regular access reviews and recertifications to ensure compliance with internal governance and external regulatory requirements. Identify, assess, and respond to IAM-related risks and incidents in collaboration with the cybersecurity operations team. Develop and maintain documentation, including access management policies, processes, procedures, and system configurations. Ensure effective onboarding and offboarding processes are executed in accordance with HR and business policies. … will hold a bachelor's degree or equivalent professional qualification in Computer Science, Information Security, or related field, alongside a proven background of relevant experience in a IAM or cybersecurity-focused role. Preferably candidates will have the relevant IAM certifications preferred (e.g., Certified Identity and Access Manager, Microsoft Identity Certification) Successful candidates will have strong analytical and problem-solving abilities More ❯
Job Description We are looking for a highly skilled Technical Operations Lead to join our Cybersecurity Investigations team. This role is pivotal in managing technical operations and ensuring the integrity, confidentiality, and availability of our digital assets through proactive and reactive cybersecurity measures. The successful candidate will lead a team of skilled professionals and collaborate with our global leads and … our US-based Service Delivery team and works closely with clients based in the U.K. and and US. Key Responsibilities Provide leadership by mentoring and developing a team of cybersecurity professionals, focusing on building a collaborative, innovative, and high-performing work environment through effective management of performance, recruitment, and ongoing training initiatives. Actively build and develop the capabilities of team … daily time to quality assurance activities such as reviewing individual ticket handling, providing constructive feedback, and identifying skill gaps for targeted development. Oversee all daily technical operations within the Cybersecurity Investigations team by ensuring established client security protocols are rigorously followed. Manage and coordinate all aspects of incident response and forensic investigations through following the client parameters while also proactively More ❯
Role: Technical Project Manager- Job Type: Contract Day Rate: £350 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom [thrice in a week at client office] - Mandatory Job description: Understand system obsolescence and vulnerabilities from the More ❯
Role: Technical Project Manager- Job Type: Contract Day Rate: £350 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom [thrice in a week at client office] - Mandatory Job description: Understand system obsolescence and vulnerabilities from the More ❯
Role: Technical Project Manager- Job Type: Contract Day Rate: £350 per day (inside IR35) Duration: 4 Months Work Location: Milton Keynes, United Kingdom [thrice in a week at client office] - Mandatory Job description: Understand system obsolescence and vulnerabilities from the More ❯
Corsham, England, United Kingdom Hybrid / WFH Options
Paradigm Tech
Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared Senior CyberSecurity Consultant required for a leading CyberSecurity Consultancy with a specialism in the Defence & Central Government sectors. This is a full-time, permanent position based from home with 1 day a week on-site with clients located in the South of the Country … able to achieve this. They'e paying between £65,000 - £85,000 + bonus and benefits. Please apply and I - Ben Griffiths - will be in touch to discuss. Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
Paradigm Tech
Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared Senior CyberSecurity Consultant required for a leading CyberSecurity Consultancy with a specialism in the Defence & Central Government sectors. This is a full-time, permanent position based from home with 1 day a week on-site with clients located in the South of the Country … able to achieve this. They'e paying between £65,000 - £85,000 + bonus and benefits. Please apply and I - Ben Griffiths - will be in touch to discuss. Senior CyberSecurity Consultant | Principal CyberSecurity Consultant | Information Assurance | Risk Management | Security Cleared More ❯
Wallington, Surrey, England, United Kingdom Hybrid / WFH Options
Newmarket Holidays
CyberSecurity Manager Full time, Permanent role. Hybrid Opportunity (2 days in office). At a glance We are here to enrich lives and well-being through travel. To bring that to life, we know our success is driven by our exceptional people. We create wish-list holidays. The type of holidays that people have always dreamt of doing. We … Surrey is focused, and results-driven, but lots of fun, full of like-minded people who are all in the business of creating these amazing experiences. The role The CyberSecurity Manager is responsible for safeguarding Newmarket Holidays digital assets and ensuring the security of critical systems and data. This role involves the development and implementation of security strategies, policies … and procedures to protect against cybersecurity threats, as well as actively monitoring and responding to security incidents. The CyberSecurity Manager plays a key role in the design and maintenance of secure infrastructure across our digital platforms, including customer websites, B2B sales channels, and internal systems. As part of the PMO team at Newmarket Holidays, the role will be focused More ❯
Ready to Make an Impact in Cybersecurity? Information Security Analyst - 6-Month FTC Global Law Firm London/Hybrid Our client, a leading global law firm , is looking for an experienced Information Security Analyst to join their London team on a 6-month fixed-term contract . This is a fantastic opportunity to work in a high-impact role where More ❯
Pirton, Hertfordshire, United Kingdom Hybrid / WFH Options
Picture More Ltd
Ready to Make an Impact in Cybersecurity? Information Security Analyst - 6-Month FTC Global Law Firm London/Hybrid Our client, a leading global law firm , is looking for an experienced Information Security Analyst to join their London team on a 6-month fixed-term contract . This is a fantastic opportunity to work in a high-impact role where More ❯
and deep learning models. Support decision-making on medium/high-risk projects via governance escalation. Collaborate with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (e.g., OWASP AI Top 10). Must be based in the UK to meet regulatory More ❯
and deep learning models. Support decision-making on medium/high-risk projects via governance escalation. Collaborate with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (e.g., OWASP AI Top 10). Must be based in the UK to meet regulatory More ❯
and deep learning models. Support decision-making on medium/high-risk projects via governance escalation. Collaborate with AI Governance and local risk management teams. Requirements: Strong IT and cybersecurity background. Expertise in AI technologies, including model development and deployment. Experience in risk assessment frameworks (e.g., OWASP AI Top 10). Must be based in the UK to meet regulatory More ❯
to work in a fast-paced and autonomous environment. Experience collaborating with colleagues and suppliers in different time zones. Familiarity with IEC 61850, IEC 62443 and similar OT and cybersecurity standards. Familiarity with training such as GIAC Response and Industrial Defense (GRID) Familiarity with engineering environments such as electrical substations Familiarity with Failure Effect Mode Analysis (FMEA) or similar Stakeholder More ❯
Milton Keynes, England, United Kingdom Hybrid / WFH Options
MHA
employee is not only a confident user of our systems but also a proactive first-line defender of our digital estate. Qualification and Essential Skills Qualifications: Demonstrable interest in cybersecurity and user education, with some hands-on experience supporting IT or security training initiatives. Working knowledge of key security concepts such as phishing, MFA, secure remote access, and data protection. More ❯
northampton, midlands, united kingdom Hybrid / WFH Options
MHA
employee is not only a confident user of our systems but also a proactive first-line defender of our digital estate. Qualification and Essential Skills Qualifications: Demonstrable interest in cybersecurity and user education, with some hands-on experience supporting IT or security training initiatives. Working knowledge of key security concepts such as phishing, MFA, secure remote access, and data protection. More ❯
high wycombe, south east england, united kingdom Hybrid / WFH Options
MHA
employee is not only a confident user of our systems but also a proactive first-line defender of our digital estate. Qualification and Essential Skills Qualifications: Demonstrable interest in cybersecurity and user education, with some hands-on experience supporting IT or security training initiatives. Working knowledge of key security concepts such as phishing, MFA, secure remote access, and data protection. More ❯
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
Lines of Defense (3LOD) model. Possess knowledge of risk management practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the … Operations Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs … information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team, Shared Security Service teams, Global Business Services organizations More ❯
a poor service and not put things right. Our service is free for everyone. About the role As the Information Security Manager, you will lead on operational information and cybersecurity within PHSO. You will play a key role in protecting the information of people who work for or with us and for the public whose complaints we handle. You More ❯
Job title: Security Engineer Hybrid - 3 days in London Duration of assignment: 6 months Role description: CyberSecurity Designs, Strategies, and Security Patterns, data security and compliance by implementing GCP, Azure security best practices, managing IAM roles and permissions, GCP, Azure environments by implementing robust security controls, encryption, and access management policies Key responsibilities: -Each team that owns a securityMore ❯
incidents related to applications Stay current on the latest security threats, vulnerabilities, and technologies to enhance our security posture Your background looks something like: Extensive experience in application security, cybersecurity, or related fields Strong understanding of secure coding practices, threat modeling, risk assessments, and incident response Proficiency in programming languages such as TypeScript, Python, or similar Experience with security tools More ❯
of the Division. Qualifications Excellent communication skills particularly in English (fluently spoken and written) in addition to any local language spoken at the place of work. Currently working on CyberSecurity related projects. The ability and motivation to persistently pursue and achieve/drive effective results which drive the business forward. Collaboration and Influencing with a Global mindset, cultural awareness. More ❯