and external security testing (ITHC, Penetration Testing, etc) of cloud solutions at More ❯
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetration testing and informationassurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
love to hear from you if you can demonstrate expertise in at least one of the following areas : Security governance, risk and compliance (GRC), aligned with HMG cybersecurity and informationassurance policies, standards, and guidance with experience in consultancy or supplier roles. Securing OT (Operational Technologies) with knowledge and understanding of challenges, particularly within military platforms and/ More ❯
consecutive days or more spent outside of the UK) and declaration of being a British passport holder with no dual nationalism at the point of application. Note: The above information relates to a specific client requirement Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting, interactive, technology and operations, with … Security background, will perform as a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. In addition to working closely with Informationassurance and pen test teams to validate effectiveness of security controls or define new security solutions in an agile, innovative and team centric manner. Flexibility and mobility are … with key stakeholders, peers and subordinates. Communicating effectively verbally and in writing, demonstrated through: Effectively explain complex technical solutions to a non-technical audience Writing meaningfully to deliver clear information, and guidance Giving impactful presentations, articulating clearly key points Critical thinking and problem solving within information technology. What's in it for you At Accenture in addition to More ❯
Cybersecurity. Lead enterprise security strategy, develop cutting-edge cybersecurity services, and drive business growth across global markets. Apply now to shape the future of digital security. Reports to : Chief Information Security Officer (CISO) Position Overview The Cybersecurity Director is a strategic leader responsible for both safeguarding the organisation's digital assets and driving revenue through the development and delivery … and problem-solving mindset. Highly organized and efficient. Demonstrated strategic and tactical thinking, along with decision-making skills and business acumen. Education Requirements Bachelor's degree in computer science, informationassurance or related technical field. Certification Requirements Preferable to have one or more of following certifications: CISSP, CISM, CRISC, CISA What We Offer 5 working days a week More ❯