you! So, even if you feel that you're close but not an exact match, we encourage you to apply. Overview We are looking to add an experienced Senior Security Engineer to our Gallagher Technology Team. This role will be part of the global security architecture and engineering function in the UK, working closely with twin teams in … offer hybrid working, allowing you to spend two days a week in the office and three days working from home. Join a world-class team committed to driving exceptional security standards and making a real impact! How you'll make an impact Define and build InformationSecurity engineering standards, artefacts, design patterns, and technical specification documents. Provide … on Network Protocols, Remote Connectivity, Threat Prevention, Sandbox, DDoS, URL Filtering, and SSL decryption. Participate in troubleshooting design level issues. Assess, monitor, and recommend improvements to the global network security architecture to improve security posture, mitigate risks, and balance costs. Apply skills to security services and help build and protect enterprise systems, applications, data, and assets across More ❯
Senior Delivery Consultant (Security), Professional Services, UK NatSec, WWPS Job ID: AWS EMEA SARL (UK Branch) The Amazon Web Services Professional Services (ProServe) team is seeking a skilled Delivery Consultant (Security) to join our team at Amazon Web Services (AWS). In this role, you'll work closely with customers to design, implement, and manage AWS solutions that … meet their technical requirements and business objectives. You'll be a key player in driving customer success through their cloud journey, providing security expertise and best practices throughout the project lifecycle Our technical Security Consultants to help our customers build comprehensive security models, transform how they secure their sensitive workloads and develop their technical expertise. Our security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects, and conduct security workshops for customers. AWS security consultants collaborate with customers to address security and compliance challenges, and they help implement and migrate customer solutions and workloads onto AWS. Professional Services engage in a wide variety of projects More ❯
and attestations to support second-line permanent control checks. Coordinate IT control attestations across Group IT and with third-party service providers. Key Skills and Experience: Significant experience in InformationSecurity Governance, Risk, and Compliance (GRC), with a focus on IT risk and control management. Strong analytical skills with the ability to perform technical IT security and … operational risk assessments. High attention to detail, ensuring accuracy in documentation, assessments, and compliance activities. Strong understanding of informationsecurity risk management principles, frameworks (e.g., ISO 27001, NIST), and compliance practices. Exposure and understanding of IT infrastructure, business applications, and their associated risks and controls. Experience collaborating with internal and external audit teams, including supporting audit readiness and … evidence gathering. Proven ability to work effectively across multi-disciplinary, multi-cultural, and geographically dispersed teams. Excellent written and verbal communication skills, with the ability to convey complex information clearly to both technical and non-technical audiences. Strong interpersonal and presentation skills, with confidence engaging stakeholders at all levels. Industry-recognised technical certifications such as ITIL, CISSP, CRISC, or More ❯
and attestations to support second-line permanent control checks. Coordinate IT control attestations across Group IT and with third-party service providers. Key Skills and Experience: Significant experience in InformationSecurity Governance, Risk, and Compliance (GRC), with a focus on IT risk and control management. Strong analytical skills with the ability to perform technical IT security and … operational risk assessments. High attention to detail, ensuring accuracy in documentation, assessments, and compliance activities. Strong understanding of informationsecurity risk management principles, frameworks (e.g., ISO 27001, NIST), and compliance practices. Exposure and understanding of IT infrastructure, business applications, and their associated risks and controls. Experience collaborating with internal and external audit teams, including supporting audit readiness and … evidence gathering. Proven ability to work effectively across multi-disciplinary, multi-cultural, and geographically dispersed teams. Excellent written and verbal communication skills, with the ability to convey complex information clearly to both technical and non-technical audiences. Strong interpersonal and presentation skills, with confidence engaging stakeholders at all levels. Industry-recognised technical certifications such as ITIL, CISSP, CRISC, or More ❯
Job Description As a Senior Engineer - Threat Modelling, you will be part of a cross-functional team delivering digital business transformation solutions to our clients. This role focuses on Security Architecture and Threat Modelling, including governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration with Engineering, InformationSecurity, Program Management … and Development teams is essential. You will conduct technical architecture reviews to identify security opportunities, threats, and mitigation strategies. Your Impact Conduct threat modeling exercises using established methodologies. Identify potential threats and specify mitigation controls. Manage the lifecycle of threats and controls, ensuring updates. Deliver threat models within deadlines. Provide feedback to improve threat modeling processes. Present findings to … leadership and stakeholders. Qualifications Your Skills & Experience We seek candidates with experience in: Proficiency in GCP (essential) Security architecture principles, frameworks, and best practices Threat modeling methodologies like MITRE ATT&CK, STRIDE, PASTA Cybersecurity experience of 5+ years Security practices including authentication, authorization, logging, encryption, infrastructure security, network segmentation Knowledge of cloud security frameworks Rest API More ❯
result of compliance reviews, internal audits, third party audits or otherwise escalated. Supporting the Compliance Team and other key stakeholders on initiatives as assigned. Supporting the Privacy, Cybersecurity and InformationSecurity teams with projects to include compliance readiness for new laws, regulations (e.g. GDPR and CCPA), frameworks (e.g. COSO and NIST cybersecurity frameworks) and standards (e.g, DORA, PCI … Supporting regulatory, internal or external audits or certifications. Provide knowledge and operational input on our Third-Party Risk Management framework, including: Performing third-party vendor risk assessments, evaluating privacy, informationsecurity, and AI compliance risks, among others, during onboarding and renewal processes. Reviewing, updating and maintaining third party risk questionnaires and registers collaborating with various departments, including Legal … InformationSecurity, IT and Procurement. Support the Privacy team on a number of Data Privacy enhancing initiatives, including: conducting and document end-to-end Privacy Impact Assessments (PIAs) for new and existing products and processes, supporting compliance with GDPR, CCPA, and other privacy regulations. Maintain and update the Record of Processing Activities (ROPA) in collaboration with cross-functional More ❯
result of compliance reviews, internal audits, third party audits or otherwise escalated. Supporting the Compliance Team and other key stakeholders on initiatives as assigned. Supporting the Privacy, Cybersecurity and InformationSecurity teams with projects to include compliance readiness for new laws, regulations (e.g. GDPR and CCPA), frameworks (e.g. COSO and NIST cybersecurity frameworks) and standards (e.g, DORA, PCI … Supporting regulatory, internal or external audits or certifications. Provide knowledge and operational input on our Third-Party Risk Management framework, including: Performing third-party vendor risk assessments, evaluating privacy, informationsecurity, and AI compliance risks, among others, during onboarding and renewal processes. Reviewing, updating and maintaining third party risk questionnaires and registers collaborating with various departments, including Legal … InformationSecurity, IT and Procurement. Support the Privacy team on a number of Data Privacy enhancing initiatives, including: conducting and document end-to-end Privacy Impact Assessments (PIAs) for new and existing products and processes, supporting compliance with GDPR, CCPA, and other privacy regulations. Maintain and update the Record of Processing Activities (ROPA) in collaboration with cross-functional More ❯
A hybrid role that provides an efficient and cost-effective delivery of first and second-line support for information systems and related technology services within Octavia. To support the smooth operational running of Octavia's DT Infrastructure and Applications. Key Responsibilities Infrastructure Support Provide first and second-line support of issues regarding the DT and communications infrastructure, in accordance … team as and when required Business Continuity Ensuring backup regimes are effective and tested regularly Be aware of technical aspects of business continuity testing and implementing solution where necessary Security & Governance To uphold data protection and informationsecurity good practice, advising staff on good practice and escalating these and related issues when necessary Maintain security against … hacking, viruses, spyware etc In conjunction with suitably accredited suppliers, develop and maintain appropriate security measures against internal and external threats Ensure IT infrastructure and where applicable applications are documented to a high standard and that appropriate change management protocols are complied with Implement agreed actions recommended by audit and/or relevant regulatory and legal requirements as and More ❯
Alteryx workflows. Monitor and optimize solution performance and contribute to process improvements. Deploy new solutions and implement changes in line with Aztec's Change Management Framework. Ensure compliance with InformationSecurity and Data Governance standards. Advocate best practices, provide training, share knowledge, and offer first-line user support. Translate business requirements into prototypes. Administer the UAT Environment and … to translate business requirements into technical documentation. Strong analytical and problem-solving skills. Good interpersonal and communication skills. Experience in Financial Services or financial reporting is an advantage. Additional information: We offer training and professional qualifications to support your development. You should be quick to learn new systems and processes and excel in building strong relationships with colleagues and More ❯
Role Description This is a full-time hybrid role for an InformationSecurity Manager with 2nd and 3rd Line IT support experience. The role involves day-to-day tasks associated with planning, implementing, and maintaining an InformationSecurity Management System (ISMS), including managing cybersecurity risks, implementing network security measures, and ensuring compliance with industry standards. … The InformationSecurity Manager will also provide IT support to the company and will be based in the London office, with flexibility for some remote work. Your past experience must include 2nd and 3rd line infrastructure support where you are able to advise and direct the technical team. Qualifications Experience in InformationSecurity Management and creating … and implementing an ISMS Experience in Cybersecurity and Network Security Expertise in Informationsecurity best practices and standards Excellent problem-solving skills and attention to detail Strong communication and collaboration skills Bachelor's or Master's degree in Computer Science, Information Technology, or related field Certifications such as CISSP, CISM, CCNA, or equivalent are a plus More ❯
An impressive multinational Telecoms business is looking for an accomplished Senior InformationSecurity Engineer to join its team based in London. Please note, this role is hybrid so you will be required to work in the office 3 days per week. In this role of significant responsibility, you will operate at the cutting edge of technology, protecting the … business from cyber threats. You will design, implement, and maintain security solutions that protect networks, systems, and data. You will identify vulnerabilities, harden systems, respond to threats, and ensure compliance with security best practices and industry standards, including ISO27001. In order to be suitable for this role you must have demonstrable hands-on expertise with monitoring and securing … enterprise class technology estates. You will have proven experience with Cyber Security best practice including the NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK Telecom Security Act would be advantageous to your application, as would CISSP and/or CISM More ❯
InformationSecurity GRC Manager Contract role (Outside IR35) Location: London (Remote) iO Associates have collaborated with our consultancy division to help in their search for an InformationSecurity GRC Manager. You will work towards refining the entire GRC programme - frameworks, audits, risk assessments, stakeholder communication - across a regulated environment. You'll also work with vendors and … internal teams to ensure compliance and strong governance. Key Responsibilities: Build and refine informationsecurity governance and risk frameworks Lead audits (internal/external) and drive compliance (ISO 27001, GDPR, NIST) Own vendor risk, supplier assurance, and contract governance Communicate risks and policies across the business Support KPI development and risk strategy planning Requirements: Degree in Computer Science …/IT or relevant industry certifications such as CISA, CRISC, CISMP, ISO 27001 Lead Auditor/Implementer Working knowledge with legal/security needs in housing association sector and its regulatory environment Solid grasp of ISO 27001, NIST, GDPR, and PCI-DSS Proven experience in GRC leadership Skilled in risk analysis, audit reporting, and policy writing Excellent stakeholder management More ❯
Technical Head of InformationSecurity required for financial services firm. The role will be both strategic and technically hands on as it's a small function. What You'll Do Lead and support a small, global cybersecurity team. Create and manage a strategic security plan aligned with company goals and ISO 27001. Proactively identify and address security risks and threats. Respond to and manage cybersecurity incidents and breaches. Conduct risk assessments, penetration tests, and other security evaluations. Keep senior leadership updated on security posture and key metrics. Build relationships with security leaders in similar firms to stay ahead of threats and trends. Ensure compliance through audits and incident response exercises. Collaborate with tech … teams to ensure secure software and infrastructure. Manage third-party security vendors and track their performance. Run regular training to promote cybersecurity awareness across the company. What You Bring Experience leading high-performing global security teams. Strong understanding of security frameworks and regulations (eg, ISO 27001, NIST, GDPR, DORA). Background in network, cloud (Azure), endpoint, and More ❯
Contract type Permanent Contract Job summary We are seeking a proactive InformationSecurity Specialist skilled in security operations, threat intelligence, and risk management. This role is crucial for maintaining robust security protocols, identifying vulnerabilities, and ensuring compliance with security standards. The ideal candidate will have a strong background in IT infrastructure security, preferably within … and incident response. Having CISSP or other relevant certifications (e.g., Network+, Security+, MCSP, CAN) would be beneficial to have to perform this role. Day-to-Day of the Role: Security Operations and Infrastructure Assist in identifying, analysing, and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms (e.g. … CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and More ❯
Contract type Permanent Contract Job summary We are seeking a proactive InformationSecurity Specialist skilled in security operations, threat intelligence, and risk management. This role is crucial for maintaining robust security protocols, identifying vulnerabilities, and ensuring compliance with security standards. The ideal candidate will have a strong background in IT infrastructure security, preferably within … and incident response. Having CISSP or other relevant certifications (e.g., Network+, Security+, MCSP, CAN) would be beneficial to have to perform this role. Day-to-Day of the Role: Security Operations and Infrastructure Assist in identifying, analysing, and following up on security vulnerabilities in IT systems. Help maintain accurate IT asset inventory across various security platforms (e.g. … CMDB, AV, SIEM). Participate in regular security reviews, vulnerability assessments, and help ensure compliance with established security standards. Monitor user access and permissions, identifying and reporting potential unauthorized access. Implement and maintain Active Directory and File Share security controls. Participate in regular AD security assessments and remediation efforts. Threat Intelligence and Incident Response Monitor and More ❯
InformationSecurity Risk & Compliance Specialist About CyberArk : CyberArk (NASDAQ: CYBR ), is the global leader in Identity Security . Centered on privileged access management, CyberArk provides the most comprehensive security offering for any identity - human or machine - across business applications, distributed workforces, hybrid cloud workloads and throughout the DevOps lifecycle. The world's leading organizations trust CyberArk … the Role: We are seeking a highly motivated and detail-oriented GRC Compliance Expert to join our Governance, Risk, and Compliance team. This role is pivotal in supporting customer security assessments during RFx processes, driving compliance initiatives including DORA , NIS2 , and other regulatory frameworks, and assisting with broader GRC activities across the organization. The ideal candidate is a self … located in our office in London. We ask to come to the office twice per week. Support the sales and legal teams during RFx processes by responding to customer security questionnaires, assessments, and due diligence requests. Coordinate and manage responses to customer security audits and assurance inquiries. Monitor regulatory changes and contribute to compliance initiatives such as DORA More ❯
is developing a network of connected organisations, all working together to defend against cybersecurity attacks in the supply chain. Organisations rely on us to establish trust, through sharing their security maturity and visualising the risks posed by their supply chain ecosystem. And we're already trusted by customers like ASOS, Snyk, BAE Systems and the NHS. We are putting … we're humble and honest. At Risk Ledger, we aim high to find the best solutions we can and always put our users first. This role: The Head of InformationSecurity has a bucket load of responsibility to protect the business, inform key risk-based decisions, and operate confidently and expertly with the clear understanding that their actions … underpin every operational function and, ultimately, the organisation's commercial success. Security is at the heart of what we do, so every member of our team is passionate about making life as difficult as possible for attackers across the globe, and that extends to our own internal systems and work environment. You will be leading the way, evolving and More ❯
is developing a network of connected organisations, all working together to defend against cybersecurity attacks in the supply chain. Organisations rely on us to establish trust, through sharing their security maturity and visualising the risks posed by their supply chain ecosystem. And we're already trusted by customers like ASOS, Snyk, BAE Systems and the NHS. We are putting … we're humble and honest. At Risk Ledger, we aim high to find the best solutions we can and always put our users first. This role: The Head of InformationSecurity has a bucket load of responsibility to protect the business, inform key risk-based decisions, and operate confidently and expertly with the clear understanding that their actions … underpin every operational function and, ultimately, the organisation's commercial success. Security is at the heart of what we do, so every member of our team is passionate about making life as difficult as possible for attackers across the globe, and that extends to our own internal systems and work environment. You will be leading the way, evolving and More ❯
Security Control Tester/Security Control Assessor Our client is a global information services company and is seeking 3 seasoned security experts to lead the assessment and evaluation of security controls across systems and processes. As a Lead Security Control Assessor, you will oversee and conduct security control testing, verifying the design, implementation … and operational effectiveness of controls in both on-premise and cloud environments. Your expertise will be instrumental in driving quality security assessments through thorough testing, automation, and collaboration with cross-functional teams and stakeholders. These roles can be based remotely within the UK and will be for an initial 8 month contract. The contract will require to be via … umbrella company and have a banding of £398-£486 depending on experience. Required Skills Experience with conducting security control testing in cloud environments such as AWS and Azure Experience performing IT Audit or InformationSecurity control assessments, with specific experience in testing cloud security controls Professional certification such as CISA, CISM, CISSP, ISO 27001 Lead Auditor More ❯
Job description Head of HR Information Systems Location: London office, with a minimum of 2 days per week in the office Salary: £80,000 per annum, although this can be subject to negotiation for exceptional candidates. About the role The National Audit Office (NAO) is seeking a dynamic and visionary Head of HR Information Systems to lead our … and deadlines and keeping these on track. • Lead on release management of new software, both internal improvements and central XCD updates. • Manage the relationship between HR, Digital Services and InfoSec, keeping HR priorities on track and updating HR SLT of any potential risks to delivery. • Build and manage relationships with external HRIS partners and vendors. • Support the People team functions … lead a framework for HR data governance. • Drive the improvement of data quality across the People functions. • Develop and maintain People dashboards and implement key-performance metrics. • Working with InformationSecurity and Digital Services teams, ensure all systems, data, processes and functions are compliant with relevant policies and legislation. • Lead, coach and mentor junior staff Skills required Skills More ❯
Advert closes: Tuesday 11th February Are you passionate about cyber security and eager to make a significant impact ? The Crown Estate is on a mission to create lasting and shared prosperity for the nation. We are seeking a Cyber Security Solution Architect to join our dynamic team and help us harness the power of digital and data technologies. … Purpose of Role: At The Crown Estate, we are committed to business reinvention with digital transformation at its core. Under the leadership of the CISO, our Digital Security team ensures resilience against cyber-attacks, data breaches, and other informationsecurity risks. We aim to: Enable the successful adoption of digital technologies and unlock associated business benefits. Fulfil … our legal and moral duty to protect the information of the public, our customers, and our staff. Enhance our reputation as a trusted brand, responsibly generating value and financial returns for the country. As a Cyber Security Solution Architect, you will: Provide expert advice on security architectural principles and enterprise-wide security solutions. Assist projects in More ❯
Job Title : Security and Compliance Manager Salary: £70,000-£100,000 + Benefits Location : UK - Remote Industry : AI + Consultancy This role offers an unparalleled chance to lead and shape the strategic direction of informationsecurity, quality management, AI governance, and data privacy. The successful candidate will be at the forefront of ensuring the organisation's adherence … to the highest standards, driving both internal and external trust. Key Responsibilities: - Strategic Leadership: Develop, implement, and continuously refine strategies for informationsecurity (ISO 27001), quality management (ISO 9001), AI governance (informed by ISO 42001 principles), and data privacy (e.g., GDPR, DPA), ensuring these align seamlessly with business objectives. - ISO &Compliance Framework Management: Lead the design, implementation, maintenance … and auditing of an integrated management system. Serve as the primary contact for certification bodies and spearhead all audit activities. - InformationSecurity Officer (ISO Role): Oversee the organisation's security posture, policies, risk management, and incident response, providing technically credible input . - AI Governance Lead: Manage the implementation and operation of AI governance, ensuring responsible AI practices. More ❯
Job Title : Security and Compliance Manager Salary: £70,000-£100,000 + Benefits Location : UK - Remote Industry : AI + Consultancy This role offers an unparalleled chance to lead and shape the strategic direction of informationsecurity, quality management, AI governance, and data privacy. The successful candidate will be at the forefront of ensuring the organisation's adherence … to the highest standards, driving both internal and external trust. Key Responsibilities: - Strategic Leadership: Develop, implement, and continuously refine strategies for informationsecurity (ISO 27001), quality management (ISO 9001), AI governance (informed by ISO 42001 principles), and data privacy (e.g., GDPR, DPA), ensuring these align seamlessly with business objectives. - ISO &Compliance Framework Management: Lead the design, implementation, maintenance … and auditing of an integrated management system. Serve as the primary contact for certification bodies and spearhead all audit activities. - InformationSecurity Officer (ISO Role): Oversee the organisation's security posture, policies, risk management, and incident response, providing technically credible input . - AI Governance Lead: Manage the implementation and operation of AI governance, ensuring responsible AI practices. More ❯
Job Title : Security and Compliance Manager Salary: £70,000-£100,000 + Benefits Location : UK - Remote Industry : AI + Consultancy This role offers an unparalleled chance to lead and shape the strategic direction of informationsecurity, quality management, AI governance, and data privacy. The successful candidate will be at the forefront of ensuring the organisation's adherence … to the highest standards, driving both internal and external trust. Key Responsibilities: - Strategic Leadership: Develop, implement, and continuously refine strategies for informationsecurity (ISO 27001), quality management (ISO 9001), AI governance (informed by ISO 42001 principles), and data privacy (e.g., GDPR, DPA), ensuring these align seamlessly with business objectives. - ISO &Compliance Framework Management: Lead the design, implementation, maintenance … and auditing of an integrated management system. Serve as the primary contact for certification bodies and spearhead all audit activities. - InformationSecurity Officer (ISO Role): Oversee the organisation's security posture, policies, risk management, and incident response, providing technically credible input . - AI Governance Lead: Manage the implementation and operation of AI governance, ensuring responsible AI practices. More ❯
MBR partners are working with a UK-based Telecommunication client that offers digital identity solutions, enabling enterprises such as banks to verify Mobile Service Provider information via an API. This helps build fraud scores for transactions, such as understanding a subscriber's location when a transaction occurs (e.g., roaming), or detecting SIM-swaps and potential coercion during active calls. … channel partners, with banks as end customers. The role is within the Fraud Prevention Services Business Unit of a global solutions provider generating USD 150 million in revenue. The Security Solution Architect works in the cybersecurity consultancy, risk, and advisory unit, part of the Global Solutions team. Responsibilities include providing cybersecurity, risk, and compliance assessments, reports, recommendations, and consultative … support to clients, collaborating with internal teams to help protect digital assets, information, and systems from cyber threats. A key aspect involves designing and customizing these services for inclusion in client product portfolios, ideally suited for someone with presales experience or a technical solutions architect background capable of gap analysis of threat levels. Responsibilities Key responsibilities include: Designing securityMore ❯