effectiveness of this security training program for the different audiences. Ensure effective measures are put in place to protect the businesses internal/customer data in line with current legislations. Developing and embedding mature processes that focus on Risk Management and incident response. Carry out risk assessments and conducting … guidelines. Oversee the approval and publication of said documents. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection of information assets. Monitor advancements in educational technologies and threat horizons. Education and experience requirements: Hold at least one of the following Security Management … technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists. Proven experience of Least Privileged/Zero Trust adoption, Data Leakage Protection strategies in enterprise businesses. Strong experience having developed and managed business continuity and disaster recovery plans for large-scale SaaS businesses. more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Secure Recruitment LTD
Security Governance, Risk, and Compliance (GRC), coupled with Security Operations exposure. Proficiency in ISO 27001 implementation and management systems, Cyber Essentials Plus, GDPR, and DataProtection Act. Strong communication skills, both written and verbal, with the ability to work autonomously and collaboratively within a team. Certification in ISO more »
experience of security and/or infrastructure within an enterprise environment Exposure to enterprise information security standards including Cyber Essentials, ISO 27001, 27002 etc. DataProtectionAct and the General DataProtection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management; Security Auditing Good more »
holder will liaise with the manufacturer and users of the system to implement changes and upgrades in a timely manner. The post holder will act as the single point of contact for enquiries from end users and co-ordinate with all planned upgrades to the system and act … technical knowledge and skills to meet new requirements of the organisation. An understanding of the modern PC environment and operating systems Knowledge of the Dataprotectionact 1998. Knowledge of Windows Server Environment and Networking Knowledge of HL7 Experience Essential Proven involvement in implementing change and projects … Experience of database management Working knowledge of cancer surveillance systems Skills Essential Advanced IT Skills Ability to produce complex reports using a current data information system Ability to understand and interpret user requirements and develop and communicate appropriate responses Able to effectively train and coach staff in the use more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
CIIH Ltd T/A Headway Recruitment
hands-on experience in security/infrastructure within an enterprise environment. Requirements: Proficiency in enterprise information security standards, including Cyber Essentials, ISO 27001, 27002, DataProtectionAct, and GDPR. In-depth knowledge of the Microsoft O365 environment, threat intelligence analysis, Security Incident Response processes, disaster recovery, and more »