operational excellence whilst identifying new areas of growth as part of our day to day objectives. Role Purpose: We are looking for an experienced Data Security Architect to join our growing Information Security team. Reporting to the Global Head of Security Strategy, Architecture & Engineering and working closely with IT … solutions to ensure information security and compliance requirements of the organisation as we go through our Digital Transformation and modernisation and beyond. As a Data Security Architect, you will possess in-depth knowledge of a broad range of information security controls to protect various data stores, both on … premises and in the cloud. The Data Security Architect is responsible for developing and executing a global data security strategy, ensuring the protection of sensitive information across the JD Group. Key Responsibilities: Implement and lead the Data Security Architecture capability across JD Sports, formalising principles through reference More ❯
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
bradford, yorkshire and the humber, United Kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
Bradford, south west england, United Kingdom Hybrid / WFH Options
Morrisons
artefacts, including models, templates, and standards. • Establish baseline security standards for operating systems, network segmentation, and identity and access management. • Contribute to standards for dataencryption and tokenization based on data classification criteria. • Draft security procedures and standards for executive review and approval. • Establish a taxonomy of … inventories of systems and applications logged in the SIEM. • Collaborate with DevOps to ensure secure coding practices and escalate risks as necessary. • Document sensitive data flows and recommend security controls, including encryption and tokenization. • Review network segmentation and ensure least privilege for network access (Zero Trust). • Support … qualification Industry and Regulatory Experience The security architect is expected to have documented experience with the following: Regulations, Standards and Frameworks Payment Card Industry Data Security Standard (PCI-DSS) General Data Protection Regulation (GDPR) and Privacy Practices ISO 27001/2 Knowledge of OWASP 10 NIST Cybersecurity Framework More ❯
services like API Gateway, Lambda, EventBridge, and SQS. The role involves building scalable, secure integrations and collaborating with cross-functional teams to ensure efficient data flow and best practices. Responsibilities: Develop and deploy integration solutions using AWS services (e.g., API Gateway, AWS Glue, Lambda, EventBridge, SNS, SQS). Write … and maintain RESTful APIs using AWS API Gateway and Lambda (Java or C#). Develop and optimise AWS Lambda functions to support data integration processes, focusing on performance and cost efficiency. Assist in implementing event-driven architectures using Amazon EventBridge, SNS, and SQS to process real-time data. Integrate … and Lambda functions. Assist in the configuration and customisation of integration workflows to meet business requirements. Participate in technical discussions related to API design, data flow, and integration strategies, contributing to design decisions. Follow best practices for code quality, writing clean, maintainable, and well-documented code that adheres to More ❯
services like API Gateway, Lambda, EventBridge, and SQS. The role involves building scalable, secure integrations and collaborating with cross-functional teams to ensure efficient data flow and best practices. Responsibilities: Develop and deploy integration solutions using AWS services (e.g., API Gateway, AWS Glue, Lambda, EventBridge, SNS, SQS). Write … and maintain RESTful APIs using AWS API Gateway and Lambda (Java or C#). Develop and optimise AWS Lambda functions to support data integration processes, focusing on performance and cost efficiency. Assist in implementing event-driven architectures using Amazon EventBridge, SNS, and SQS to process real-time data. Integrate … and Lambda functions. Assist in the configuration and customisation of integration workflows to meet business requirements. Participate in technical discussions related to API design, data flow, and integration strategies, contributing to design decisions. Follow best practices for code quality, writing clean, maintainable, and well-documented code that adheres to More ❯
services like API Gateway, Lambda, EventBridge, and SQS. The role involves building scalable, secure integrations and collaborating with cross-functional teams to ensure efficient data flow and best practices. Responsibilities: Develop and deploy integration solutions using AWS services (e.g., API Gateway, AWS Glue, Lambda, EventBridge, SNS, SQS). Write … and maintain RESTful APIs using AWS API Gateway and Lambda (Java or C#). Develop and optimise AWS Lambda functions to support data integration processes, focusing on performance and cost efficiency. Assist in implementing event-driven architectures using Amazon EventBridge, SNS, and SQS to process real-time data. Integrate … and Lambda functions. Assist in the configuration and customisation of integration workflows to meet business requirements. Participate in technical discussions related to API design, data flow, and integration strategies, contributing to design decisions. Follow best practices for code quality, writing clean, maintainable, and well-documented code that adheres to More ❯
Deliver AWS Services & Security: Build and maintain AWS infrastructure (VPC, EC2, RDS, S3, Lambda, etc.), implementing security best practices (WAF, Network Firewall, IAM, VPC, dataencryption) to ensure compliance and resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including … Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost Explorer and Trusted Advisor to drive efficiency. Develop and Maintain Infrastructure as Code (IaC): Automate provisioning, alerting, and … best practices. Infrastructure as Code (IaC): Strong proficiency in CloudFormation (preferred) or AWS CDK for automated, scalable deployments. AWS Cloud Security & Compliance: Expertise in encryption, IAM policies, network security, and transit security, ensuring adherence to financial services regulations (PCI DSS, FCA, GDPR). Database & Data Services: Expertise in More ❯
Deliver AWS Services & Security: Build and maintain AWS infrastructure (VPC, EC2, RDS, S3, Lambda, etc.), implementing security best practices (WAF, Network Firewall, IAM, VPC, dataencryption) to ensure compliance and resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including … Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost Explorer and Trusted Advisor to drive efficiency. Develop and Maintain Infrastructure as Code (IaC): Automate provisioning, alerting, and … best practices. Infrastructure as Code (IaC): Strong proficiency in CloudFormation (preferred) or AWS CDK for automated, scalable deployments. AWS Cloud Security & Compliance: Expertise in encryption, IAM policies, network security, and transit security, ensuring adherence to financial services regulations (PCI DSS, FCA, GDPR). Database & Data Services: Expertise in More ❯
Deliver AWS Services & Security: Build and maintain AWS infrastructure (VPC, EC2, RDS, S3, Lambda, etc.), implementing security best practices (WAF, Network Firewall, IAM, VPC, dataencryption) to ensure compliance and resilience. Design, Deliver and Implement High Availability & Resilience: Develop disaster recovery solutions, resilient architectures, and governance controls, including … Security Hub, Audit Manager, and proactive threat detection. Implement, Maintain & Optimise AWS Best Practices & Governance: Enforce compliance through IAM, encryption, Control Tower, Security Hub, and cost-optimisation tools like AWS Cost Explorer and Trusted Advisor to drive efficiency. Develop and Maintain Infrastructure as Code (IaC): Automate provisioning, alerting, and … best practices. Infrastructure as Code (IaC): Strong proficiency in CloudFormation (preferred) or AWS CDK for automated, scalable deployments. AWS Cloud Security & Compliance: Expertise in encryption, IAM policies, network security, and transit security, ensuring adherence to financial services regulations (PCI DSS, FCA, GDPR). Database & Data Services: Expertise in More ❯
Collaborate with UI/UX designers to ensure intuitive and visually appealing user interfaces. Integrate mobile apps with cloud services and APIs, ensuring seamless data flow. Cybersecurity & Compliance Ensure secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and dataencryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for backend, frontend, and cloud-based applications. Perform unit testing, debugging, and troubleshooting to ensure software quality and regulatory More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions
controls. Proficient in Power Apps (Canvas and Model-driven), Power Automate, and SharePoint Online. Skilled in HTML, CSS, JavaScript, and REST APIs. Experienced in dataencryption and disaster recovery in Power Apps/Automate. Expert at translating business needs into technical solutions. Competent in managing custom connections in More ❯
IP, VPN, VLAN Experience with databases e.g. SQL Server, MySQL, Oracle Experience with virtualisation technologies e.g. VMWare, Hyper-V Experience with security firewalls and dataencryption Strong communication, stakeholder management and problem-solving skills Benefits: Salary up to £42,000 depending on experience Annual salary reviews 25 days … background checks including a DBS and Credit Check. Tenth Revolution Group/Nigel Frank are the go-to recruiter for Power BI and Azure Data Platform roles in the UK, offering more opportunities across the country than any other. We're the proud sponsor and supporter of SQLBits, and More ❯
IP, VPN, VLAN Experience with databases e.g. SQL Server, MySQL, Oracle Experience with virtualisation technologies e.g. VMWare, Hyper-V Experience with security firewalls and dataencryption Strong communication, stakeholder management and problem-solving skills Benefits: Salary up to £42,000 depending on experience Annual salary reviews 25 days … background checks including a DBS and Credit Check. Tenth Revolution Group/Nigel Frank are the go-to recruiter for Power BI and Azure Data Platform roles in the UK, offering more opportunities across the country than any other. We're the proud sponsor and supporter of SQLBits, and More ❯
Stroud, south east england, United Kingdom Hybrid / WFH Options
Ecotricity
Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/DataEncryption About You The right candidate for this role will behave a demonstrable background in Cyber Security, a healthy passion for keeping up More ❯
stroud, south west england, United Kingdom Hybrid / WFH Options
Ecotricity
Premise Active Directory Networking - Cisco/Fortigate Penetration Testing & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/DataEncryption About You The right candidate for this role will behave a demonstrable background in Cyber Security, a healthy passion for keeping up More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Oho Group Ltd
real-time operating systems (RTOS) such as FreeRTOS, ThreadX, or others for firmware development. Knowledge of IoT technologies, including secure communication protocols, cryptography, and data encryption. Hands-on experience with board bring-up (BSP) and low-level driver development. Strong understanding of electronics, including the ability to read schematics More ❯
london (city of london), south east england, United Kingdom
Crone Corkill
Analyse, propose and implement risk, vulnerability and threat solutions Install Security measures and use Security software to protect the business' infrastructure, firewalls, systems and dataencryption programmes Analyse and manage systems to enhance the Security posture Assist with security awareness training and conduct desktop exercises for staff to More ❯
infrastructure components. Diagnosing and resolving hardware, software, and network issues to minimise downtime. Implementing and managing security measures, including firewalls, intrusion detection systems, and dataencryption to protect against cyber threats. Optimising the performance of IT infrastructure to improve speed, efficiency, and reliability. Planning for future growth by More ❯
Horsham, West Sussex, South East, United Kingdom Hybrid / WFH Options
Adria Solutions
to identify vulnerabilities. Provide on-call security support and lead junior team members. Technical Requirements: Extensive hands-on experience with firewalls, intrusion prevention, and data encryption. Strong knowledge of TCP/IP, network protocols, and Microsoft Server environments. Experience with security compliance frameworks (e.g., Cyber Essentials Plus, PCI-DSS More ❯
VLAN). • Experience with databases (SQL Server, MySQL, Oracle). • Familiarity with virtualization technologies (VMware, Hyper-V). • Experience with security protocols, firewalls, and data encryption. • Knowledge of ticketing systems (e.g., ServiceNow, Jira, Ivanti). • Familiarity with remote management tools and diagnostic software. • Experience of working for a Managed More ❯
VLAN). • Experience with databases (SQL Server, MySQL, Oracle). • Familiarity with virtualization technologies (VMware, Hyper-V). • Experience with security protocols, firewalls, and data encryption. • Knowledge of ticketing systems (e.g., ServiceNow, Jira, Ivanti). • Familiarity with remote management tools and diagnostic software. • Experience of working for a Managed More ❯
VLAN). • Experience with databases (SQL Server, MySQL, Oracle). • Familiarity with virtualization technologies (VMware, Hyper-V). • Experience with security protocols, firewalls, and data encryption. • Knowledge of ticketing systems (e.g., ServiceNow, Jira, Ivanti). • Familiarity with remote management tools and diagnostic software. • Experience of working for a Managed More ❯
VLAN). • Experience with databases (SQL Server, MySQL, Oracle). • Familiarity with virtualization technologies (VMware, Hyper-V). • Experience with security protocols, firewalls, and data encryption. • Knowledge of ticketing systems (e.g., ServiceNow, Jira, Ivanti). • Familiarity with remote management tools and diagnostic software. • Experience of working for a Managed More ❯
VLAN). • Experience with databases (SQL Server, MySQL, Oracle). • Familiarity with virtualization technologies (VMware, Hyper-V). • Experience with security protocols, firewalls, and data encryption. • Knowledge of ticketing systems (e.g., ServiceNow, Jira, Ivanti). • Familiarity with remote management tools and diagnostic software. • Experience of working for a Managed More ❯