Senior Project Manager (Oracle Cloud & HCM) UK-BASED INTRODUCTION: Widely considered to be leading players in Oracle Cloud Consulting, especially HR / HCM / Payroll and now part of IBM.. We offer a warm, friendly, 'collaborative' atmosphere, interesting & challenging work with a professional & experienced Team, good Career advancement … become a positive reference site. Oversee other Projects being delivered by colleagues acting as senior reviewer and champion of raising standards and good-practice / best-practice. YOUR MAIN DUTIES & RESPONSIBILITIES: Project planning & leadership: Lead a Team of Oracle Solution Architects, Consultants and Testers, acting as the Project Manager … deliver on Oracle’s ERP Cloud, HCM Cloud, E-Business Suite applications. We are delighted to be able to say that we’re an ISO27001, BACS and Cyber Essentials accredited business but there are many reasons that we’re proud of what we’ve achieved over the years. More ❯
pivotal role in safeguarding our systems, networks, and data while ensuring compliance with industry-leading security certifications such as SOC 2, HIPAA, and ISO 27001. Your expertise will directly contribute to maintaining trust with our customers and securing their critical information assets. This role sits within the Platform … the threat landscape relevant to SaaS products, preferably in a data-heavy environment. Hands-on experience with security technologies such as firewalls, intrusion detection / prevention systems, SIEM, antivirus, encryption, and vulnerability assessment tools. You own relevant certifications (Security+, IAT II / III level or similar). You … expertise in AWS and GCP, with experience in multi-region and hybrid cloud architectures; Azure is a plus. Excellent understanding of networking protocols, TCP / IP, and network security concepts. Strong programming / scripting skills (e.g., Python, Elixir) for automation and security tool integration. Strong analytical skills and More ❯
focus on Datacentre, 3GPP mobile network CORE and RAN environments. Key Responsibilities: Networking, Segmentation, Optimization and Maintenance Design, configure and implement highly scalable L2 / L3 networks using varieties of protocols and vendor equipment. Monitor network traffic and analyse security incidents to detect and respond to threats within mobile … critical network services. Design and implement network security solutions such as Policies, IPS, SSLVPN, IPSec VPN and security profiles using Next-Gen Firewalls (FortiGate / Palo-Alto). Develop and apply network segmentation strategies to strengthen security and safeguard sensitive information within the core network. Work closely with other … to integrate security measures into network architecture, including mobile network elements. Respond to security breaches and provide incident response and disaster recovery support. Qualifications / Skills: Bachelor's degree in computer science, Information Security, or a related field (or equivalent work experience). Master's degree in Cybersecurity or More ❯
or equivalent) e.g. CISSP. In-depth knowledge of security frameworks, standards, and best practices (e.g., ISO27001, NIST, CIS, DSPT / CAF). Experience as a Security Architect or in a similar role, with a strong track record of designing and implementing security controls and … / or solutions and leading technical teams. Experience with architecture methodology such as TOGAF or SABSA. Experience of threat and risk modeling. Strong understanding of network security, encryption, authentication, and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection / prevention systems, security information and … Google). Experience of DevSecOps. Experience of research in technology trends and ways to secure those technologies. Experience with automated deployment techniques and CI / CD pipelines. Experience working in or with Government organizations, especially within a Health and Social Care setting, including the handling of assets subject to More ❯
IT support for 100 employees across two remote locations. We are mostly Mac users with a handful of Windows machines. Ensure a smooth onboarding / offboarding process and resolving technical issues efficiently. Implement and maintain identity and access management (IAM) systems, including SSO and MFA. Evaluate and recommend new … tools (e.g., Jumpcloud). Strong understanding of network infrastructure, including firewalls, VPNs, and cloud-based networking solutions. Experience with IAM systems (e.g., Azure AD / Microsoft Entra) and security tools (e.g., endpoint protection, DLP, SIEM). Hands-on expertise with troubleshooting hardware, software, and SaaS issues. Security Knowledge: Familiarity … with security frameworks and standards such as SOC 2, ISO27001, GDPR, or NIST. Experience with incident response and risk management. Knowledge of Zero Trust architectures and security-first IT practices. Soft Skills: Excellent problem-solving and communication skills. Ability to collaborate effectively with external partners More ❯
company is expanding, highly profitable, offering significant bonuses of around 30%. Core requirements include core network engineering, OT (ICS, SCADA), Cloud, SD-WAN / SDN. The Position We are seeking a highly skilled hands-on IT & OT Network expert with Cloud experience to lead and optimize our network … IT and OT networks, including cloud, on-premises, and hybrid environments. Cybersecurity & Compliance: Ensure compliance with industry standards and regulatory requirements (e.g., NIST, IEC 62443, ISO27001), implementing best-in-class cybersecurity measures. Cloud Computing & Edge Technologies: Optimize cloud-based solutions, including hybrid and More ❯
acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn GRC tools and best practices. RSA Archer is preferred. Financial and / or Banking industry experience preferred. Professional qualifications / certifications Ideally qualified in MSc Information Security, CICA, CRISC, CISM and / or Data … which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including: Holiday - UK / Asia: 25 holiday days and 3 ‘life days’ (in addition to bank holidays). US: 23 holiday days. 2 paid volunteer days so that … Network) in support of our organisational commitment to embrace and always be learning more about DE&I. Hybrid working to promote a healthy work / life balance, enabling employees to work collaboratively in the office when needed and work from home when they don’t. Active support of flexible More ❯
acceptable level. Knowledge of vulnerability management and incident management practices. Ability to learn GRC tools and best practices. RSA Archer is preferred. Financial and / or Banking industry experience preferred. Professional qualifications / certifications Ideally qualified in MSc Information Security, CICA, CRISC, CISM and / or Data … which everyone feels comfortable to be who they are, and inclusion is valued. All employees have access to our inclusive benefits, including: Holiday - UK / Asia: 25 holiday days and 3 ‘life days’ (in addition to bank holidays). US: 23 holiday days. 2 paid volunteer days so that … Network) in support of our organisational commitment to embrace and always be learning more about DE&I. Hybrid working to promote a healthy work / life balance, enabling employees to work collaboratively in the office when needed and work from home when they don’t. Active support of flexible More ❯
of security principles, practices, and frameworks (e.g., PCI, NIST, ISO27001). Experience with security tools such as SIEM, IDS / IPS, endpoint protection, and penetration testing tools. Experience with public cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will have More ❯
Engineer by: Working with the Head of Engineering to develop the security strategy and ensure appropriate security governance is in place Operating and improving / implementing security infrastructure including SIEM, WAFs, Firewalls and EDR / AV Working with engineering teams to ensure best practices including secure development, security … may be right for this role if you: Have hands-on experience in one or more of the following areas: (Security Operations Centre; Product / Application Security; Cloud Infrastructure Security; Cloud DevOps / Infrastructure Engineering) Have reasonable experience of Cloud security Are a confident writing code in at … as Terraform Have experience of working closely software engineering teams Have a solid understanding of software engineering best practices, including the Agile SDLC, CI / CD, iterative development, automated testing etc. The ability to set meaningful, business aligned goals and execute independently, utilising your great communication skills Have a More ❯
other promotions) when you shop at H&B on anything that you buy. We all need a little help sometimes, so weoffer Free 24 / 7 Confidential Advice & Colleague Welfare . Mental Health First Aiders - we have lots of qualified Mental Health First Aiders because its all about your … our EPIC values regardless of background, culture, disability, ethnicity, gender identity or sexual orientation Holland & Barrett does not accept unsolicited resumes from search firms / recruiters. Please do not forward resumes to our job alias, employees, or any other company location. Holland & Barrett is not and will not be … responsible for any fees if a candidate submitted by a search firm / recruiter unless otherwise agreed with respect to specific open position(s). Vacancy Alerts Create an alert subscription based on this vacancy More ❯
why you'll find endless knowledge-sharing, mentorship and other career-advancing resources here to help you develop into a better-rounded professional. Work / Life Balance - We value work-life harmony. Achieving success at work should never come at the expense of sacrifices at home, which is why … business software at scale or current hands-on technology infrastructure, network, compute, storage, virtualization and experience building and operating release management systems, and CI / CD workflows. - Hands-on technical expertise in building security capabilities in code and deploying infrastructure in code. - Implementation experience with enterprise security solutions such … frameworks - Experience with IT compliance and risk management requirements (eg. security, privacy, SOX, PCI DSS, ISO27001, HIPAA, and NIST / DoD, etc.) and understanding the architectural implications of meeting them. Ability to travel to client locations when needed and excellent Italian and English communication More ❯
focus on acquisition integration. Strong knowledge of regulatory compliance requirements, risk management frameworks, including ISO27001, NIST. Experience with SOC1 / 2, GDPR, and privacy frameworks. Proficiency in information … security tools, techniques, and controls. Experience with metrics and KPIs to measure and track information security risk. Ability to develop policies, standards, and guidelines. ISO27001:2022 Lead Implementer and lead auditor certifications are a must. CISA, CISM, CISSP, or CRISC certifications are desirable. Candidate Characteristics: Exceptional communication and interpersonal skills. More ❯
clinical experience Committed to forging a career in Digital Health Excellent communication skills - written, verbal and presentation Comfortable with basic medical statistics (e.g. Sensitivity / Specificity / PPV / NPV etc) An analytical / methodical approach to problem-solving Ability to prioritise and switch between detail … appropriate Nice to have Clinical experience in skin cancer pathways, e.g. through roles in Dermatology, Plastics or GP Experience in medical education - teaching + / - writing copy to educate medical and non-medical audiences Basic understanding of regulatory and clinical risk management landscape for clinical software and medical devices … and / or experience working with medical devices Publication history including first author publications and / or presentations at conferences Experience with data management, for example using Excel, R or SQL Skin Analytics manufactures medical devices and complies with ISO standards 13485 and 27001. As part More ❯
you will collaborate closely with internal teams to safeguard critical business operations by design and default. You will be responsible for security automation, CI / CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI / … compliance with ISO27001:2022, SOC1 Type2, and SOC2 Type2 standards. Provide support for security audits, policy implementation, and KPI / KRI monitoring . Qualifications & Requirements Technical Skills: Cloud & Security Expertise: Hands-on experience with AWS (or other cloud-based solutions) . Strong understanding of … secured Software Development Lifecycle (SDLC) and CI / CD platforms . Familiarity with OWASP, CIS frameworks, and security best practices . Infrastructure & Scripting Knowledge: Proficiency in Microsoft platforms (Office 365, IIS, .NET, SQL Server, Windows Server, Active Directory). Strong scripting skills in PowerShell (highly beneficial). Experience with More ❯
you will collaborate closely with internal teams to safeguard critical business operations by design and default. You will be responsible for security automation, CI / CD pipeline enhancements , and cloud security management , ensuring compliance with industry standards. Key Responsibilities Security & DevOps Integration: Support and extend the secured CI / … compliance with ISO27001:2022, SOC1 Type2, and SOC2 Type2 standards. Provide support for security audits, policy implementation, and KPI / KRI monitoring . Qualifications & Requirements Technical Skills: Cloud & Security Expertise: Hands-on experience with AWS (or other cloud-based solutions) . Strong understanding of … secured Software Development Lifecycle (SDLC) and CI / CD platforms . Familiarity with OWASP, CIS frameworks, and security best practices . Infrastructure & Scripting Knowledge: Proficiency in Microsoft platforms (Office 365, IIS, .NET, SQL Server, Windows Server, Active Directory). Strong scripting skills in PowerShell (highly beneficial). Experience with More ❯
over experience for this role. While we don't expect you to have expertise in every area, some experience in cyber threat intelligence and / or threat hunting, along with familiarity with Microsoft's security products, is essential. You will have some of the following skills and experience: Experience … in Cyber Threat Intelligence Experience in Threat Hunting Experience with the Microsoft Sentinel SIEM / SOAR platform Proficient in writing KQL Strong understanding of threat intelligence principles and practices. Strong understanding of security risk management Understanding of threat modelling Knowledge of ISO27001 and other … Employee Referral Bonus - Know someone amazing? Get rewarded for bringing them on board! Wellbeing Support - Access to Mental Health First Aiders, plus 24 / 7 online GP services and an Employee Assistance Programme for you and your family. A Great Place to Work - We have a lovely Central London More ❯
reusable artifacts Minimum Requirements: 3+ Years experience in IT security, compliance and risk management, privacy & controls, and security reference architectures for all-in and / or hybrid deployments Hands-on technical expertise in building security capabilities in code and deploying infrastructure in code such as WAF, Firewall, Anti-DDOS … and SIEM 3+ Years hands-on technical expertise in security architecture, technology automation, implementation, integration, and / or deployment Experience running big scale security engagements with customers and ability to travel to client locations to deliver professional services as needed Bachelor or Master degree in computer science or similar … Python, Node.js, Javascript, Bash, Ruby, Perl, etc. as well with Chef, Puppet, Salt, or Ansible in production environments at scale Technical expertise (design and / or implementation) in Cloud Computing technologies Experience in leading customer facing engagements such as risk assessment and management audits and experience building enterprise security More ❯
Policy Development and Compliance: Establish and enforce security policies, procedures, and best practices. Ensure continued compliance with industry standards, regulations, and certifications (e.g., ISO27001, GDPR, SOC 2). Incident Response and Management: Maintain and where needed develop incident response plans. Lead investigations and response efforts … and Infrastructure Oversight: Oversee the design, implementation, and maintenance of security tools and technologies in Microsoft Windows network and Azure environment (e.g., firewalls, IDS / IPS, endpoint security). Collaborate with IT teams to secure networks, systems, and applications. Training and Awareness: Provide input to and improve security training More ❯
Policy Development and Compliance: Establish and enforce security policies, procedures, and best practices. Ensure continued compliance with industry standards, regulations, and certifications (e.g., ISO27001, GDPR, SOC 2). Incident Response and Management: Maintain and where needed develop incident response plans. Lead investigations and response efforts … and Infrastructure Oversight: Oversee the design, implementation, and maintenance of security tools and technologies in Microsoft Windows network and Azure environment (e.g., firewalls, IDS / IPS, endpoint security). Collaborate with IT teams to secure networks, systems, and applications. Training and Awareness: Provide input to and improve security training More ❯
Policy Development and Compliance: Establish and enforce security policies, procedures, and best practices. Ensure continued compliance with industry standards, regulations, and certifications (e.g., ISO27001, GDPR, SOC 2). Incident Response and Management: Maintain and where needed develop incident response plans. Lead investigations and response efforts … and Infrastructure Oversight: Oversee the design, implementation, and maintenance of security tools and technologies in Microsoft Windows network and Azure environment (e.g., firewalls, IDS / IPS, endpoint security). Collaborate with IT teams to secure networks, systems, and applications. Training and Awareness: Provide input to and improve security training More ❯
risk management, and investment planning. Create business cases that communicate ROI and business enablement. Conduct maturity assessments using frameworks such as NIST CSF, ISO27001, and industry-specific standards. Facilitate threat and risk workshops tailored to client environments. Showcase innovation through demos of emerging technologies like … Broad understanding of cyber domains (cloud, identity, operations, compliance) Hands-on experience with major cloud platforms and security technologies Familiarity with frameworks (NIST, ISO, COBIT) and regulatory compliance (DORA, NIS2) Solution architecture experience and vendor-neutral evaluation approaches Qualifications Degree in a relevant field or equivalent practical experience More ❯
with IT security systems, governance, incident management, and best practices. Deep knowledge of security and infrastructure principles and tools. Familiarity with standards like ISO27001, NIST, GDPR. Strong analytical, problem-solving, and communication skills. Leadership experience supporting security professionals. Additional Information This job description is not More ❯
managing and addressing complex audits and compliance issues. Support organizational compliance by ensuring security controls align with regulatory and industry standards (e.g., NIST, ISO27001, DORA). Provide evidentiary support for Audit and Compliance teams. Oversee the remediation process for findings originating from internal and external More ❯
managing and addressing complex audits and compliance issues. Support organizational compliance by ensuring security controls align with regulatory and industry standards (e.g., NIST, ISO27001, DORA). Provide evidentiary support for Audit and Compliance teams. Oversee the remediation process for findings originating from internal and external More ❯