writing, and presenting) at all levels, from staff members to senior management level. You have a natural affinity with the technical domains. You are familiar with a range of InformationSecurity technologies, infrastructure, processes and services in domains especially Identity & Access Management. Knowledge of CyberArk technologies is a plus. Rates depend on experience and client requirements Job InformationMore ❯
project basis whilst being supported by our dedicated Agile Talent team. Joining us in Cyber Advisory Grant Thornton’s Cyber Advisory team provides a comprehensive range of services across informationsecurity, resilience, and payments. We provide advisory and assurance support to help organisations identify cyber risks and implement effective solutions. Our team comprises seasoned professionals with extensive industry … teams on short to medium-term assignments. Skills we are looking for Proficiency in StrongDM with experience in developing and implementing identity and access management solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your development is important to us and as part of More ❯
project basis whilst being supported by our dedicated Agile Talent team. Joining us in Cyber Advisory Grant Thornton’s Cyber Advisory team provides a comprehensive range of services across informationsecurity, resilience, and payments. We provide advisory and assurance support to help organisations identify cyber risks and implement effective solutions. Our team comprises seasoned professionals with extensive industry … teams on short to medium-term assignments. Skills we are looking for Proficiency in BeyondTrust with experience in developing and implementing identity and access management solutions. Experience in Cyber security technologies. Strong problem-solving and analytical skills. Experience in Financial services sector What’s in it for you Development: Your development is important to us and as part of More ❯
include: Taking project briefs from the product owner and translating this into clean, well documented and elegant code Ensure quality in service provision in line with ISO 9001 Ensure informationsecurity in line with ISO27001 and Cyber Essentials Plus Development and maintenance of AI system focused on intelligence analysis and processing Development and maintenance of the data repositories … in Python Experience with AWS and NoSQL platforms Experience with AI/Machine Learning Desirable experience, with Angular and Flutter Eligible to work in the UK and obtain UK Security Clearance (as a minimum) If you're a Senior Software Developer with good problem solving and creativity skills, please apply today and one of our Consultant's will be More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
FryerMiles Recruitment
include: Taking project briefs from the product owner and translating this into clean, well documented and elegant code Ensure quality in service provision in line with ISO 9001 Ensure informationsecurity in line with ISO27001 and Cyber Essentials Plus Development and maintenance of AI system focused on intelligence analysis and processing Development and maintenance of the data repositories … in Python Experience with AWS and NoSQL platforms Experience with AI/Machine Learning Desirable experience, with Angular and Flutter Eligible to work in the UK and obtain UK Security Clearance (as a minimum) If you’re a Senior Software Developer with good problem solving and creativity skills, please apply today and one of our Consultant’s will be More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Larbey Evans
Monday-Friday) Hybrid working (3 days office/2 days remote) You will focus on the operational support and continuous improvement of enterprise application environments, ensuring high availability, security, and performance. Key responsibilities include day-to-day maintenance, patching, monitoring, and user support across critical systems, while also contributing to process improvement, documentation, and integration stability. IT Applications Analyst … SLAs Provide break/fix troubleshooting and root cause analysis across supported systems Collaborate with infrastructure teams to support system scalability and optimization Facilitate alignment between delivery teams and InformationSecurity, Infrastructure Partner with stakeholders to define and monitor adoption success criteria for newly implemented applications IT Applications Analyst Skills & Requirements: 3+ years’ experience in enterprise application support … or IT operations within a law firm Bachelor’s degree in Information Systems, Computer Science, or related field (or equivalent experience) Experience with ITSM platforms (e.g., ServiceNow) and monitoring tools Understanding of access management, patch management, and vulnerability remediation processes Familiarity with ITIL practices (Incident, Problem, Change, and Configuration Management) Exposure to application performance tuning, cloud platforms, or scripting More ❯
and Tablets. (Fully equipped workshop van provided) Providing excellent customer service Carrying out fault finding Quality Control checking using Samsung and Apple's enhanced software Respecting the value of information by following Likewize's data protection/informationsecurity policies and procedures Role Requirements: Live in the area we are recruiting for as this will be your More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Incite Insight
Summary This role focuses on administering and managing asset and configuration management systems. The applicant will benefit from previous knowledge of IT asset and software management, maintaining accurate detailed information, and being able to confidently liaise with both internal stakeholders and external suppliers. You will · Demonstrate management in own area of responsibility whilst being aware of the role in … required outcomes. · Establish and maintain contact with people within the organisation and external suppliers · Proactively report on EOS, EOL software and hardware to respective IT Teams · Proactively report to InformationSecurity on unauthorised software/hardware Service Transition Planning & Support: Administer the following Service Transition practices and adhering to Service Transition policies & processes: IT Asset Management & Service Configuration … ensuring accurate tracking, ownership, utilisation, retirement of assets, and verifying that all assets are in a known state and location o Contributing to the knowledge database to ensure effective information sharing o There are over 150 supported software products within the Service Catalog · Using ITSM tools for license management: o Manage, maintain, and assign licenses as required o Identifying More ❯
to extend. Location: Hybrid working - London About the role: You will be responsible for analysing, delivering and supporting the improvement of operational process and policies for a Cyber and InformationSecurity function. The ideal candidate will hold Active SC clearance and have a strong background in Cyber Policy support, with the following skills and experience: Experience in writing More ❯
ensure our business commitments are delivered with quality and to expectation. · Assessing new technology solutions · Ensuring our non-functional requirements are met regarding performance, scalability, resilience, and GRC requirements (Informationsecurity, risk, industry regulation compliance) · Helping to encourage collaboration and product ownership across developers and testers · Ensuring continual shift of secure, quality and tested code activity left · Working More ❯
Passion about the use of AI in B2B contexts and eagerness to develop expert-level industry knowledge. Understanding the compliance context of delivering technology in highly regulated industries (e.g., informationsecurity, data privacy). A creative mindset – we look for someone who thrives on innovation. Desirable Attributes: Familiarity with the pharmaceutical sector/medical affairs . What we More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Exposed Solutions
Australia, they are an IT company operating in 19 countries and listed on Nasdaq Stockholm. They are ISO 9001 and ISO 27001 certified, reflecting their commitment to quality and information security. Salary: £35,000£38,000 (dependent on experience) Bonus: Discretionary, based on company performance Benefits: Private healthcare, life assurance, pension, access to employee discounts, and 25 days annual More ❯
SW15, Wandsworth, Greater London, United Kingdom Hybrid / WFH Options
Exposed Solutions
Australia, they are an IT company operating in 19 countries and listed on Nasdaq Stockholm. They are ISO 9001 and ISO 27001 certified, reflecting their commitment to quality and information security. Salary: £35,000–£38,000 (dependent on experience) Bonus: Discretionary, based on company performance Benefits: Private healthcare, life assurance, pension, access to employee discounts, and 25 days’ annual More ❯
Training Specialist - Government - DV Clearance - London - Hybrid I have an immediate opportunity for a skilled Training Specialist to support a high-priority government programme focused on Information Security. This is part of a major InformationSecurity Transformation programme and we are looking for someone with a strong background in government or secure environments to make an immediate More ❯
services which can be addressed before they become user impacting. Challenging and supporting the engineering team with design and implementation, you are their technical mentor. Work closely with our informationsecurity team to ensure new services do not create additional risk and addressing any identified risks. Key Skills & Experience Experienced lead engineer/(hands on) architect with experience More ❯
they maximises the use of existing or new system platforms. The role manages external systems supplier contracts, seeks opportunities to optimise system functionality, oversees systems integration activity, ensures the security, stability, governance and compliance of our business systems. The role develops and integrates technology across the organisation.The role works closely with external Business Systems Providers and internal Technology team … to analyse, interpret, and communicate system requirements, ensuring effective liaison with third-party technology providers to support solution design, implementation, and troubleshooting. Apply critical thinking and working knowledge of informationsecurity principles to assess and challenge technical decisions made by both internal team members and external vendors, ensuring that system integrations and data handling meet their securityMore ❯
they maximises the use of existing or new system platforms. The role manages external systems supplier contracts, seeks opportunities to optimise system functionality, oversees systems integration activity, ensures the security, stability, governance and compliance of our business systems. The role develops and integrates technology across the organisation. The role works closely with external Business Systems Providers and internal Technology … to analyse, interpret, and communicate system requirements, ensuring effective liaison with third-party technology providers to support solution design, implementation, and troubleshooting. Apply critical thinking and working knowledge of informationsecurity principles to assess and challenge technical decisions made by both internal team members and external vendors, ensuring that system integrations and data handling meet their securityMore ❯
land and expand within existing marquee clients. Partner with Product and Customer Success to shape use-cases and accelerate adoption. Lead RFPs/RFIs with crisp value narratives; handle InfoSec/procurement confidently. Forecast accurately, report on KPIs, and refine territory plans to hit and exceed targets. Represent the brand at client meetings, conferences and industry events. You’ll bring More ❯
land and expand within existing marquee clients. Partner with Product and Customer Success to shape use-cases and accelerate adoption. Lead RFPs/RFIs with crisp value narratives; handle InfoSec/procurement confidently. Forecast accurately, report on KPIs, and refine territory plans to hit and exceed targets. Represent the brand at client meetings, conferences and industry events. You’ll bring More ❯
land and expand within existing marquee clients. Partner with Product and Customer Success to shape use-cases and accelerate adoption. Lead RFPs/RFIs with crisp value narratives; handle InfoSec/procurement confidently. Forecast accurately, report on KPIs, and refine territory plans to hit and exceed targets. Represent the brand at client meetings, conferences and industry events. You’ll bring More ❯
london (city of london), south east england, united kingdom
Harrington Starr
land and expand within existing marquee clients. Partner with Product and Customer Success to shape use-cases and accelerate adoption. Lead RFPs/RFIs with crisp value narratives; handle InfoSec/procurement confidently. Forecast accurately, report on KPIs, and refine territory plans to hit and exceed targets. Represent the brand at client meetings, conferences and industry events. You’ll bring More ❯
achieve enduring results. We are over 4,000 strategists, innovators, designers, consultants, digital experts, scientists, engineers, and technologists. And we have deep expertise in consumer and manufacturing, defence and security, energy and utilities, financial services, government and public services, health and life sciences, and transport. Our teams operate globally from offices across the UK, Ireland, US, Nordics, and Netherlands. … a culture of learning and growth - you'll have budget to take courses (technical and non-technical training), plus gain certifications What you can expect Defining end-to-end security architecture and delivering solutions for projects or programs, creating Conceptual, Logical, and Implementation Architecture views. Designing secure system architectures using patterns and principles to manage business and security risks. Reviewing and enhancing clients' current security measures by applying innovative security architecture solutions. Work to agile best practices and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Live in-person whiteboarding sessions to problem solve as a More ❯
achieve enduring results. We are over 4,000 strategists, innovators, designers, consultants, digital experts, scientists, engineers, and technologists. And we have deep expertise in consumer and manufacturing, defence and security, energy and utilities, financial services, government and public services, health and life sciences, and transport. Our teams operate globally from offices across the UK, Ireland, US, Nordics, and Netherlands. … a culture of learning and growth - you'll have budget to take courses (technical and non-technical training), plus gain certifications What you can expect Defining end-to-end security architecture and delivering solutions for projects or programs, creating Conceptual, Logical, and Implementation Architecture views. Designing secure system architectures using patterns and principles to manage business and security risks. Reviewing and enhancing clients' current security measures by applying innovative security architecture solutions. Work to agile best practices and cross-functionally with multiple teams and stakeholders. You'll be using your technical skills to problem solve with our clients, as well as working on internal projects Live in-person whiteboarding sessions to problem solve as a More ❯