security perspective. Policy, Procedure, and Guidance Oversight Review, update, and enforce security policies, standards, and guidance (e.g. Acceptable Use, Incident Response, Remote Access). Ensure compliance with NCSC, ISO27001, NIST, Cyber Essentials, and GDPR frameworks. Clarify security roles and responsibilities across departments. Support Information Governance and Data … Protection teams on policy alignment and compliance. Technical Review and Oversight Lead or oversee reviews of system architectures, applications, cloud services (IaaS, PaaS, SaaS), and network security. Assess IAM / PAM implementations and M365 / Azure / Active Directory configurations. Conduct or oversee penetration testing, vulnerability assessments, and threat modelling. Review and approve technical designs and solution … security standpoint. Assurance, Compliance, and Audit Develop and maintain an IT Security Assurance Framework. Lead internal and external audits, accreditation, and certification activities (e.g. PSN, Cyber Essentials Plus, ISO27001). Monitor compliance with standards and respond to audit findings. Analyse SIEM outputs, threat intelligence feeds, and monitoring tools. Performance Monitoring and Reporting Define and track More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Essential Employment
New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM / PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from … a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance Framework. Lead or coordinate internal / external audits and security assessments. Track and report on compliance with standards and regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, Cyber Essentials Plus, ISO27001). … You will always however hear from us by phone if we are able to take your CV forward to the next stage. You can also follow us at Twitter / Facebook / LinkedIn or via our website www.essentialemploy.co.uk. More ❯
Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data Protection with policy harmonisation … New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM / PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from … a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance Framework. Lead or coordinate internal / external audits and security assessments. Track and report on compliance with standards and regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, Cyber Essentials Plus, ISO27001). More ❯
prem & Azure). Own Microsoft 365 services (Intune, Entra ID, Purview, Teams, SharePoint). Drive resilience, disaster recovery, backup, high-availability design. Provide 3rd line escalation for complex infra / EUC issues. Lead national projects, e.g., Meraki rollouts, Windows 11 migration, Intune uplift. Produce technical documentation and support ISO27001 compliance. Share knowledge across IT … bridging service desk and technical teams. The tech you'll touch Microsoft 365: Intune, Entra ID, Teams, SharePoint, Purview Microsoft Azure services Cisco Meraki networking Scripting / automation (PowerShell, IaC) What we're looking for Significant hands-on EUC & infrastructure experience, with strategic exposure. Confidence managing suppliers and engaging stakeholders. Track record leading projects (migrations, rollouts, security uplift). More ❯
enable the Service to make full use of all resources and obtain the best possible value. Actively monitor the security and integrity of all ICT systems in line with ISO27001 standards to ensure the provisions of the Data Protection Act are met and that high standards of good practice and confidentiality are maintained. Conduct periodic health checks on equipment and More ❯
enable the Service to make full use of all resources and obtain the best possible value. Actively monitor the security and integrity of all ICT systems in line with ISO27001 standards to ensure the provisions of the Data Protection Act are met and that high standards of good practice and confidentiality are maintained. Conduct periodic health checks on equipment and More ❯