in London, offering ahybrid work model. However, for candidates located outside of London, there ispotential for a fully remote arrangement. How you will create impact: Plan audits by analyzing InformationSecurity Standards, such as ISO 27001:2022, and define audit scopes within your area of expertise. Create and maintain structured audit catalogues tailored to the identified scope. Draft … audit plan, covering both internal processes and assets as well as audits of external service providers. Assess a broad range of audit topics, including IT systems, infrastructure and processes, informationsecurity management, and on-premise or virtual audits of physical security. Document findings clearly and thoroughly to enable process and asset owners to identify and develop mitigation measures … classification and documentation of audit findings and collaborate with IT compliance and risk stakeholders. Report audit results to the CTO. Involved in certification audits. Support client assessments by providing information or take part in client meetings. Your profile: You hold a university degree or equivalent in informatics, business informatics, IT security, or a similar field. Fluent English and More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Informationsecurity is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering … support of the Board. Led by our new CISO, the in-house InformationSecurity team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to … you will do The Identity and Access Senior Architect will be part of the Digital Trust team, and will be responsible for maintaining the identity and access management (IAM) security of the firms assets. This role is critical in translating the organisations IAM vision into a workable, mature and optimized function and service. This role requires extensive experience across More ❯
be cyber resilient, supporting Transformation Directorate's purpose of delivering the best care and outcomes for the NHS. The Cyber Operations sub-directorate consists of 4 operational areas: Cyber Security Operations Unit (CSOU) - SIO Cyber Delivery Unit (CDU). Cyber Improvement Programme. Chief InformationSecurity Office Function (CISO) The CISO Function consists of four teams, these are … CISO Portfolio Office, Secure (by Design), Security Assurance, and Security Governance, Risk & Compliance (GRC). The post of Cyber Security Lead - Security Assurance has been awarded a Recruitment and Retention Premia (RRP) in response to current labour market conditions. In recognition of this, the role attracts an additional monthly RRP payment equal to 30% per annum. … Please be aware that RRP is non-contractual and subject to review. Main duties of the job This role is part of the Security Assurance team, which acts as a second line of defence and provides evidence-based confidence in the effectiveness of NHS England's cyber security controls, processes, and systems. It supports informed assurance by: Evaluating More ❯
Trust and Banking (Japan's leading trust bank), Mitsubishi UFJ Securities Holdings (one of Japan's largest securities firms), and MUFG Americas Holdings. Please visit our website for more information - Technology is responsible for the operation, development and support of all technology across all areas of the local and international business. We ensure the IT strategy, architecture solutions, and … annual investment portfolio as well as procurement and software licence management. IT Risk and Control - which is responsible for implementing and managing all technology related controls over IT and information risk and business continuity, supports the provision of disaster recovery solutions, performs risk assessments, and manages business recovery plans and the business recovery facility. InformationSecurity is … also the responsibility of this function. Main Purpose of the Role: To ensure effective management and control of informationsecurity, IT and information risk for MUSI by ensuring all appropriate Security, IT and common-sense controls are in place, that these controls are being followed and that this is evidenced across the whole business and IT More ❯
Job Summary: The Security Operations Lead is responsible for our security monitoring and incident response capabilities within the Square Enix Cyber Security team (covering Europe and North America). The primary goals of the role are the timely detection of security incidents, effective response and the continuous improvement of our preventative and detective controls. This role … will work alongside our team of security analysts and engineers to collectively protect our players, people and assets whilst enabling creativity and innovation across Square Enix. Day to day you will be performing in-depth analysis and investigation of security alerts, game/brand related security events as well as leading the response to incidents. You will … be responsible for maintaining and optimising our security operations tools and processes. Additionally you will be testing the effectiveness of our preventative and detective controls, probing weaknesses and implementing improvements alongside our risk and engineering teams. The role is aimed at candidates with a broad and senior Cyber Security skillset who are seeking to further develop their Cyber More ❯
the GRC function of a global financial group at a pivotal time, supporting the secure rollout of U.S. banking operations, driving ISO27001 and SOC2 maturity, and mentoring an evolving InfoSec team. This is a hands-on manager-level role with real scope: oversight of policy, third-party risk, architectural reviews, and cloud compliance. You'll work closely with the Head … of InfoSec to maintain audit readiness, improve security posture, and influence business-wide awareness and accountability. What you’ll bring: 5+ years in InfoSec, IT Security or Ops within a regulated environment Certification required: CISSP, CISM, CRISC, or equivalent Strong knowledge of ISO27001:2022, SOC2 Type II, NIST CSF, PCI DSS, GDPR, DORA Confident with security risk … Responsibility Model Comfort with complexity: able to analyze architecture, track metrics, and translate acronyms into actionable plans Mentorship ability: ready to step up, guide analysts, and model high-integrity InfoSec practice What you’ll be doing: GRC ownership: maintain ISO27001 and SOC2 certifications, policies, and the InformationSecurity Management System Third-party risk management: oversee supplier assessments, support More ❯
the GRC function of a global financial group at a pivotal time, supporting the secure rollout of U.S. banking operations, driving ISO27001 and SOC2 maturity, and mentoring an evolving InfoSec team. This is a hands-on manager-level role with real scope: oversight of policy, third-party risk, architectural reviews, and cloud compliance. You'll work closely with the Head … of InfoSec to maintain audit readiness, improve security posture, and influence business-wide awareness and accountability. What you’ll bring: 5+ years in InfoSec, IT Security or Ops within a regulated environment Certification required: CISSP, CISM, CRISC, or equivalent Strong knowledge of ISO27001:2022, SOC2 Type II, NIST CSF, PCI DSS, GDPR, DORA Confident with security risk … Responsibility Model Comfort with complexity: able to analyze architecture, track metrics, and translate acronyms into actionable plans Mentorship ability: ready to step up, guide analysts, and model high-integrity InfoSec practice What you’ll be doing: GRC ownership: maintain ISO27001 and SOC2 certifications, policies, and the InformationSecurity Management System Third-party risk management: oversee supplier assessments, support More ❯
Manager - Principal Security Architect: Secure Design (IC) page is loaded Manager - Principal Security Architect: Secure Design (IC) Apply locations London, United Kingdom time type Full time posted on Posted Yesterday job requisition id R Security Architecture - Secure Design Team Role: Manager - Principal Security Architect: Secure Design (Individual Contributor) Grade: GG14 The Security Architecture Design team … is responsible for developing Security Architecture patterns, developing security controls needed for new technology, promoting the use of the architectural patterns into development projects, leading the Security Architecture Design Forum, Evaluating architectural security risks in existing systems, consulting with system development teams and architects on building security into their design. This key task of this … delivery of secure design artefacts and leading secure design interventions - by adding capacity and capability to the team. Reports to: Senior Manager - Secure Design Key Relationships Business Aligned Principal Security Architects CyberSecurity Engineering CyberSecurity Testing and Vulnerability Management Cloud Security Identity Management Security Architecture Design Forum (member) Project teams BISOs Key Responsibilities Develop Security Architecture Design More ❯
Frankfurt am Main, Hesse, Germany; London, England, United Kingdom This is a hybrid role and can be based in London or Frankfurt. The Role As a Senior IT Security Analyst at euNetworks, you will play a key role in protecting the organisation against informationsecurity threats by implementing and maintaining both technical and organisational safeguards. Working closely … with the InformationSecurity Steering Team and as part of the broader IT function, you will be instrumental indriving forward our security posture. What will you be doing? Administer and maintain the SecurityInformation and Event Management (SIEM) system and other IT security platforms. Review and evaluate security aspects of IT projects, identifying … risks and ensuring appropriate controls are implemented. Investigate and respond to security incidents and queries, coordinating with relevant teams. Continuously monitor IT infrastructure for vulnerabilities, anomalies, and other potential security issues. Plan and coordinate external penetration tests to identify and address security weaknesses. Compile and deliver regular reports (monthly and quarterly) on the organisation's securityMore ❯
InformationSecurity Specialist We are seeking a permanent InformationSecurity Specialist to join our prestigious Global Investment Bank client's team. This role involves a wide range of responsibilities including security operations, threat intelligence, incident response, and compliance tasks. The ideal candidate will have experience in IT infrastructure security, particularly within financial institutions, and … a strong understanding of various security platforms and standards. Required Skills & Qualifications: Experience in IT infrastructure security, preferably within financial institutions. Strong knowledge of endpoint protection, anti-virus, anti-malware, anti-ransomware, and encryption technologies. Proven experience in securing, auditing infrastructure components and configurations on virtualization platforms, Windows, and Linux. Working experience with network infrastructure components such as … IPS, SIEM, WAFS, load balancers, proxies, and firewall management systems. Burpsuite and DevSecOps Solid understanding of incident management and forensics for security-related issues. Excellent documentation and communication skills, with the ability to communicate effectively with technical colleagues. Qualifications and Training (Good to Have): CISSP or other relevant certifications (e.g., Network+, Security+, MCSP, CNA). Day-to-day of More ❯
InformationSecurity Officer Hybrid – Home & London | Permanent | £68,000 | 35 hrs/week (flexible) A rare and brilliant opportunity to join this international development children’s charity, as their new InformationSecurity Officer . You'll be the expert, working closely with the Chief Information Officer and other senior leaders to embed security practices … team where the culture is collaborative and down-to-earth. You’ll have the autonomy to get stuck in, alongside the backing to develop professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As InformationSecurity Officer , you’ll lead the implementation of the organisation’s cyber security plans. … Act as subject matter expert on informationsecurity across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and outsourced ICT services. Manage incident response planning, investigations, and reporting. Deliver engaging training to build a strong security culture. Collaborate with Legal and Data Protection teams to ensure More ❯
InformationSecurity Officer Hybrid – Home & London | Permanent | £68,000 | 35 hrs/week (flexible) A rare and brilliant opportunity to join this international development children’s charity, as their new InformationSecurity Officer . You'll be the expert, working closely with the Chief Information Officer and other senior leaders to embed security practices … team where the culture is collaborative and down-to-earth. You’ll have the autonomy to get stuck in, alongside the backing to develop professionally, whether that’s through security qualifications or broader leadership skills. What you will be doing As InformationSecurity Officer , you’ll lead the implementation of the organisation’s cyber security plans. … Act as subject matter expert on informationsecurity across the organisation Ensure compliance with standards like Cyber Essentials Plus and CIS . Oversee third-party security providers and outsourced ICT services. Manage incident response planning, investigations, and reporting. Deliver engaging training to build a strong security culture. Collaborate with Legal and Data Protection teams to ensure More ❯
Senior InformationSecurity Manager page is loaded Senior InformationSecurity Manager Apply locations Great Britain - London time type Full time posted on Posted Yesterday job requisition id R5807 Job Description: Senior InformationSecurity Manager Position Overview: We are seeking aSenior Cyber Security Posture and Exposure Managerto lead and enhance our organization's security posture and manage cyber exposure risks. This role will oversee a small team of highly skilled Security Engineers and will be responsible for developing, implementing, and maintaining strategies to identify, assess, and mitigate security vulnerabilities across the enterprise. The ideal candidate will have a strong technical background, leadership experience, and a proactive approach to managing cyber risks … in a dynamic technology environment. What You'll Do: Leadership and Team Management: Lead, mentor, and manage a team of Security Engineers, fostering a culture of collaboration, innovation, and continuous improvement. Define team goals, assign responsibilities, and ensure the successful execution of security initiatives. Conduct regular performance reviews and provide professional development opportunities for team members. Ability to More ❯
Economist Education, which uphold our global reputation for excellence and integrity. The Economist Group is the leading source of analysis on international business and world affairs. We deliver our information through a range of formats, from newspapers and magazines to conferences and electronic services. The InformationSecurity team operates the InformationSecurity Program and is … responsible for the standard of informationsecurity across the Group. We define and implement our security strategy and mitigation activities across our brands. We work with business units to ensure that the confidentiality, integrity and availability risks that they are exposed to are clearly understood and appropriately managed. The Cyber Security Analyst is a member of … the InformationSecurity team and helps us maintain the security of our cloud infrastructure. As an Analyst, you will be responsible for monitoring, analysing, and identifying potential security threats to our cloud-based systems. You will work closely with other IT teams to ensure the confidentiality, integrity, and availability of our cloud-based data. Monitor and More ❯
Technology Graduate Trainee, InformationSecurity London, GB Full-Time Technology Marex Overview Marex Group plc (NASDAQ: MRX) is a diversified global financial services platform providing essential liquidity, market access and infrastructure services to clients across energy, commodities and financial markets. The group provides comprehensive breadth and depth of coverage across four core services: clearing, agency and execution, market … traders, banks, hedge funds and asset managers. With more than 40 offices worldwide, the group has over 2,400 employees across Europe, Asia-Pacific and the Americas. For more information visit . Marex Graduate Programme Embark on a transformative journey with Marex's Full-Time Graduate Programme - an experience tailored to empower and support Analysts. Dive into the 'Backpack … bonds with those sharing your journey. Join Marex, where your passions align with purpose, and your strengths converge with our values. Department Description Marex Technology delivers efficiency, scalability and security for the business. The Marex Technology Department provides digital tools, software services and infrastructure globally to all business groups. Software development and support teams work in agile 'streams' aligned More ❯
s most loved retirement expert. About the role As the IT Senior Risk Manager you will support the Director of Enterprise Risk, the Chief Risk Officer, the Chief Digital Information Officer, and other Executives and senior management in developing and maintaining an appropriate and resilient technology and data risk management framework. You will also provide independent and proactive advice … advice to key stakeholders, including the Executive and senior management and across 1st and 2nd Line colleagues, on the steps that should be taken to maintain technology, data and informationsecurity risks managed at a level that is consistent with the Group's risk appetite and in line with legal and regulatory requirements. You will support the delivery … of the Group's Internal Model for Operational Risk through the development and maintenance of technology, data, and informationsecurity risk scenarios with risk owners and other key stakeholders. You will be responsible for establishing an environment of trust and open communication which will establish a cohesive spirit across 1st and 2nd Line colleagues. You will oversee the More ❯
Information … Security Director Application Deadline: 12 August 2025 Department: IT Infrastructure and Operations Employment Type: Fixed Term Contract Location: London Compensation: £90,000 - £110,000/year Description Interim Infosec Director Location: London/Hybrid Working (Expectation that you will attend an office 2 days per week) Contract: 6 Month Secondment/Interim Hours: Full time 37.5 hours per week … to suit your lifestyle - from discounts on retail and dining, to health and wellbeing, travel, and technology and plenty more The Role Join us as our Interim Director of InformationSecurity and play a critical role in strengthening the Bank's cyber resilience. We're looking for a dynamic and experienced security leader to join our IT More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
firms ability to keep our clients data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the worlds large and prestigious organisations. Informationsecurity is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering … support of the Board. Led by our new CISO, the in-house InformationSecurity team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to … have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firms platforms, including M365, legal and More ❯
ability to keep our clients' data secure is a bedrock for our reputation as a trustworthy professional services partner to many of the world's large and prestigious organisations. Informationsecurity is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering … support of the Board. Led by our new CISO, the in-house InformationSecurity team is a core part of our technology services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to … have experience advising clients on hundreds of incidents. Leveraging this experience, they feedback practical lessons learned into clients' cyber risk management and incident response programmes. What you will do Security Architecture Strategy & Governance Orchestrate the Security Architecture team in the development and maintenance of a comprehensive security architecture strategy across the firm's platforms, including M365, legal More ❯
Job summary The Security Lead (Consulting) is focussed on ensuring that the NHS's systems operate from a cyber resilient architecture, looking at people, processes and technology. The role is part of a small team that supports all functions (Protective Monitoring, Threat Operations, Incident Management and Engineering) within the Cyber Security Operations Centre (CSOC) with the delivery of … be cyber resilient, supporting Transformation Directorate's purpose of delivering the best care and outcomes for the NHS. The Cyber Operations sub-directorate consists of 4 operational areas: Cyber Security Operations Unit (CSOU) - SIO Cyber Delivery Unit (CDU). Cyber Improvement Programme. Chief InformationSecurity Office Function (CISO) The post of Security Lead has been awarded … an additional monthly RRP payment equal to 30% per annum.'Please be aware that RRP is non contractual and subject to review. Main duties of the job As a Security Lead (Consulting) you will: Support cross-team initiatives and interactions between teams including Engineering, Protective Monitoring, Threat Operations and Incident Management teams within the CSOC. Providing specialist knowledge and More ❯
cloud consultancy with offices in the UK, Netherlands and Romania. This role is working for tmc3 who is part of the Qodea group of companies. tmc3 is a cyber security consultancy that helps organisations of all sizes protect, comply and thrive in the digital era. Our leadership team founded tmc3 with a shared goal of making data protection and … cyber security a business enabler. We strive for passion, collaboration, and perseverance to ensure the best outcomes for our customers and partners every time. We are looking for a Principal Cyber Security Consultant to play a key role to our success within the Critical National Infrastructure (CNI) sector, focusing on the successful delivery of projects and identifying opportunities … unable to obtain SC level clearance. How You'll Shape Our Success We are looking for a leader with enviable consulting experience helping public sector organisations with complex cyber security challenges. As a Principal Consultant, you will be a key member of the tmc3 team, developing new business and strong customer relationships while leading and delivering great work. With More ❯
Ready to Make an Impact in Cybersecurity? InformationSecurity Analyst - 6-Month FTC Global Law Firm London/Hybrid Our client, a leading global law firm , is looking for an experienced InformationSecurity Analyst to join their London team on a 6-month fixed-term contract . This is a fantastic opportunity to work in a … high-impact role where informationsecurity is at the heart of global legal operations. Salary: Up to £70,000 per annum (pro rata) Hybrid Working: 3 days in the office, 2 days from home The Role: Support the delivery of robust informationsecurity and privacy practices across global operations. Conduct security risk assessments, support incident More ❯
Maintain and collaborate with partners - including Infrastructure & Cloud, D&A Tech Services teams, product teams, customer facing teams and external auditors Essential Criteria: Industry qualification relating to audit/informationsecurity or business subject areas. Demonstrated ability during a minimum of at least five years experience in an informationsecurity or compliance-related role ! Experience working … with customers on sophisticated queries! Experience of leading audits with an external assessor, preferably "Big 4"or financial institution. Understanding of risk management and effective InformationSecurity strategy, practices, technologies and controls frameworks. Solid understanding of assurance standards such as SSAE 16/SSAE 18/ISAE3402/ISAE3000, Trust Service Principles. Critical thinking and detailed analyses to … are achieved. Strong verbal & written communication skills. Ability to work proactively, using your own initiative and to be adaptable. Desirable Criteria A Bachelor's degree or equivalent experience in InformationSecurity, Computer Science, or a related field. A Bachelor's degree or equivalent experience in a Business related subject area. Previously worked within LSEG. Demonstrable record of people More ❯
Lead Security Architect at N Consulting Ltd Role :Lead Security Architect Work Mode: Hybrid Work Location : London Job Description: We are seeking a highly skilled and experienced Lead Security Architect to join our team for the Protocol Analysis & Remediation project. The successful candidate will be responsible for designing and implementing security architectures related to lateral movement … regards to lateral movement and areas where risks can be reduced. The output of this phase is to provide recommendations and design objectives to reduce risk and improve the security posture of the Trust as it relates to lateral movement, with an emphasis on working towards a zero-trust framework. These findings and recommendations will be presented to the … Cyber Security Architecture and Engineering team and Security Authority for sign-off as required. Once sign-off has been achieved, you will work with a team of Linux and Windows SMEs to provide leadership in implementing the architecture(s) and configuration(s) that the discovery phase recommended. Key Responsibilities: Develop and implement security architecture strategies to mitigate More ❯
An impressive multinational Telecoms business is looking for an accomplished Senior InformationSecurity Engineer to join its team based in London. Please note, this role is hybrid so you will be required to work in the office 3 days per week. In this role of significant responsibility, you will operate at the cutting edge of technology, protecting the … business from cyber threats. You will design, implement, and maintain security solutions that protect networks, systems, and data. You will identify vulnerabilities, harden systems, respond to threats, and ensure compliance with security best practices and industry standards, including ISO27001. In order to be suitable for this role you must have demonstrable hands-on expertise with monitoring and securing … enterprise class technology estates. You will have proven experience with Cyber Security best practice including the NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK Telecom Security Act would be advantageous to your application, as would CISSP and/or CISM More ❯