experience in Information Security Governance, Risk, and Compliance (GRC) Experience contributing to an Information Security Management System (ISMS) certified to ISO27001 standards Knowledge of the Cyber Essentials Plus Scheme, GDPR, and DataProtection Act (2018) Strong communication skills and the ability to build relationships with internal and external stakeholders Hands-on experience in ISO27001 implementation and auditing Eligibility More ❯
Deep familiarity with security requirements in digital health, life sciences, or FDA-regulated software environments Proven track record managing security and compliance under HIPAA, FDA, and NIST Knowledge of GDPR, ISO 27001, SOC 2 and international security standards Experience with cloud-native environments (e.g., AWS), data encryption, identity management, and secure software development practices Strong communicator who can translate More ❯
for new and existing systems. Collaborate with IT and business stakeholders to embed security into solution designs. Monitor compliance with internal policies, external regulations and industry good practice. (e.g., GDPR, ISO27001, CIS, ISF, NIST). Provide expert guidance on security best practices, threat modelling, and mitigation strategies. Support incident response and post-incident reviews from an architectural perspective. Skills and … and practical experience of Information Security processes, policies and tools. Strong understanding of security frameworks and relevant certifications including ISO27001, CISMP, CISSP, knowledge of DataProtection/GDPR, Information Security Forum, CiiSec Understanding of information security controls in particular those relating to assurance, business process, governance, security risk and education Good analysis and decision-making skills, work well More ❯
Code Tools such as CloudFormation, Terraform, Chef, Puppet, Salt, or Ansible in production environments at scale. - Understanding architectural implications of meeting industry standards such as PCI DSS, ISO 27001, GDPR, and NIST frameworks and relevant regulatory frameworks such as Thailand's Personal DataProtection Act B.E. 2562 (2019), BOT Notifications SorNorSor 21 / 2562, 6 /More ❯
privacy of sensitive data used in AI applications. Implement data security controls and encryption techniques for AI datasets. Ensure compliance with relevant data privacy regulations (e.g., GDPR, CCPA). Ethical AI: Develop and implement policies and procedures for ethical AI development and deployment. Promote awareness of ethical considerations related to AI, including bias, fairness, and transparency. Assist … and practices. Experience with AI security tools and technologies. Knowledge of adversarial machine learning techniques. Familiarity with AI governance frameworks. Experience with data security and privacy regulations (e.g., GDPR, CCPA). Experience with DevSecOps practices. Strong analytical and problem-solving skills, with the ability to assess complex situations and develop effective solutions. Excellent communication, collaboration, problem-solving and presentation More ❯
guidance on hybrid cloud licensing models, subscription-based services, SLAs, and regulatory compliance. Advise on dataprotection, privacy, and cybersecurity obligations in commercial agreements, ensuring compliance with GDPR and other regulations. Draft and negotiate information security addenda, Data Processing Addendums (DPAs), and related agreements. Apply a working knowledge of revenue recognition principles to structure transactions in alignment More ❯
Coordinate with legal, compliance, HR, IT security, and other departments during investigations; Maintain confidentiality and integrity in handling sensitive information; Ensure investigations align with global compliance standards, including FCPA, GDPR, SOX, and other applicable laws; Identify patterns and root causes of misconduct, recommending process improvements to mitigate risks; Support the development and enforcement of policies related to ethics, whistleblowing, and … years of experience in internal investigations, compliance, forensic accounting, or corporate security; Prior experience in a multinational IT or technology company is preferred; Strong understanding of regulatory frameworks (FCPA, GDPR, SOX, UK Bribery Act, etc.); Experience with digital forensics, e discovery tools, and data analytics in investigations; Familiarity with cybersecurity risks and incident response processes; Strong analytical and problem More ❯
City of London, London, United Kingdom Hybrid / WFH Options
inDrive
Coordinate with legal, compliance, HR, IT security, and other departments during investigations; Maintain confidentiality and integrity in handling sensitive information; Ensure investigations align with global compliance standards, including FCPA, GDPR, SOX, and other applicable laws; Identify patterns and root causes of misconduct, recommending process improvements to mitigate risks; Support the development and enforcement of policies related to ethics, whistleblowing, and … years of experience in internal investigations, compliance, forensic accounting, or corporate security; Prior experience in a multinational IT or technology company is preferred; Strong understanding of regulatory frameworks (FCPA, GDPR, SOX, UK Bribery Act, etc.); Experience with digital forensics, e discovery tools, and data analytics in investigations; Familiarity with cybersecurity risks and incident response processes; Strong analytical and problem More ❯
complex processes and compliance requirements.Domain Knowledge- Understanding of business processes in regulated industries (e.g., legal, insurance, financial services).- Knowledge of dataprotection and compliance requirements (e.g., GDPR).- Familiarity with the challenges of billable industries, such as reducing unbillable time. More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
Job title Critical Asset and Classification Lead Ref 41382 Division Digital Location Hybrid - Clearwater Court - RG1 8DB Contract type Permanent Full / Part-time Full-time Salary Competitive salary up to £72,600 per annum Job grade B Closing date More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Lloyds Bank plc
Familiarity with banking risk management functions (e.g., credit risk, market risk, liquidity risk) and their specific testing requirements. Understanding of key regulatory frameworks such as Basel III / IV, GDPR, IFRS 9, and how they impact quality and testing processes. Strong understanding of configuration management and CI / CD automation practices and tools such as Jenkins, Harness, Spinnaker, Gradle, Nexus More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
AppCheck Ltd
of working with Large Enterprise customers in a B2B SaaS context. Experience of working with B2C SaaS / reseller networks. Knowledge & Skills: An understanding of compliance frameworks such as GDPR, ISO 27001, SOC, NIST, HIPAA, etc and how they shape requirements. Knowledge of SQL (preferably DuckDB) for data analysis. An understanding of the current state and capabilities of LLMs More ❯
preferred Experience working with RESTful APIs and real-time integration patterns Familiarity with commercialanalytics, Salesforce ecosystem a plus Prior experience with data clean rooms, privacy policy frameworks, or GDPR/ CCPA compliance Background in agile product development or digital transformation projects What's In It for You Strategic Ownership: Lead the enterprise roadmap for Adobe Real-Time CDP as More ❯
compliance frameworks; PCI DSS, ISO 27001, Cyber Essentials, NIST, SOC 2, NIS2, etc.• Exposure to Amazon AWS, Microsoft Azure or Google GCPs cloud platforms• Data Privacy Experience, e.g. GDPR, DPA2018 More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Reed.co.uk
native development (AWS, Azure, or GCP preferred). Experience with CI / CD pipelines, automated testing, and DevOps practices. Solid grasp of security best practices, data privacy, and GDPR compliance. Excellent communication skills, with the ability to work effectively across multidisciplinary teams and stakeholders. Strong problem-solving skills and a pragmatic approach to delivering solutions. Desirable Experience with containerisation More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Eurochange
into all stages of the SDLC Maintain oversight of development environments, deployment pipelines and access controls Collaborate with the Information Security Manager to ensure compliance with ISO27001 objectives Support GDPR, data privacy and other relevant security policies in solution design Lead code reviews, architectural assessments, and system performance analysis Innovation, Collaboration & External Partnerships Drive innovation across the engineering function More ❯
multi-task and deliver both immediate and longer-term tasks Desirable Knowledge Areas: Understanding of data analytics tools (e.g., Power BI, Tableau). Familiarity with compliance standards (e.g., GDPR, ISO 27001). Knowledge of programming languages such as Python , Java , or C# for application customisation. More ❯
As the Critical Asset and Classification Lead , you will be part of the Information Security team, focused on identifying, managing, and protecting Thames Water's most critical data assets, often referred to as "crown jewels." This role will also More ❯
a nice to have. SKILLS: Working knowledge of cloud security architecture, specifically within Azure (or other Cloud platforms). Familiarity with security frameworks and compliance standards such as NIST, GDPR, PCI-DSS, DESC ISR. Strong problem-solving skills, with the ability to think creatively to solve complex security challenges. BENEFITS: Competitive Salary: Base salary commensurate with experience, plus performance-based More ❯
Staines-upon-Thames, Middlesex, England, United Kingdom
Bupa UK
ISACA, COBIT, ITIL. Certified in CISA or relevant certifications with one of the following: CISM, CISSP, equivalent experience. Strong knowledge of relevant laws, regulations, and industry standards e.g. UK GDPR, ISO 27001, PCI DSS, NIST. Great attention to detail and accuracy. Ability to work independently, manage time and workload effectively in a fast-paced environment. Experience in systems, preferably O365 More ❯
Wolverhampton, Bushbury, West Midlands (County), United Kingdom Hybrid / WFH Options
Tilt Recruitment
AKS), and infrastructure protection. Hands-on knowledge of DevSecOps, IaC (Terraform), CI / CD pipelines, and tools like Veracode, Trivy, and Checkov. Familiarity with standards such as CIS, NIST, GDPR, ISO and frameworks like MITRE ATT&CK. Strong programming / scripting skills (Python, Go, Groovy) with a clean, secure coding ethos. Ideal Candidate Profile: Expert in Azure cloud security services More ❯
may vary depending on the nature of the employment with CRH and the country where you work. Please note that we cannot accept any applications submitted through email for GDPR purposes. Candidates must apply through our job portal. We do not accept candidate introductions for this position from recruitment agencies, unless you have been instructed to do so by our More ❯
may vary depending on the nature of the employment with CRH and the country where you work. Please note that we cannot accept any applications submitted through email for GDPR purposes. Candidates must apply through our job portal. We do not accept candidate introductions for this position from recruitment agencies, unless you have been instructed to do so by our More ❯
analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate More ❯
analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO 27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate More ❯