discuss further on +44 (0)203 854 2230 or send your CV to m.smith@locke-mccloud.com. Locke & McCloud are the UK’s leading cyber security & informationsecurity staffing company – through having a sole focus on the cyber & informationsecurity space we have been able to … foster solid relationships with some of the UK’s most exciting cyber security consultancies & end-users. Our focus on the informationsecurity space allows us to be able to help you find the most exciting opportunities in the cyber security market. If you are on the … lookout for your next cyber security or informationsecurity role, please get in touch more »
Cyber Security Lead – Leeds (hybrid) - £65,000 - £85,000 + Bonus + Benefits Locke & McCloud are looking for an experienced Cyber security professional to join our client. The Cyber Security Lead will be responsible for ensuring the integrity and availability of our clients' data and acting as … the primary cyber security interface within the IT Department. This role requires strong leadership and analytical skills, along with a deep understanding of the company's products, services, and Service Management processes. By leveraging advanced technical expertise and a commitment to customer service, the Cyber Security Lead will … secure the company's and its customers' data infrastructure. Main Responsibilities: daily operations of the Cyber Security Team, including scheduling to ensure adequate resources, conducting quality reviews, and ensuring compliance with established processes and procedures. in for the Cyber Security Manager when needed. and manage the Securitymore »
At Ripple, we’re building a world where value moves like information does today. It’s big, it’s bold, and we’re already doing it. Through our crypto solutions for financial institutions, businesses, governments and developers, we are improving the global financial system and creating greater economic fairness … is improving the global financial system and increasing economic inclusion for more people, in more places around the world. Ripple is looking for passionate InformationSecurity professionals to build a world class InformationSecurity program. As part of the InformationSecurity team, you will … across teams and functions Understands and anticipates people's needs, skills, and abilities, to coach, motivate and empower them for success Nce to have infosec certifications: CISSP, CEH, CISA, CRISC Nice to have core certifications such as: CCNA, CCNP WHO WE ARE: Do Your Best Work The opportunity to build more »
Peaple Talent have partnered with a large retail organisation based in Northampton who are recruiting an InformationSecurity Cloud Analyst. You will be responsible for maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat … intelligence and the management of security testing in order to reduce operation informationsecurity risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerability management programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers … and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of InformationSecurity Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring effective communication and prioritisation of incidents between the Security Operations Center and support teams. Supporting the ISI process for more »
Group Cyber Security Operations Manager//Enterprise Bus & Rail Business//Up to £60k + Package//Flexible Working Arrangement Summary My client is seeking a highly skilled and experienced Group Cyber Security Operations Manager to join their company providing Bus and Rail services in … the UK. As the Group Cyber Operations Manager, you will be responsible for leading and managing all aspects of cyber operations to ensure the security and integrity of the organisation's digital assets and infrastructure and acting as a deputy for the Group Head of Cyber Security Operations … leading a team of Group Cyber Security Analysts and Group Senior Pen Tester. Key Responsibilities Develop and implement cybersecurity technical standards in-line with industry best practice and policies to safeguard the company's information systems and data. Lead a team of cybersecurity professionals to monitor, detect, and more »
Senior InformationSecurity Manager Centrica Energy is the trading arm of Centrica. We trade gas, power and LNG and provide the route to market for our upstream and power generation operations. We provide our clients with the best route-to-market services available to the market today, integrating … London, Denmark, Germany, Sweden and Singapore. In response to the escalating cyber threats and stringent regulatory demands, Centrica Energy is looking for a Senior InformationSecurity Manager to join our InformationSecurity team! This role is pivotal in fortifying our cybersecurity defences, ensuring compliance, and fostering … customer trust through enhanced data protection. As a Senior InformationSecurity Manager, you will lead strategic security initiatives, optimise cost efficiency by mitigating breach-related expenses, and empower secure business innovation. Ultimately, you will not only safeguard our current operations but also drive business value by enabling more »
Title: Lead Product Security Engineer Location: Hybrid Remote (Central London Office); Sector: Finance/Retail, Apparel and Fashion Salary: Banding of £85,000 - 115,000 per year plus package (to be discussed during vetting call). Please note that to apply for this opportunity, you must be a British … security engineering or a similar role, with demonstrated leadership experience in managing a team of peers. As dedicated recruitment professionals, we prioritize confidentiality. InfoSec People values diversity, equity, and inclusion (DE&I). Please share any information or accessibility needs to aid your process; we’ll do our … to specific requirements. For further details, please send the most current version of your CV and a good time to speak to Becca at InfoSec People, or please click apply or get in touch with Becca for an open, honest, and confidential conversation; 📞 01242 507109 📧 becca@infosecpeople.co.uk more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Picture More Ltd
Are you an experienced InformationSecurity professional looking for your next challenge? We have an exciting opportunity with a leading firm in the legal sector based in Birmingham. As the Subject Matter Expert within the Technical Services and Security team, you'll play a key role in … managing and maintaining the InformationSecurity Management System (ISMS) and embedding a culture of security by design across the firm. The role offers hybrid working, 2 days a week in the Birmingham office, giving you a great work/life balance. Key Responsibilities: To manage, maintain and … monitor the InformationSecurity Management System (ISMS) To bridge the gap between strategic activities and technical experts To work with the IT organisation and business management to align security priorities and plans with key business objectives. Skills and Experience: A minimum of 3 years’ experience working within more »
A Cyber and InformationSecurity Manager is needed to oversee the security operations within a global technology business. The successful candidate will be responsible for creating, implementing, and managing security protocols across the EU region. It is a hybrid role working in Manchester but with high … dedicated employees in Europe, the company is dedicated to providing technology solutions and services for businesses of all sizes. Description Work closely with global security team to enhance the regional informationsecurity level to global standard Develop and implement security road-map, policies, protocols and procedures … Ensure the alignments of security best practice and related frameworks Oversee day to day security operations which is supported by third party vendor, direct reports and internal teams Manage the process of security architecture design and integration Lead the investigation of security breaches and incidents, follow more »
GRC team in the UK. This role is home-based, with travel to client sites . You'll be part of a team delivering security consultancy in a client-facing role, with a particular focus on: PCI DSS consultancy and assessments Security reviews against standards or guidelines such … as the NCSC 10 Steps to Cyber Security and NIST CSF ISO 27001 gap analyses Helping our clients to implement InformationSecurity Management Systems and achieve and maintain ISO27001 certification Conducting risk assessments Creating or supporting third-party risk management and audit programmes Essential skills and experience … Have experience working with the NIST CSF A good understanding of core concepts and technologies. For example, networking, Windows and Linux operating systems, and security technologies such as antimalware, IDS/IPS, etc. You do not need hands-on experience with these technologies or to have worked in an more »
management. Drive initiatives to transform IAM provisioning and lifecycle management, leveraging self-service and automation capabilities to enable a frictionless user experience. Knowledgeable of InformationSecurity best practices and regulatory and compliance requirements that impact security for the enterprise: HIPAA, HITECH, PCI, NIST Cybersecurity Framework, NIST … ISO 27001, HITRUST, and other relevant privacy and security frameworks. Drive a unified IAM approach and maintain an integrated program role-based access control, single sign-on, multifactor authentication, account federation, identity lifecycle, birthright access, access certifications and group management. The leader will build and seek cross functional, cross … as PKI and certificate management, encryption, Privileged Access Management, IDAM, and CASB for the enterprise. Major/Key Accountabilities Deliver excellence in IAM cyber security across the Brambles enterprise. Lead transformational change across the enterprise IAM space, consolidating and integrating disparate systems and processes into a fully capable service more »
out daily. We excel at Bottomline because we are positive and passionate about building a #LifeAtBottomline Role Bottomline Technologies is looking to hire an InformationSecurity Compliance Manager . This is a role for an early in career person (3-5 years’ experience). This role focuses on … protecting our customers’ confidential information as part of our operational security and compliance framework. Working closely with CISO, Technology, HR, Sales and Product Development teams, the InformationSecurity Compliance Manager plays a pivotal role in ensuring that our product teams maintain our high expectations of InformationSecurity compliance across the company. This position can be based out of an open location in either the United Kingdom (UK) or the United States (US) How you’ll contribute: Manage annual and ad hoc InformationSecurity compliance projects as part of the global CISO team. more »
I am currently assisting a leading London market insurer to recruit an InformationSecurity Specialist. This leading company has a reputation for specialist underwriting excellence, great people and innovative products. As part of one of the world’s largest insurance groups within the London market. This role is … based onsite with some opportunity for hybrid working to join their growing InformationSecurity team. The InformationSecurity Operations Specialist is responsible for maintaining and improving the security operations tools and procedures. With a focus on prevention, detection, analysis, and remediation of technical security risk. You will ideally have: • Excellent knowledge of security technologies and domains, such as endpoint protection tools, vulnerability scanners, attack simulation, network security, cloud security, etc. • Familiarity with DevOps principals and technologies such as Infrastructure as Code (IaC). • Experience working within Insurance/London Market more »
Can you work as a part of a dedicated InformationSecurity team, contributing to security-related initiatives? My client is an (re)insurance firm partnered with a global financial institution who are managing intricate risks and are innovating a method to blend data, advanced automation, and human … audit and assurance tasks. Manage and report IT risks. Collaborate with key stakeholders (Procurement, Delegated Authority, Compliance, Risk, Operations, Technology Services). Contribute to security initiatives within the InformationSecurity team. Conduct third-party cybersecurity maturity assessments and provide feedback. Develop and report informationsecurity metrics. About you Demonstrable background in InformationSecurity/Security Assurance. Experience conducting cyber maturity assessments and managing findings. Strong communication, influencing, and relationship management skills. Experience in IT Audit/Recertifications (e.g., access control reviews) is desirable. Ability to produce management information for reporting. more »
Cambridge, Cambridgeshire, East Anglia, United Kingdom
Guarding UK
detail and exceptional service standards. As a member of the SIA Approved Contractor Scheme (ACS), we proudly rank in the top 0.5% of UK security companies, reflecting our excellence in internal processes, best practices, and employee development. Our wide-ranging industry accreditations demonstrate our dedication to delivering bespoke security solutions that precisely meet our clients' unique needs. Key Responsibilities: As our newly appointed Security Operations Manager you will manage day-to-day security operations, ensuring the protection of all visitors, tenants, and assets. You will lead a dedicated friendly team, fostering a culture of excellence and … continuous improvement in security service delivery. People Management: Leadership: Inspire and lead a diverse security team, ensuring high morale and performance. Training & Development: Conduct thorough inductions, site-specific training, and regular performance appraisals. Promote ongoing professional development. Operational Management: Coordinate employee holidays, manage sickness absences, and resolve payroll more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
a crucial role in providing dedicated support to the team. Your responsibilities will involve addressing a wide range of matters related to privacy and informationsecurity regulations, including GDPR, CCPA, DORA, and EBA (material outsourcing). You’ll be the first line of escalation, assisting with drafting, implementing … a highly trusted and dynamic team that works in close partnership with the business to help drive maximum results. Responsibilities and Impact: Privacy and InformationSecurity: You’ll be at the forefront of privacy and informationsecurity matters. This includes drafting and implementing privacy strategies, negotiating … DORA Expertise: As part of the escalation point for DORA-related queries, you’ll draft appropriate DORA terms, negotiate with clients, and collaborate with informationsecurity teams affected by DORA. Legal Advisory: Your in-depth knowledge of privacy and informationsecurity laws and regulations will guide more »
Project Security Specialist Location: UK, preferably South based due to site locations Are you a leader looking to launch your career to the next level? The Role: Leidos is seeking an enthusiastic Project Security Specialis t to lead the implementation and assurance of security within our diverse … portfolio of contracts. The incumbent will possess specialist skills in all areas of protective security and have demonstrable experience of applying security frameworks such as the security policy framework and ISO 27001. Responsibilities: Reporting to the Leidos UK Head of Security, you will work both independently … and within small teams across various projects, frameworks and in support of business development activities to: Lead the interpretation and implementation of contractual security obligations providing expertise as Security Advisor on security policy requirements, security aspects letters, industry security best practice and project securitymore »
We currently have an interesting opportunity for an InformationSecurity Manager to join Ciphr. We are all about people at Ciphr. Our values are trust, service excellence, authenticity, and accountability. We want you to bring your authentic self to work giving you the space to be yourself whether … you when you join. Location: This role is remote with occasional travel to our Reading office. On a day-to-day basis of an InformationSecurity Manager, this is what you can expect: Manage the company’s ISMS and ISO27001 certification Create policy, which will be reviewed and … control implementation for risk mitigation Carry out GAP analysis and implementation of ISO27001 for new company acquisitions up to certification Develop and manage an InfoSec training and awareness programme for all staff Develop and manage supplier due diligence to identify risk and impact of supplier/service/product use more »
An opportunity for an experienced InformationSecurity Specialist to showcase their expertise in security risk using prevention, detection, analytical and remediation procedures, with a responsibility in maintaining and improving security operations. Working with a global insurance specialist renowned for their innovative products and strong reputation, you … would be part of their InformationSecurity team reporting to the InformationSecurity Architect and Security Operations Manager in the London office. Responsibilities include: Spearheading response to threats detected Supporting in the production, development and management of security systems and strategies Continuously update and … key projects Assist the wider team in the development internal control frameworks Out of hours support where necessary (not common) Technical Requirements: Knowledge of security technologies and domains including attack simulation, network and cloud security etc. Comprehension of Privileged Access Management procedures Proficiency in Windows Server, Active Directory more »
SecOps Consultant South London (Hybrid) Permanent £70,000-£8 5 ,000 (DOE) SecOps - Security Consultant join excellent program, ideally with active SC and NPPV3 clearance. The position is based in South London with the option to work remotely from home (WFH) on a 'hybrid' basis of 2-3 days … work with a leading digital transformation business on large-scale IT modernisation programmes for government clients. Key skills, experience + tasks will include: SecOps Security Consultant working with SecOps Lead , responsible for ensuring that security procedures are maintained in compliance with the Government Security Classifications framework, are … change, client policies and procedures. Expertise in supporting secure government cloud Migration/Transformation projects. Developing, maintaining, and monitoring policies and procedures. Maintenance of security operating procedures (SyOps) and informationsecurity management policies. Experience in investigating security breaches, in delivering security training and awareness initiatives. more »
Employment Type: Permanent
Salary: £70000 - £85000/annum to £85,000 (DOE) Negotiable, Bonus
DescriptionJob Title Senior Cyber Security ArchitectReporting to Cyber & Technical AdvisorySalary 60,000-80,000 Job Type Permanent, full timeLocation Home based (This role will require regular UK travel and at times need you to stay away from home)Since our establishment in 1990, Methods has partnered with a range … have fun while working hard; we are not afraid of making mistakes and learning from them.Methods are experts in delivering secure, resilient cyber and information services – keeping systems and data safe.We help reduce risk and vulnerabilities from cyber-attacks by developing a security road-map tailored to your … organisations improve processes such as threat management by building an identity management programme, and establishing prevention, detection and response capabilities to cyber-attacks.The Cyber Security Consultant will have the following responsibilities: Ability to research, articulate, pitch complex and innovative security advice, at both business and technical levels, for more »
Cloud Security Engineer/InformationSecurity Engineer/InformationSecurity Analyst Experienced Cloud Security Engineer is required to join an Innovative Start-Up Challenger Bank! Are you passionate about building something new? We're looking for an experienced Cloud Security Engineer to join … a new team of a start-up challenger bank. This hands-on role offers the opportunity to grow into the Head of InformationSecurity, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerability management and remediation. … software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities and manage remediation. Develop and manage security measures for generative AI usage. Key Skills & Experience: Degree/diploma in a tech-related field or relevant experience. Preferred certifications: PenTest+, Security+, OSCP more »
Cyber Security Lead Hybrid 50k (flex) + Car Allowance (5k) Variety of locations: Weymouth, Dorset, London or Stoke. The Client: Are a well-known High St and Online retailer who are seeking a Cyber Security Lead who specialises in Microsoft/Wintel Servers and Virtualisation supporting a UK … wide infrastructure. Objective: You will support the Head of InformationSecurity in delivering the InformationSecurity service to the global business. You will lead all Cyber Security Operations function and be the first point of contact for technical informationsecurity related matters. Role … Responsibilities: Line Managing and mentoring the Sec Ops team. Conducting security focussed risk assessments. Act as the first point of escalation for identifying security incidents and conduct their investigation. Managed vendors. Key Requirements you will need: Vendor Management experience. Around 5 years' experience in IT. Around 2 years more »
is key to helping embed these good behaviours and monitoring these. About You We are looking for someone who has a strong baseline of InformationSecurity knowledge across the breadth of the space, along with direct experience of delivering security culture change and delivering a dramatic shift … away from compliance driven behaviours towards a more rounded embedded approach to people cyber risk management. You need to be able to deliver security cultural change within an organisation and work independently and act as a subject matter expert on security and security culture issues. Requirements To … be successful in this role you need to have: Experience of what good looks like in terms of security culture for a financial institution. Strong baseline knowledge across the breadth of the security space (around Security+ level) and are passionate about keeping your security knowledge current – securitymore »
Overview As a Security Operations analyst, you will play a critical role in ensuring the security and integrity of cloud-based systems. Your expertise will be essential in safeguarding digital assets, managing risks, and implementing robust security controls. If you're passionate about cloud security and … have the technical acumen to thrive in this dynamic field, read on! Responsibilities Develop Approach to Security Assessment & Authorization (SA&A): Collaborate with cross-functional teams to conduct security assessments for FedRAMP-approved cloud service providers. Ensure compliance with security standards and controls. Provide Technical Expertise: Offer … insights on moving systems to the cloud, assess potential security risks, and recommend necessary security measures. Perform Security Design Reviews: Evaluate the security implications of introducing new technologies within the cloud environment. Influence Security Best Practices: Work closely with engineering teams to promote adherence to more »