EC-Council is the world’s largest cyber security technical certification body. We operate in 145 countries globally and we are the owner and developer of various world-famous cyber security programs. We are proud to have trained and certified over 400,000 informationsecurity professionals globally that have influenced the cyber security mindset of … assigned territory/accounts. Identify and develop new business opportunities with enterprise customers across industries. Engage with CXOs, CISOs, CIOs, and IT decision-makers to understand business needs and security challenges. Position company’s cybersecurity offerings (SOC, IAM, DLP, EDR/XDR, Cloud Security, Managed Services, etc.) as enterprise solutions. Lead end-to-end enterprise sales cycle – prospecting … Bachelor’s degree in business, IT, or related field (MBA preferred). 6–10 years of enterprise sales experience, with at least 3–5 years in cybersecurity/IT security solutions. Proven track record of achieving or exceeding sales quotas. Strong knowledge of enterprise cybersecurity landscape, threats, and technologies. Ability to build relationships with senior stakeholders and close complex More ❯
EC-Council is the world’s largest cyber security technical certification body. We operate in 145 countries globally and we are the owner and developer of various world-famous cyber security programs. We are proud to have trained and certified over 400,000 informationsecurity professionals globally that have influenced the cyber security mindset of … assigned territory/accounts. Identify and develop new business opportunities with enterprise customers across industries. Engage with CXOs, CISOs, CIOs, and IT decision-makers to understand business needs and security challenges. Position company’s cybersecurity offerings (SOC, IAM, DLP, EDR/XDR, Cloud Security, Managed Services, etc.) as enterprise solutions. Lead end-to-end enterprise sales cycle – prospecting … Bachelor’s degree in business, IT, or related field (MBA preferred). 6–10 years of enterprise sales experience, with at least 3–5 years in cybersecurity/IT security solutions. Proven track record of achieving or exceeding sales quotas. Strong knowledge of enterprise cybersecurity landscape, threats, and technologies. Ability to build relationships with senior stakeholders and close complex More ❯
West Midlands, England, United Kingdom Hybrid / WFH Options
KP Law
documentation, system monitoring, patching, and maintaining support contracts to ensure system health and compliance. Cybersecurity and risk management: The role will involve supporting the adoption and management of cyber security frameworks, participating in incident response and disaster recovery planning and testing, implementing controls to maintain cyber security accreditation, and protecting the firm from cyber threats through policies, audits … threats or incidents occur. • To work with the Executive, Legal Operations and Business Services teams, IT Managed Service Providers and Suppliers to control and mitigate risks associated with cyber security and informationsecurity, data loss and cyber-attack. Desirable Skills & Attributes: • Leadership: Ability to motivate and lead teams, fostering a culture of collaboration and open communication. • Technical More ❯
Cyber Security Engineer CyberSec Engineer/IT Security Specialist – Disaster Recovery, Resilience Testing, CyberSec Improvements, Vulnerability Scanning/Management, Infrastructure, Nutanix, Commvault, VMware, Azure, PowerShell, Python; Law Firm, Permanent, London/Hybrid (3/2). £80k - £95k (On Experience) +Bonus +Benefits Global Low Firm seeks experienced Cyber Security Engineer/IT Security Specialist to join … the IT Infrastructure Engineering Team and play a key role in the strengthening of the IT security position and critically ensuring that Disaster Recovery, failover, and operational resilience capabilities are effective and continually improved through ongoing testing and (re)engineering. This is a hands-on, process-driven role where you will ensure that disaster recovery (DR), failover, and operational … Engineer who has worked in a hands-on capacity across a range of technologies with a significant focus on infrastructure, cloud and enterprise software environments. You will have broad InfoSec/CyberSec awareness combined with significant hands-on security engineering and resilience experience: Hands-on experience in disaster recovery, failover testing, and IT operational resilience. Solid knowledge of business More ❯
receives developmental guidance in consulting skills, emotional intelligence, resilience, and self-awareness to allow everyone to grow and develop personally, at their own pace. The need for world-class security and privacy has never been greater.We work with our clients to better understand and manage their security risks, architect and build secure infrastructure and solutions, and protect live … services. In a rapidly changing world where information has a significant value, supply chains are increasingly interconnected. In a world of uncertainty when doing business on a global basis, the resilience of operations has become a board level issue. You will provide our clients with a full spectrum of services, covering proactive and reactive Cyber Incident Response (CIR) Services. … network, preventing business-disrupting damage from occurring. With a unique collection of skills, methodologies, and strategic award-winning vendor relationships, we can do whatever it takes - from improving the security of a single component to delivering a holistic security and privacy program. As a Cyber Incident Response Advisory and Incident Management Senior Manager or Associate Director, you will More ❯
receives developmental guidance in consulting skills, emotional intelligence, resilience, and self-awareness to allow everyone to grow and develop personally, at their own pace. The need for world-class security and privacy has never been greater.We work with our clients to better understand and manage their security risks, architect and build secure infrastructure and solutions, and protect live … services. In a rapidly changing world where information has a significant value, supply chains are increasingly interconnected. In a world of uncertainty when doing business on a global basis, the resilience of operations has become a board level issue. You will provide our clients with a full spectrum of services, covering proactive and reactive Cyber Incident Response (CIR) Services. … network, preventing business-disrupting damage from occurring. With a unique collection of skills, methodologies, and strategic award-winning vendor relationships, we can do whatever it takes - from improving the security of a single component to delivering a holistic security and privacy program. As a Cyber Incident Response Advisory and Incident Management Senior Manager or Associate Director, you will More ❯
Crypsis investigation tools to determine source of compromises and malicious activity that occurred in client environments Manage incident response engagements to scope work, guide clients through forensic investigations, contain security incidents, and provide guidance on longer term remediation recommendations Ability to perform travel requirements as needed to meet business demands (on average 20%) Mentorship of team members in incident … response and forensics best practices Qualifications Your Experience 8+ years of incident response or digital forensics consulting experience with a passion for cyber security Strong leadership skills including experience managing a team or individuals Experience with leading complicated engagements including scoping, interfacing with the client, and have executed on a technical front Proficient with host-based forensics and data … and an excellent understanding of PANW products be collaborative and able to build relationships internally, externally, and across all PANW functions, including the sales team Bachelor’s Degree in InformationSecurity, Computer Science, Digital Forensics, Cyber Security or related field or equivalent military experience required Qualification Please note that this role requires eligibility for UK SecurityMore ❯
confidence. Your impact is visible: safeguarding revenue, supporting market expansion, and enhancing company reputation for digital trust. My client is a leading Telecoms provider, looking for an experienced Lead Security Compliance Manager - responsible for leading the ongoing management, improvement, and compliance of the InformationSecurity Management System (ISMS) across a complex technology environment. Acting as the go … to person for security certifications (ISO27001, PCI, Cyber Essentials, Telecoms Security Act (TSA), you'll provide assurance to customers, regulatory bodies, and internal teams that robust standards and controls are met every day. Key Responsibilities Manage and maintain compliance with all required security certifications (ISO27001, PCI, TSA, Cyber Essentials). Oversee responses to incoming customer security questionnaires and RFPs, supporting audits and regulatory engagements. Drive security awareness and training activities across the business. Foster strong relationships with Technology, IT, Security, and Internal Audit teams. Continually improve the ISMS and compliance regime, including mergers/acquisitions. Analyse and interpret emerging compliance standards; bridge any gaps to maintain alignment. Lead preparation and coordination of external More ❯
Work with top professionals, tackle dynamic risks, and deliver clear guidance that makes a real difference. If you're experienced in security frameworks like ISO27001 or NIST and want to shape security strategies in a fast-paced environment, we'd love to hear from you. My client is a leading Telecommunication Business, looking for a skilled Security Risk Manager to help strengthen their organisation's approach to informationsecurity, risk mitigation, and compliance. In this role, you'll work alongside talented teams, evaluating 3rd party supplier security, identifying threats, and implementing effective controls to keep data and assets protected. Your responsibilities will include: Conducting risk assessments and supplier due diligence across a range … of projects. Communicating security risks clearly to business stakeholders so they can take informed action. Ensuring compliance with industry regulations and security standards (ISO27001, NIST, GDPR). Developing and maintaining policies, procedures, and audit practices that improve overall security posture. Responding proactively to emerging risks in a fast-changing landscape. If you have a solid background in More ❯
required Preferred Qualifications Experience generating new knowledge or creating innovative solutions for a firm Relevant industry expertise MBA or master's degree with a relevant specialization (not required) Corporate Security Responsibility Abide by Mastercard's security policies and practices Ensure the confidentiality and integrity of the information being accessed Report any suspected informationsecurity violation … or breach Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines More ❯
london, south east england, united kingdom Hybrid / WFH Options
Polaris Consulting & Services Ltd
a key role in ensuring the Polaris operates responsibly, meets regulatory requirements, and effectively manages operational and informationsecurity risks. This role sits at the intersection of InfoSec and Strategic Operations. An ideal role for someone who enjoys implementing business-appropriate structure & process improvement, whilst balancing strategic problem-solving. Key Responsibilities Security Lead and manage customer questionnaires … and client audits Oversight of vulnerability management and ensure remediation across environments is in line with company policy Oversight of applicable SIEM and monitoring process to ensure that security response is in line with company policy Ensure that system and security documentation is in line with company policy and is audit-ready Review and work with the team … to evidence physical and logical security of customer environments is in line with company policy Continually review our contractual commitments against what we do to ensure that we are compliant Represent security capabilities and processes in customer meetings and sales engagements to strengthen trust and win new business Compliance Perform regular control assessments and track deficiencies Act as More ❯
thrive. Job Title: Business Analyst Location: Wokingham Contract Type: 6 - month contractor position (with potential for extension) Are you ready to make a significant impact in the world of security asset management? Our client is on the lookout for a dynamic Business Analyst to support the successful delivery of the Security Asset Refresh Programme! If you're passionate … and business stakeholders, we want to hear from you! About the Role: As a Business Analyst, you will play a crucial role in ensuring that our new or upgraded security assets not only meet operational needs but also align with compliance and risk management standards. Your analytical skills will be essential in capturing requirements and assessing business impacts. Key … document, and validate business, functional, and non-functional requirements. Translate technical requirements into clear, business-friendly language. Maintain traceability of requirements throughout the delivery process. Stakeholder Engagement: Collaborate with security, IT infrastructure, and operational teams to identify challenges and future needs. Facilitate workshops and focus groups to gather insights from both technical and non-technical stakeholders. Manage stakeholder expectations More ❯
We’re looking for a Cyber Security Governance Officer to join a growing organisation with a diverse digital environment and a wide range of technology partners. You’ll play a key role in strengthening our cybersecurity governance and risk management framework, helping to ensure systems, data, and third-party relationships remain secure and compliant. Working closely with internal IT … risk, maintain compliance with relevant frameworks, and support continuous improvement in how we protect our business. Key Responsibilities Support the onboarding and assessment of third-party vendors and managed security service providers (MSSPs). Maintain an accurate register of suppliers and their associated security risks. Coordinate and oversee cyber audits, penetration tests, and remediation activities. Assist in maintaining … the organisation’s cyber risk register and conducting risk assessments for new systems or projects. Help develop, document, and maintain informationsecurity policies, procedures, and standards. Support compliance activities related to data protection and other relevant regulations. Contribute to incident response processes, including tracking and post-incident reviews. Stay informed about emerging cyber threats and work with teams More ❯
through keeping up to date with latest technologies, systems and processes within the business intelligence field. Clinical and Practice Governance Observe and maintain strict confidentiality with regards to any information in line with the requirements of the Data Protection Act. Any data that is must be undertaken with regard to the Trust Information Governance and InformationSecurity … communicator, confident in presenting data and insights to varied audiences Builds strong, collaborative relationships across technical and operational teams Desirable Agile delivery and DevOps tools Awareness of data governance, security, and access control in reporting Understanding of NHS datasets and information standards. Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions … of Sponsorship Applications from job seekers who require current Skilled worker sponsorship to work in the UK are welcome and will be considered alongside all other applications. For further information visit the UK Visas and Immigration website. From 6 April 2017, skilled worker applicants, applying for entry clearance into the UK, have had to present a criminal record certificate More ❯
Hereford, Herefordshire, England, United Kingdom Hybrid / WFH Options
QA
About SPS: Special Projects and Services Limited (SPS) is a UK-based security and risk management company founded in 1991. Operating globally, SPS provides crisis response, risk assessment, medical operations support, and project management in high-risk or complex environments. Known for its expertise in global assistance and specialist security operations, SPS was acquired by Concentric in … IT services across the UK business, assisting with technical support, device management, and ongoing tech ops projects. This role provides structured, hands-on training in IT systems administration, cyber security, and compliance, contributing to the smooth operation of business technology while developing core professional and technical skills. The apprentice will work closely with the Tech Ops Manager and the … documentation of the company’s technology architecture. Research and suggest service enhancements to improve efficiency and user experience. Support the implementation and maintenance of the company’s ISO 27001 InformationSecurity Management System and ISO 27701 Privacy Information Management System. Assist with cyber security initiatives such as endpoint management, access control, and awareness activities. Assist with More ❯
Burgess Hill, West Sussex, England, United Kingdom Hybrid / WFH Options
Clearline Recruitment Ltd
within a regulated environment Strong understanding of UK GDPR, EU GDPR, and the Data Protection Act 2018 Experience delivering data privacy compliance frameworks and/or programmes Familiarity with information governance and informationsecurity management systems (ISO27001) Excellent communication and stakeholder management skills Proven ability to lead projects, manage risk, and influence across matrix environments Desirable certifications … CIPP (Certified Information Privacy Professional) or other recognised privacy certification, Lead Auditor qualification (or equivalent) The Role: Support the Director of Legal & Compliance (Data Protection Officer) and act as a key member of the Local Privacy Office Implement and maintain the affiliate's local privacy framework, ensuring compliance with applicable privacy legislation and Roche's internal governance Lead local … rights under data protection law Develop and maintain Standard Operating Procedures (SOPs) and privacy documentation Facilitate local governance groups such as the Data Privacy Liaison Network and Privacy and Security SubBoard Promote a strong culture of compliance and data protection across the organisation If you're keen to join an exceptional team championing data privacy and compliance within a More ❯
IT assets and mobile vendors; oversee audits, inventory and equipment lifecycle. Compliance & Security: Ensure helpdesk operations align with data protection and informationsecurity policies; collaborate with InfoSec on incident management. Collaboration: Work closely with global IT engineering, operations, and platform teams to ensure seamless service delivery and alignment across regions. About you You’re a dynamic IT More ❯
IT assets and mobile vendors; oversee audits, inventory and equipment lifecycle. Compliance & Security: Ensure helpdesk operations align with data protection and informationsecurity policies; collaborate with InfoSec on incident management. Collaboration: Work closely with global IT engineering, operations, and platform teams to ensure seamless service delivery and alignment across regions. About you You’re a dynamic IT More ❯
as well as future-focused, data-driven innovations. With customers across the globe our employees are committed to the company mission of innovating to create safer skies. For more information visit Overview The Product Development Group Manager is responsible for leading and enabling a high-performing software engineering function that delivers secure, scalable, reliable, and commercially viable products for … DevOps and CI/CD best practices, ensuring consistent, automated, and secure deployments. Develop and execute strategies to embrace new ways of working including use of emerging technologies *Compliance, Security, and Quality Assurance* Ensure adherence to data protection, cybersecurity, and compliance standards (e.g., ISO 27001, GDPR, NIST). Partner with informationsecurity teams to integrate secure-by … design principles throughout the development lifecycle. Conduct periodic security reviews, risk assessments, and audits to maintain compliance posture. Establish robust quality metrics and drive automation in coding, testing and code quality validation. *Stakeholder & Communication Management* Act as a bridge between technical teams, business stakeholders, and executive leadership. Communicate project status, delivery risks, and key metrics clearly and proactively. Collaborate More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
Computappoint
Cyber Security Assurance Manager Location: Portsmouth, UK Hybrid: - 3 days onsite per week Salary: Up to £65,000 Employment Type: Permanent Job Summary: Our client, a leading IT services and consulting firm, is seeking a Cyber Security Assurance Manager to ensure their SOC meets and maintains top security certifications and assurance standards. As part of the GRC … activities, supporting RFIs, RFPs, and client audit requests Deliver training and awareness sessions on SOC assurance standards to internal teams Develop customer-facing assurance documentation demonstrating the organisation's security posture Lead the delivery and ongoing maintenance of SOC-related certifications (SOC 2 Type II, SOC 3, ISO/IEC 27001, Cyber Essentials Plus, CREST) Embed certification requirements into … assurance strategy Drive continuous improvement in assurance processes and evidence collection efficiency Produce regular reports and dashboards on certification status, audit outcomes, and assurance performance Collaborate with SOC operations, InformationSecurity, Risk & Compliance, and Commercial teams Essential Qualifications & Requirements: Proven experience delivering and maintaining cybersecurity certifications (ISO/IEC 27001, SOC 2 Type II, Cyber Essentials Plus, CREST More ❯
sports leagues, entertainment industry legends and other industry-redefining companies. The Applications Operations Analyst focuses on the operational support and continuous improvement of enterprise application environments, ensuring high availability, security, and performance. The ideal candidate will be responsible for day-to-day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and … with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and … changes following structured change control processes. Support application deployments and participate in test validations. Provide integration support across dependent systems and external vendors. Facilitate alignment between delivery teams and InformationSecurity, Infrastructure. Track and report on application usage, adoption trends, and user engagement using analytics tools. Measure and report system uptime, availability, SLAs, and service performance trends. Partner More ❯
sports leagues, entertainment industry legends and other industry-redefining companies. The Applications Operations Analyst focuses on the operational support and continuous improvement of enterprise application environments, ensuring high availability, security, and performance. The ideal candidate will be responsible for day-to-day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and … with SLAs. Provide break/fix troubleshooting and root cause analysis across supported systems. Execute system configuration changes and support business application integrations. Remediate application vulnerabilities in collaboration with Information Security. Participate in security audits and access reviews. Ensure compliance with firmwide data protection and change management policies. Conduct retrospectives and post-incident reviews to identify process and … changes following structured change control processes. Support application deployments and participate in test validations. Provide integration support across dependent systems and external vendors. Facilitate alignment between delivery teams and InformationSecurity, Infrastructure. Track and report on application usage, adoption trends, and user engagement using analytics tools. Measure and report system uptime, availability, SLAs, and service performance trends. Partner More ❯
to £50,000 + package Why Apply? This is an interesting opportunity to work for a stable and growing organisation in a vital role at the forefront of cyber security governance. Your role will be working with the group to implement security governance frameworks and liaise across the subsidiaries IT teams to ensure compliance to specific security frameworks. Cyber Governance Analyst Responsibilities: With day-to-day reporting to the Group InformationSecurity Officer (GISO), you will act as a first line of defence, maintaining the security controls in line with company policies and standards and would act as the liaison across subsidiary cyber services. You will also ensure that proactive risk management with … alongside engineering teams and architects, recommending best practices. Assessing vulnerabilities, articulating their impact, and recommending controls and mitigations for current and future systems. Conducting risk assessments and effectively communicating security and risk implications to technical and non-technical stakeholders. Managing and supporting project stakeholder expectations with a flexible, pragmatic approach. Cyber Governance Analyst Requirements: Working knowledge of cybersecurity frameworks More ❯
and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. Risk Assessment & Compliance Collaborate with informationsecurity teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience Bachelor’s degree in … Information Technology, Computer Science, Engineering, or a related field (or equivalent experience). 7+ years of experience in IT infrastructure roles, with at least 3 years in a senior or SME-level capacity. In-depth knowledge of infrastructure technologies such as: Networking (Cisco LAN/WAN, WIFI, Palo Alto firewalls, Infoblox, ZScaler) Citrix Workspace/Thin Client Technology Virtualization More ❯
and act as a consultant to cross-functional project teams. Evaluate emerging technologies and make recommendations on adoption to improve operational efficiency and security. Risk Assessment & Compliance Collaborate with informationsecurity teams to implement best practices, including hardening, patching, and threat mitigation. Ensure solutions comply with security, regulatory, and organizational standards. Qualifications & Experience Bachelor’s degree in … Information Technology, Computer Science, Engineering, or a related field (or equivalent experience). 7+ years of experience in IT infrastructure roles, with at least 3 years in a senior or SME-level capacity. In-depth knowledge of infrastructure technologies such as: Networking (Cisco LAN/WAN, WIFI, Palo Alto firewalls, Infoblox, ZScaler) Citrix Workspace/Thin Client Technology Virtualization More ❯