London, South East, England, United Kingdom Hybrid / WFH Options
auricoe
personal data, especially regarding assessment of risk and associated control implementation. Advise business stakeholders within context of third party management where personal data is in scope, in collaboration with InformationSecurity and Procurement teams. Assist in investigation, resolution and remedial action of data protection related incidents. Report outcomes to the Group Data Protection Manager and where appropriate Data … to ensure customer outcomes and data protection are considered for all new projects and products. Support product risk reviews and report accordingly to the relevant committees. Maintain the business information asset register and review on a regular basis. Ensure business systems and procedures comply with all relevant data privacy and protections law, regulation and policy (including in relation to … requirements. Proven record of successfully selecting and implementing appropriate privacy controls. In-depth knowledge of completing Privacy Impact Assessments. Experience of responding to Subject Access Requests. Understand technical data security measures available to the business. Excellent communication skills with all levels of the business. Strong attention to detail and analytical skills. If you want to progress your data protection More ❯
Jam Management Consultancy Limited T/A JAM RECRUITMENT
procedures, and processes are clear, performance-oriented, and fully documented. Lead the coordination and documentation of internal audits on key processes. Support training and awareness activities in line with InformationSecurity and Data Privacy standards. Collaborate with the People Team to ensure ongoing colleague training across quality, security, environmental and privacy standards. Continuous Improvement Support the CISO … communicator with strong written and verbal skills. A collaborative, organised and proactive approach with the ability to meet multiple deadlines. Creative problem solver with a genuine interest in data security and regulatory affairs. More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Michael Page
infrastructure including both software and hardware, databases, and other technology platforms; leading the support and maintenance of applications; development and testing of new applications and platforms and cyber and informationsecurity for the Agency. Description This role will either be work on discreet small projects to proactively maintain the applications that are in production or work on operational … of the sift and the interviews completed to inform them of the outcome. Candidates will be subject to UK immigration requirements as well as Civil Service nationality rules. Further information on whether you are able to apply is available here. Successful candidates must pass a disclosure and barring security check as well as animal rights and pro-life … activism checks. People working with government assets must complete basic personnel security standard checks. Certain roles within the MHRA will require post holders to have vaccinations, and in some circumstances, routine health surveillance. These roles include: Laboratory-based roles working directly with known pathogens Maintenance roles, particularly those required to work in laboratory settings Roles that involve visiting other More ❯
our vantage point as one of the largest international professional services networks to provide global threat intelligence services, tailored and delivered locally to our clients. Our research underpins our security services and is used by public and private sector organisations around the world to protect networks, provide situational awareness and inform strategy. What your day will look like: As …/Field of Study required:Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required SkillsOptional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, InformationSecurity, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion More ❯
Are you strong on the DevOps side with a focus on security? If so, this is the opportunity for you! You'll be joining a dynamic B2B SaaS company that partners with some of the biggest names in the industry, analyzing vast amounts of data to help businesses make better decisions. You'll be the go-to expert for … container security, designing and implementing automated deployment, maintenance, and monitoring of SaaS products on AWS. Collaborate with Technical Architects and InformationSecurity teams to create robust deployment procedures and proactively address security risks. Your expertise will drive their continuous delivery strategy, infrastructure optimisation, and seamless product architecture improvements. As part of this agile and forward-thinking … their serverless ECS environment. The company values innovation and is always looking to enhance its platform. While the lead engineer focuses on AI development, you'll take charge of security and DevOps. Working heavily in an AWS environment, you'll use Terraform for IaC, build CI/CD pipelines, write Docker images, and manage container security. Enjoy a hybrid More ❯
develop Alteryx workflows. Monitor and optimize solution performance and contribute to process improvements. Deploy new solutions or update existing ones in line with Change Management Framework. Ensure compliance with InformationSecurity and Data Governance standards. Promote best practices, provide training, share knowledge, and offer first-line support to users. Translate business requirements into prototypes. Manage the UAT environment … Strong ability to interpret business requirements and produce technical documentation. Excellent analytical, problem-solving, interpersonal, and communication skills. Experience in Financial Services or financial reporting is a plus. Additional information: We provide training and professional qualifications to support your growth. You should be quick to learn new systems and processes and excel in building relationships with colleagues and clients. More ❯
of end-users and stakeholders throughout the development process, and incorporating feedback into product iterations. Collaborate with cross-functional teams to define and implement governance processes, compliance requirements, and security standards applicable to financial services software solutions. Drive continuous improvement and innovation in software delivery practices, leveraging Agile frameworks, best practices, and tools to optimize productivity, quality, and efficiency. … Agile collaboration tools such as Jira, Confluence, or similar platforms. Good knowledge of ITIL methodologies or can demonstrate use of such - mostly in the area of SLM, Service Continuity, InformationSecurity Management, Change, Incident & Problem management. Strong analytical and problem-solving skills, with the ability to assess complex business problems and drive innovative solutions. Able to manage multiple More ❯
forward-looking IT audits across all Operating Companies. Be(come) the subject matter expert within the Technology domain in the areas of IT operations, IT service management, IT resilience, informationsecurity, etc.. Enhance audit effectiveness through data analytics Identify evolving threats and assess risks in advanced technologies Liaise with Technology managers in tracking progress in addressing audit recommendations More ❯
forward-looking IT audits across all Operating Companies. Be(come) the subject matter expert within the Technology domain in the areas of IT operations, IT service management, IT resilience, informationsecurity, etc.. Enhance audit effectiveness through data analytics Identify evolving threats and assess risks in advanced technologies Liaise with Technology managers in tracking progress in addressing audit recommendations More ❯
forward-looking IT audits across all Operating Companies. Be(come) the subject matter expert within the Technology domain in the areas of IT operations, IT service management, IT resilience, informationsecurity, etc.. Enhance audit effectiveness through data analytics Identify evolving threats and assess risks in advanced technologies Liaise with Technology managers in tracking progress in addressing audit recommendations More ❯
employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law. Rivian is committed to … Disabilities Act, that requires accommodations to assist you in the search and application process, please email us . Candidate Data Privacy Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes ("Candidate Personal Data"). … This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your More ❯
Cambourne, Cambridgeshire, United Kingdom Hybrid / WFH Options
Remotestar
with a fully remote work policy. About Client: Our Client is established on the fundamental principle of risk mitigation and management. The client is led by a team of informationsecurity and high-growth company specialists committed to combatting external cyber security threats facing your business. About the role: The Remote Python Developer plays a pivotal role More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
THE CHANNEL RECRUITER LTD
data protection, AI, and cutting-edge technology? Do you thrive in a collaborative environment where innovation meets impact? XMA is looking for a Data Custodian to join the growing security team and help shape the future of data governance and compliance. Established in the 80's our client has grown to become one of the top ten largest value … positive impact home. About the Role As a Data Custodian, you will play a pivotal role in managing and safeguarding our data assets. You'll work closely with Infrastructure, Security, and Compliance teams to ensure our data practices are secure, compliant, and future-ready. This role is ideal for someone with hands-on experience in Microsoft Purview, data protection … practices. Support the DPO with DSARs, data requests, and incident responses. Generate automated reports to demonstrate data protection compliance. Collaborate with our MSOC provider and internal teams to enhance security posture. Conduct regular access reviews and support change management processes. Review supplier/customer risk assessments related to data retention, masking, and anonymisation. What We're Looking For Essential More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Ultromics
to refine clinical and scientific messaging in marketing and customer engagement. Assist with review of internal research policy, procedures, analytical and data management code, and scientific communication. Follow good information governance practice throughout this job role and ensure compliance with Ultromics' informationsecurity and data protection policies in all applicable assigned tasks. This list of duties is More ❯
driving progress, solving problems, and mentoring junior team members; deep expertise and applied knowledge within relevant area. Apply link Copy link Bachelor's degree in Computer Science, Computer Networking, InformationSecurity, or a related technical field, or equivalent practical experience. At least 3 years of experience with IP Networking, Internet Service Providers, Network Protocols, Border Gateway Protocol, or … Network Troubleshooting. Experience designing and implementing secure and resilient networks using multiple technologies. Eligibility to obtain UK Developed Vetting (DV) security clearance; British Citizenship required. Preferred qualifications: Experience with scalable cloud networking concepts (like Load Balancers, Firewalls) and web standards (like REST APIs, web security). Experience managing or directing field operation technicians, engineers, and extended workforces in … team in Google Public Sector delivers, operates, and secures private cloud services. Our goal is to provide the flexibility, reliability, and scalability of public cloud for customers with high security requirements that can only be met in a private cloud environment. We deploy and operate these private cloud solutions for critical clients, working closely with Google product teams to More ❯
with strategy and roadmap.Align product development with Bupas Technology Strategic Framework, driving innovation and continuous improvement.Own run and change for technology products, applying DevSecOps to ensure secure, resilient services.Ensure informationsecurity, data protection, and resilience across the product lifecycle, including third-party oversight.Align product data models and integration strategies with enterprise architecture standards.Build and lead multi-disciplinary teams … platform team, including line management.Manage asset lifecycle, promote cloud adoption, and integrate technical debt into product backlog.Coordinate cross-functional dependencies to improve delivery speed and agility.Ensure compliance with risk, security, and resilience standards.Lead audit readiness and manage performance against KPIs and strategic goals.Oversee technology suppliers, optimise contracts, and manage vendor relationships and roadmaps.Evaluate and influence procurement of new software … Senior technology professional with significant experience delivering complex product delivery. Experience in owning the change and run activities for technology products, including planning and backlog management, onboarding new applications, security and architecture governance, and delivery of operating models. Collaborative, with outstanding communication skills and a strong ability to work with diverse stakeholder groups, often translating technical language into business More ❯
in new and exciting ways. Responsibilities Description of Role ROLE SUMMARY: Our customer specialises in the design, build and operation of high integrity data centres, developed to provide optimum security and availability of services within anyone of its key data centre locations at Corsham and Farnborough. By joining our 'Enterprise' operational team as a Fibre and Copper Engineer you … all Add/Moves/Changes (A/M/C) are approved, correctly recorded, labelled and reported correctly. Adhering to compliance requirements for Health and Safety, Environmental, Quality, InformationSecurity and Data Protection relevant to your job, function and location. Qualifications For development purposes the following knowledge, skills and experience are required. SKILLS AND EXPERIENCE: Ability to … complete tasks safely and to the highest standards within given timescales Customer focussed individual with a proactive and flexible approach to working A requirement for the role is SC Security Level Clearance check. Existing SC Clearance level and security checks advantageous however will be facilitated for the right candidate. COMPANY VALUES: At North we embrace the following values More ❯
procedures, and compliance frameworks. Build and manage a cross-functional procurement team (including vendor and sourcing specialists). Vendor & Partnership Management Manage complex vendor relationships across hardware, software, cloud, security, and telecom. Oversee vendor compliance with SLA, SOC 2, and other applicable frameworks. Maintain partnership requirements (e.g., Microsoft, Dell, Cisco), including certifications and revenue thresholds. Procurement Operations Oversee all … procurement lifecycle activities: assessment, process, negotiation, order fulfillment, and contract lifecycle. Work closely with Sales, Service Delivery, Legal, Security, and Finance for procurement alignment. Build and improve CPQ and procurement automation workflows to increase speed and accuracy. Procurement as a Service ( PraaS) Co-lead the launch of PraaS for Atlas clients, including pricing, fulfillment, client service, and logistics. Create … quarterly business reviews with strategic vendors. Risk Management & Compliance Own procurement risk framework across vendor, delivery, regulatory, and reputational risk. Lead due diligence for new vendors in collaboration with InformationSecurity and Legal. Track and ensure contract compliance across the entire vendor portfolio. Requirements Must-Have 7-10+ years of experience in procurement leadership roles, ideally within More ❯
Higher Walton, Warrington, Cheshire, England, United Kingdom
United Utilities
finding experience and working knowledge of telemetry devices and wide area network communications including full understanding of IP networking and routing Good knowledge of both physical and IT-related security alongside working knowledge of InformationSecurity good practice and an appreciation of the NIS directive Possessing sound working knowledge of hardwired analogue and digital control systems Qualifications More ❯
RMS. To work with the Minerva delivery teams to ensure that the organisation is aligned with thevision ensuring maximisation of RMS to transform how the forces work together, share information and realise the benefits. To represent our client at specialist RMS system owner meetings, with engagement to evolve and develop the force relationship around product development. To coordinate developments … similar service management frameworks. Excellent communication, problem solving Stakeholder/Customer Engagement and customer service Demonstrable skills in managing complex workloads and performance delivery. GDPR, Data Protection awareness Cyber security awareness Please note: The post holder will be expected to maintain a high standard of informationsecurity and be vetted to Local Force Management Vetting (MV). More ❯
our team based in Grantham. You will join us on a full-time , permanent basis . In return, you will receive a competitive salary of £38,414.20 per annum. Information: We operate flexi time and flexible working with occasional travel to Grantham and other Thera locations Join Thera Trust as our Data Protection Officer Are you passionate about data … Officer, you will play a pivotal role in ensuring Thera complies with all relevant data protection laws and regulations including GDPR. You will lead the development and implementation of informationsecurity and data protection policies, provide expert guidance and training to staff across the organisation, conduct supportive audits, and support incident management. Key Responsibilities Ensure compliance with data … data responsibility across the organisation. What We are Looking For A degree in a relevant field and a recognised data protection certification. In-depth knowledge of GDPR and data security practices. Strong communication and analytical skills. Proven experience in data protection, compliance, and risk management. If you have a passion for making a difference to people’s lives, consider More ❯
IT but not sure where to begin? We’ve got you covered! What you’ll learn: Support users and fix real-world IT problems. The basics of infrastructure, cyber security, software, and communication systems. How to work in a professional IT environment to grow your confidence. Role You’ll be the first point of contact for our customers, helping … it’s the start of a career in tech. You’ll be supported every step of the way in a friendly, professional environment where your development matters. Apprenticeship Standard Information communications technician (level 3) Training Provider QA LIMITED Working Week Our Service Desk runs Monday to Friday with shifts between 8:00am and 6:00pm, plus a late shift … working Initiative Qualifications English GCSE, grade 5 or above (Essential) Maths GCSE, grade 5 or above (Essential) About the Employer etiCloud Ltd etiCloud - Delivering tomorrow's technology, today.. Data security is more important than ever. That's not going to change. So you need a company that understands your business needs, and that you can trust to take care More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date on the latest cyber threats and technologies Requirements: Essential: Experience in informationsecurity or networking Understanding of network protocols (e.g. TCP/IP, DNS) Strong communication and client-facing skills A proactive, problem-solving mindset Fluent in written and spoken … evenings/weekends for planned exercises (not a 24/7 role) Desirable: Degree or equivalent experience Previous consulting or technical client-facing experience Background in SOC, Pen Testing, InfoSec, or Systems Admin Knowledge of BGP, WAF, CDN, or cloud platforms (AWS, Azure, GCP) Basic scripting (e.g. Python, Bash) for automation or analysis Please note that at times due to More ❯
Solihull, West Midlands, Illshaw Heath, West Midlands (County), United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
ERP, service management and billing domains. Providing hands-on technical leadership, mentoring developers and collaborating closely with BAs and QA. Championing best practice in Agile delivery, CI/CD, security, performance and maintainability. Keeping stakeholders informed through crisp, jargon-free communication and comprehensive documentation. What the Enterprise Systems Architect needs to bring Proven experience designing and implementing enterprise-wide … event-driven design patterns. Practical exposure to cloud platforms (preferably Azure), CI/CD pipelines and Agile frameworks (Scrum/Kanban). Solid understanding of CMDB, data management and information-security principles. Clear, concise communication style Eligibility for BPSS clearance Why join their team Hybrid working with free on-site parking and a culture that values work-life More ❯
resolve application issues following agreed procedures, using management software to monitor performance and carry out maintenance tasks. Apply ethical data transformation techniques in line with policies, being sensitive to information risks. Define and manage scoping, requirements, and prioritization for small-scale changes; assist with complex initiatives, ensuring standards are followed, requirements are well-documented, and traceability is maintained. Manage … Stakeholder and customer engagement experience. Ability to manage complex workloads and deliver performance. Awareness of GDPR, Data Protection, and Cyber Security. Please note: The post holder must maintain high informationsecurity standards and be vetted to Local Force Management Vetting (MV). If this sounds like you, apply now More ❯