Cybersecurity Director - UK Region Reporting to the EMEA Regional Security Officer, this role is key in managing the regional and solution line operational security risk levels within acceptable thresholds through leading remediation programs and deploying Global Cybersecurity Services (GCS) controls. The role acts as a primary contact for all Cybersecurity … look like The RSO service connects regions, sub-regions, and solution lines to GCS to ensure appropriate security risk mitigation, providing the following services: Cybersecurity Leadership: Provide cybersecurity reporting to leadership committees and boards. Represent cybersecurity to regulatory bodies. Own the cybersecurity strategy for the area, managing its delivery via … adoption. Lead colleague security culture programs. Represent the region/sub-region in security incident management. Manage remediation efforts, e.g., internal audit findings. Oversee cybersecurity compliance and conduct management. Cybersecurity Risk Management: Manage a cybersecurity risk committee to support cyber risk management. Track remediation of audit and compliance findings. Review More ❯
Consultant- CyberSecurity Consulting & Advisory Consultant Process Cybersecurity Competency Management Cyber Competency Strategy Planning Company: ITL UK Requisition ID: 132349BR Role - Consultant (JL5) Technology - CyberSecurity Consulting & Advisory Location - London (UK) Business Unit - CyberSecurity, Cyber C&A, IOT/OT Team Compensation - Competitive (including bonus) Job Description Today, the … be the cornerstones of our organization and these values are upheld only because of our people. Your role As a Consultant in the Infosys Cybersecurity Consulting & Advisory team, you are an expert at contributing to different phases of the Cybersecurity consulting lifecycle. You will be intensely involved in … shape value-adding consulting solutions that enable our clients to meet the changing needs of the global landscape. Required: Industry experience working in enterprise cybersecurity domain OT Security Strategy & Program Management: Assess OT security risks, develop security roadmaps, and align OT security measures with enterprise IT security frameworks. Deploy More ❯
company and customer information. Conduct regular security audits and risk assessments to ensure compliance with regulatory standards. Lead employee training and awareness programs on cybersecurity practices. What you'll need to succeed 5+ years of experience in IT management or system administration 2+ years in an InfoSec-related role Technical More ❯
solutions Bachelor's degree in Information Security, Computer Science, or related field (or equivalent experience) 2+ years of experience in an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
Experience: Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience) 2+ years of experience in an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
Experience: Bachelor’s degree in Information Security, Computer Science, or related field (or equivalent experience) 2+ years of experience in an information security or cybersecurity role Strong understanding of security principles, frameworks, and practices (e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS More ❯
Senior Consultant - CyberSecurity Consulting & Advisory Consultant Company: ITL UK Requisition ID: 132345BR Role: Senior Consultant (JL5) Technology: CyberSecurity Consulting & Advisory Location: United Kingdom (London) Business Unit: CyberSecurity, Cyber C&A Team Compensation: Competitive (including bonus) Job Description: Today, the corporate landscape is dynamic and the world ahead … be the cornerstones of our organization and these values are upheld only because of our people. Your role: As a Consultant in the Infosys CyberSecurity Consulting & Advisory (C&A) Team, you are an expert at contributing to different phases of the CyberSecurity consulting lifecycle. You will be intensely … requirements through Assessments, Design reviews, and Upgrades. This role requires a deep understanding of GRC cybersecurity, with secondary skills in a domain area of cybersecurity ISMS, whilst working with cross-functional teams to enhance the security posture of clients' CyberSecurity strategy at both operational and tactical levels, as More ❯
desirable 5+ years of experience in information security or a related role, with at least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration More ❯
desirable 5+ years of experience in information security or a related role, with at least 2 years in a managerial capacity. Strong knowledge of cybersecurity frameworks, standards, and best practices. Proficiency with security technologies and tools (e.g., SIEM, vulnerability scanners, encryption tools). Hands-on experience with incident response, penetration More ❯
services are robust, cost-effective, and aligned with business needs and the Strategic IT vision. They will also play a key role in enhancing cybersecurity, protecting data and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of More ❯
services are robust, cost-effective, and aligned with business needs and the Strategic IT vision. They will also play a key role in enhancing cybersecurity, protecting data and systems, driving transformative operational change, enhancing IT processes and ensuring compliance with governance bodies and industry regulations. Due to the nature of More ❯
pressure situations. Ethical Integrity: Strong sense of responsibility for data confidentiality and compliance with privacy regulations. Education & Certifications: Bachelor’s degree in Computer Engineering, Cybersecurity, or a related field. 3+ years of experience in a DevOps or DevSecOps role . Bonus Certifications (Preferred, not required): AWS Certified DevOps Engineer AWS More ❯
pressure situations. Ethical Integrity: Strong sense of responsibility for data confidentiality and compliance with privacy regulations. Education & Certifications: Bachelor’s degree in Computer Engineering, Cybersecurity, or a related field. 3+ years of experience in a DevOps or DevSecOps role . Bonus Certifications (Preferred, not required): AWS Certified DevOps Engineer AWS More ❯
pressure situations. Ethical Integrity: Strong sense of responsibility for data confidentiality and compliance with privacy regulations. Education & Certifications: Bachelor’s degree in Computer Engineering, Cybersecurity, or a related field. 3+ years of experience in a DevOps or DevSecOps role . Bonus Certifications (Preferred, not required): AWS Certified DevOps Engineer AWS More ❯
Qualifications/Skills: Bachelor's degree in computer science, Information Security, or a related field (or equivalent work experience). Master's degree in Cybersecurity or Networking is desirable. Proven experience as a Network and Security Engineer or similar role, with focus on IP network design, implementation, T-shoot and More ❯
networks, and logs for any signs of security incidents or unauthorized access and respond promptly to mitigate risks. Investigate security breaches, incidents, and other cybersecurity events, and develop incident response plans to ensure timely and effective resolution. Collaborate with cross-functional teams to design, implement, and maintain security controls and More ❯
during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/CyberSecurity Awareness training, educating staff on best practices. Maintain comprehensive records and documentation of ISO activities. Provide regular updates and reports to the Information Security … for 3+ years. Relevant Information Security qualification (degree, CISSP, or CISM) obtained or in progress. Strong technical acumen with broad knowledge across Information/CyberSecurity, Software Development, and IT systems. Working knowledge of NIST CSF. Willingness to learn and expand skills in both Information Security and Financial Services. Ability … analytical and problem-solving skills. Proficiency in Microsoft Office. Interested? Please Apply! SOC ISO ISAO CISSP NIST CSF ISO27000 ISO27001 PCI DSS GDPR CybersecurityCyberSecurity Information Security Infosec Cybersec Risk Infrastructure ISMS More ❯
during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/CyberSecurity Awareness training, educating staff on best practices. Maintain comprehensive records and documentation of ISO activities. Provide regular updates and reports to the Information Security … for 3+ years. Relevant Information Security qualification (degree, CISSP, or CISM) obtained or in progress. Strong technical acumen with broad knowledge across Information/CyberSecurity, Software Development, and IT systems. Working knowledge of NIST CSF. Willingness to learn and expand skills in both Information Security and Financial Services. Ability … analytical and problem-solving skills. Proficiency in Microsoft Office. Interested? Please Apply! SOC ISO ISAO CISSP NIST CSF ISO27000 ISO27001 PCI DSS GDPR CybersecurityCyberSecurity Information Security Infosec Cybersec Risk Infrastructure ISMS More ❯
Berkeley Research Group provides independent advice, data analytics, authoritative studies, expert testimony, investigations, and regulatory and dispute consulting to Fortune 500 corporations, financial institutions, government agencies, major law firms, and regulatory bodies around the world. BRG experts provide sophisticated economic More ❯
best practices, policies, and tool implementations. What You'll Bring 5+ years of experience in security operations or incident response. Bachelor's degree in Cybersecurity, Computer Science, or related field, or equivalent work experience. Extensive knowledge of SIEM, EDR, Web & Email Gateways, Cloud Security, and firewall technologies. Proficiency in scripting More ❯
CCTV & surveillance systems (e.g., Axis, Avigilon, Milestone). Intrusion detection systems and perimeter security. Security hardware (e.g., barriers, gates, biometric readers). Knowledge of cybersecurity considerations related to physical security systems. Leadership & Team Management Experience in building, leading, and managing project teams. Strong people management skills, including performance management, training More ❯
remediation recommendations for diverse audiences. Communicate complex security concepts and threat insights effectively to technical and non-technical stakeholders. Collaborate with client IT and cybersecurity teams to improve security protocols and address vulnerabilities. Monitor remediation efforts and provide updates highlighting threat reduction. Conduct proactive security research and contribute to technical More ❯
vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze … an international enterprise environment is essential. Responsibilities: Collaborate with IT teams for input and operational requirements to design and implement the company's overall cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated … privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. Actively participate in proofs-of-concept for new security technologies by developing selection criteria to identify appropriate security solutions to support strategic, operational needs More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
ideally MSSP. Experience in a technical security role are also considered. Experience with SIEM tools, such as MS Sentinel, Alien Vault or Splunk A cybersecurity qualifications, certification or degree e.g. CySA+, CompTIA SEC+, or similar experience. Microsoft SC-200 Certs are desirable. Excellent communication skills A strong knowledge of More ❯