role, requiring collaboration across IT, legal, procurement, and operational teams. You will act as the primary point of contact for all matters related to information assurance, supplier security assurance, incidentresponse, and regulatory compliance. Scope IT Security Operations Collaborate closely with IT SecOps team members to ensure security controls remain effective. Where gaps are identified, implement appropriate mitigation … measures and lead the response to security incidents in a timely and coordinated manner. Compliance & Security Coordinate ISO 27001 certification audits and maintain ongoing compliance on behalf of the IT & Digital function. Actively support and contribute to health and safety, environmental sustainability, business continuity, and information security initiatives, ensuring we meet our obligations to customers and regulatory standards Delivery … and supports business objectives. Risk Management: Identify, evaluate, and mitigate information security risks across systems, suppliers, and processes. Maintain visibility over key cyber risks and report to senior leadership. IncidentResponse: Lead the response to security incidents, including forensic analysis, reporting, and remediation. Coordinate with law enforcement and external partners where necessary. Supplier Assurance: Conduct security reviews More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
a mission-critical role at the heart of our cyber security strategy. As Operational Security Manager, you'll take ownership of our security operations, overseeing threat intelligence, vulnerability management, incidentresponse and the performance of our outsourced 24/7 SOC. You'll work closely with internal technology teams to embed security into every aspect of our infrastructure … and change lifecycle, ensuring our defences are proactive, responsive and resilient. From playbook rehearsals to live incident recovery, you'll be the calm in the storm, guiding teams through complex challenges with clarity and confidence. What you'll need to succeed You're a seasoned security professional with hands-on experience across SIEM, SOC, Azure, Microsoft 365 and enterprise … network environments. You've led incidentresponse, managed third-party suppliers and implemented threat detection strategies in hybrid organisations. Certifications such as CISSP, CEH, CREST or GIAC CIH are part of your toolkit, and your technical depth is matched by your ability to mentor, collaborate and communicate. You thrive in dynamic environments, bring structure to ambiguity and have More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Project People
role, you’ll manage cyber risk , drive security governance , and embed a security-first culture across the organisation. You’ll also act as the key contact for information assurance, incidentresponse, supplier security , and regulatory compliance . What you’ll do: Own and maintain the ISMS in line with ISO 27001 standards. Lead audits, risk assessments, and incident … experience managing an enterprise ISMS and ISO 27001 audits. Strong knowledge of cyber threats, cloud security (Azure, M365), and GDPR. Hands-on experience in vulnerability management, supplier assurance, and incident response. Excellent communication and stakeholder management skills. Benefits: Competitive salary with bonus scheme Very generous holiday allowance Hybrid working – 3 days per week in Reading Plus a great range More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
Implement and support security controls, particularly within Azure cloud environments. Evaluate and deploy best-in-class application security tools. Mentor teams and deliver tailored security awareness programmes. Assist with incidentresponse, security training, and supplier/client security assessments. What We’re Looking For Essential Skills & Experience: Proven experience in application security engineering. Strong knowledge of security tools More ❯
Maidenhead, England, United Kingdom Hybrid / WFH Options
Audit & Risk Recruitment
current, comprehensive, and aligned with industry standards and audit expectations. Reviewing effectiveness of first line functions in testing and validation of key IT controls (e.g., access management, change control, incidentresponse, vulnerability management), ensuring effectiveness and consistency. Leading in the review and enhancement of IT and infosec risk and control frameworks (e.g., ISO 27001, ITIL, ISO22301, NIST), ensuring More ❯