Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Commify
Experience with implementing tooling and static code analysis to detect and flag vulnerabilities as part of our CI process Experienced using GitHub with a firm understanding of various branching / merging strategies Key Qualifications: Extensive experience in security operations roles, preferably in cloud and on-premise environments Proficiency in security monitoring tools (such as SIEM, IDS / IPS … and incident response processes Strong knowledge of security frameworks, standards, and best practices (e.g., NIST, ISO27001, CIS) Experience with scripting and automation tools for enhancing security processes Excellent communication skills and ability to articulate complex security concepts to various stakeholders Strong analytical and problem-solving skills with a focus on continuous improvement Competitive Salary More ❯
IT, and Fleet. Every person in every team is contributing the lasting impact our Team makes. Help build and keep the nation's critical infrastructure connected and protected 24 / 7. Reporting into the Network Services Business Unit Security Manager, the Senior Information Security officer will ensure security is embedded into all areas of the business and appropriate technical … and compliance technical assessments of all applicable standards, policies, regulation, and legislation compliance Creation of security standards and requirements documents for projects and activities to be based on ISO27001, NIST 800-53 and ISO 22301. Review risks, propose mitigation actions and solutions, and assisting ongoing risk treatment activity. Assist the security testing process More ❯
Nottingham Trent House (95002), United Kingdom, Nottingham, Nottinghamshire Cyber Security Manager - ISO Cyber security is an integral part of our culture, and as an industry leader within financial services, it is vital that we all play our part in keeping customers' data secure. We see security as an enabler and differentiator to enable business innovation and growth, rather … than a step in a compliance process. This role sits in our UK ISO (Information Security Office) team, and will work to embed a positive security culture and to ensure that security risks are properly understood and managed. Working both internally across UK Cyber, and with the wider business, this position will play a key role in solving … within cyber guard rails and building pragmatic security controls into our day to day operational processes. You will also work with technical subject matter experts within our Advisory ISO team to ensure that we communicate technical information in accessible terms for business audiences, including senior management. This is a key part of our drive to communicate a consistent More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
frameworks (e.g., NIST, OWASP, ISO27001). o Lead the strategic integration of security into DevOps pipelines, embedding security controls and automated testing into CI / CD workflows to enable secure-by-design delivery. o Oversee the implementation and optimisation of security tooling, including Static Application Security Testing (SAST), Dynamic Application Security Testing (DAST), Software … Secure Architecture Compliance Rate: Percentage of projects that meet defined secure architecture standards and pass architecture review gates. * DevSecOps Integration Maturity: Measured progress in embedding security controls into CI / CD pipelines, including automated testing, code scanning, and policy enforcement. * Security Testing Coverage: Proportion of applications and systems that undergo static, dynamic, and interactive security testing before release. * Vulnerability More ❯
maximise billable utilisation. Client Delivery and Governance Define and govern delivery standards across client accounts, ensuring alignment with enterprise security policies, regulatory requirements, and industry frameworks (e.g., NIST, ISO27001). Lead the strategic integration of security practices into client delivery, embedding security controls and governance into account management workflows. Oversee the implementation and optimisation of More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Xcede
Leading patch management, endpoint hardening, and vulnerability resolution. Acting as escalation point for incidents from a third-party SOC and coordinating internal response. Supporting Cyber Essentials Plus and ISO27001 compliance activities. Administering operational security tools including Microsoft Sentinel and Defender XDR. Maintaining technical documentation and clear operational procedures. About You Strong hands-on experience with … Excellent coordination skills, especially during incident response. Able to balance operational delivery with strategic infrastructure and security improvements. Contract Details Duration: Initial 6 months (potential extension) Rate: Circa £475 / day (Inside IR35) Location: Hybrid Nottingham (onsite presence required each week) If youre ready to step into a pivotal role shaping infrastructure and security operations for a high-profile More ❯
Architect (Security), you'll work directly with major enterprise customers, playing a strategic role in advisory, design, and technical delivery. What you'll do Provide expert guidance across SASE / SSE, PAM, detection, and data centre security technologies Lead customer engagements, providing advisory services, architecture guidance, roadmap planning, and solution governance Define and document high-level solution designs, technical … architecture engagements at the enterprise level Expertise in Secure Access Service Edge (SASE) and Secure Service Edge (SSE), especially with Zscaler Experience in at least three enterprise Zscaler SSE / SASE projects Ability to provide presales advisory, requirements gathering, and high-level solution design Strong understanding of Zscaler architecture and troubleshooting Broad knowledge across IAM, SSO, MFA, PAM, and … IDaaS Strong background in core security technologies such as firewalls, IDS / IPS, endpoint protection, and encryption Comfortable working with cloud platforms and designing secure architectures across Azure, AWS, or Google Cloud Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security More ❯
operational issues Manage and maintain company endpoints, configurations, and application deployments Oversee cloud-hosted virtual endpoints and assets Perform OS, firmware, and application patching and vulnerability management Support onboarding / offboarding processes, including access setup and asset allocation. Administer licenses, accounts, and user groups in Microsoft 365. Monitor and maintain health of live systems with L1-L3 analysis and … Cisco networking tools and core networking principles. Familiarity with ITIL support practices and cloud computing frameworks. Exposure to PowerShell and SQL (additional languages a plus). Awareness of ISO27001 or similar security standards. Experience in hardware troubleshooting and repair is a bonus. What they Offer A dynamic and growing company with room to advance Training … Swiss law. Both Modis International Ltd and Modis Europe Ltd are Equal Opportunities Employers. By applying for this role your details will be submitted to Modis International Ltd and / or Modis Europe Ltd. Our Candidate Privacy Information Statement which explains how we will use your information is available on the Modis website. More ❯
Northampton, Northamptonshire, England, United Kingdom
VIQU IT Recruitment
compliance and follow up with internal stakeholders to ensure corrective actions are taken. Assist with evidence gathering and tracking actions for internal audits and external certification reviews (e.g., ISO27001). Skills from the Information Security Analyst: Proven experience managing GDPR-related activities, especially actioning Subject Access Requests . Familiarity with data protection regulations and handling … sensitive information securely. Hands-on experience working within an ISMS framework , ideally in environments aligned to ISO 27001. A methodical and structured approach to compliance verification and policy adherence. Excellent communication skills with the ability to follow up effectively with stakeholders. The Information Security Analyst is required onsite in Northampton, 2 days per week. Apply now to speak More ❯
Information Modelling (CDE & BIM) platforms. Experience or use of these would be beneficial although not essential. Understanding of system architecture in relation to CDE & BIM as well as Sharepoints / MS365 stack would also be beneficial for this role. There is a high expectation that the right candidate would be able to lead and progress with architectural type work … best practices. Experience with cloud computing platforms (e.g., AWS, Azure etc.). Familiarity with microservices architecture, APIs, and integration patterns. Knowledge of security frameworks and compliance standards (e.g., ISO27001, GDPR). Excellent problem-solving skills and the ability to work in a fast-paced environment. Strong communication and interpersonal skills. All profiles will be reviewed More ❯
Information Modelling (CDE & BIM) platforms. Experience or use of these would be beneficial although not essential. Understanding of system architecture in relation to CDE & BIM as well as Sharepoints / MS365 stack would also be beneficial for this role. There is a high expectation that the right candidate would be able to lead and progress with architectural type work … best practices. Experience with cloud computing platforms (e.g., AWS, Azure etc.). Familiarity with microservices architecture, APIs, and integration patterns. Knowledge of security frameworks and compliance standards (e.g., ISO27001, GDPR). Excellent problem-solving skills and the ability to work in a fast-paced environment. Strong communication and interpersonal skills. All profiles will be reviewed More ❯
Nuneaton, Warwickshire, United Kingdom Hybrid / WFH Options
IntaForensics
Location: Nuneaton, Warwickshire / Hybrid IntaForensics provide computer forensics, mobile phone forensics and cell site analysis to the legal sector, police forces, local authorities, and commercial organisations. The organisation also provides Cyber Security services, e-discovery services and digital investigations services to a wide variety of customers and maintains specialist teams to deliver these services. The Position This is … and life; truly accommodating with life outside of the business. Company pension Healthcare benefit including employee assist program and 24-hour GP line Life insurance 3x salary Employee recognition / long service awards What Happens Next We are all about our people, following an initial successful application, those progressing to interview will have the opportunity to come into our … Apply here . Please note: Due to the nature of the role and our work, applicants will be required to be DBS checked, and able to pass a SC / NVVP3 security clearance check. To gain this level of security clearance you must have been resident in the UK for a continuous period of 5 years. More ❯
Cybersecurity Issue / Risk Service Manager page is loaded Cybersecurity Issue / Risk Service Manager Apply locations Birmingham, England, United Kingdom Krakow, Lesser Poland, Poland time type Full time posted on Posted Yesterday job requisition id R Location: Birmingham, England, United Kingdom Job ID: R Date Posted: 2024-07-17 Company Name: HITACHI ENERGY UK LIMITED Profession (Job … risk management services to Hitachi Energy in cooperation with the te Work closely with the stakeholders to prioritize, create reporting, and oversee security findings. Improve management of security risks / issues and help identify areas of risk Reporting on the services, and their continuous improvement. Background: 8+ years of experience in IT / Information Security Governance in large … audit or industry / operations Experience in planning and operating security risk / issue management-related processes and services. Experience in Risk Management aligned to certification requirements (ISO27001, ISO31000 or similar) required Knowledge of relevant security / governance frameworks (NIST CSF, ISO27001, CobiT, ) required Experience in service build up a plus Security Governance / Risk Management More ❯
Nuneaton, Warwickshire, West Midlands, United Kingdom
Intercity Technology Limited
Proven ability to work independently and as part of a team. Experience delivering IT projects end-to-end. Certifications We Value (but dont require all): Linux: CompTIA Linux+, RHCSA / RHCE, LPIC-1 / 2 / 3 Windows: MCSE or equivalent Security: CISSP, CISM, or similar Desirable Extras Knowledge of IT product lifecycle and data management. Familiarity … opportunities and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (Information Security) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more information please see More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Apogee Corporation**
data stewardship to classify and protect data assets. Promote data governance best practices across the organisation. Ensure compliance with data privacy and security regulations such as GDPR and ISO 27001. Oversee the creation and distribution of reports, dashboards, and Power Platform solutions. Work with stakeholders to understand reporting needs and deliver insights. Manage self-service reporting tools while … of experience in a leadership role. Proven experience managing data governance initiatives, data quality frameworks, and reporting processes. Strong understanding of data privacy and security regulations (e.g. GDPR, ISO27001, Cyber Essentials Plus). Expertise in Microsoft Power Platform and reporting platforms (e.g. PL-300, PL-400). Technical Skills: Familiarity with data governance tools and More ❯
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
VIQU IT
for data management and automation tasks Familiarity with Active Directory Group Policy Microsoft Entra ID and Microsoft Server patching processes Understanding of cybersecurity standards such as Cyber Essentials or ISO27001 is desirable Strong communication skills and ability to work both independently and within a team Legal Applications Analyst with iManage Experience 12 Month FTC Competitive Salary Birmingham Hybrid Working Apply More ❯
opportunities and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (Information Security) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more information please see More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Eligo Recruitment
You'll Be Doing Own and evolve GCP infrastructure , managing provisioning, configuration, and lifecycle with Terraform Design scalable, cost-effective solutions to meet product and customer needs Lead CI / CD pipeline automation , security scanning, and compliance integration (ISO27001) Configure network architecture, manage VPNs (Tailscale), and support cloud security policies Implement monitoring, alerting, and … reusable deployment tooling What You'll Bring Strong experience with GCP , Terraform , and Infrastructure-as-Code Deep knowledge of cloud networking, security automation, and compliance standards Proficiency in CI / CD pipelines , monitoring tools (Grafana, Datadog), and scripting A collaborative mindset with excellent communication and mentoring skills Why Join? Shape a next-gen AI infrastructure with autonomy and purpose More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
VIQU IT Recruitment
compliance and follow up with internal stakeholders to ensure corrective actions are taken. Assist with evidence gathering and tracking actions for internal audits and external certification reviews (e.g., ISO27001). Skills from the Data Protection Officer: Proven experience managing GDPR-related activities, especially actioning Subject Access Requests . Familiarity with data protection regulations and handling … sensitive information securely. Hands-on experience working within an ISMS framework , ideally in environments aligned to ISO 27001. A methodical and structured approach to compliance verification and policy adherence. Excellent communication skills with the ability to follow up effectively with stakeholders. The Data Protection Officer is required onsite in Northampton, 2 days per week. Apply now to speak More ❯
opportunities and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (Information Security) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more information please see More ❯
Security Assurance Coordinator / SAC Looking for an experienced Security Assurance Coordinator / SAC to be responsible for the co-ordination of security assurance. Working in information assurance and information security . … This would suit someone working towards or be qualified in CISSP / CISA / CISM and experience in risk and regulatory frameworks and standards, such as NIST, ISO27001, MOD JSP440, JSP604. Working for a very successful MSP who supports HMG’s security classification system working on defence projects. You must be security cleared or be willing and able … Manager to put policies and procedures in place to manage risks. Looking at maintenance improvements, controls to measure threats. Involved in co-ordinating information governance, including annual Service assessments / reports and risk management, monitoring the operation of the Company’s Information Security Management System, incident management, champion security and education across the business. More ❯
opportunities and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (Information Security) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more information please see More ❯
support smarter, faster decision-making at every level of the firm. With a small but growing team, we're looking for someone ready to wear multiple hats-from business / data analysis to solution design, implementation, and testing. The core foundation is in place-now we need someone to help operationalise and scale it, turning potential into business value. … SQL queries and stored procedures, and formal database design methodologies. Experience in setting up monitoring and data quality exception handling. Strong data modelling experience. Experience managing and developing CI / CD pipelines. Experience with Microsoft Azure products and services, and proficiency in ETL processes. Experience of working with APIs to integrate data flows between disparate cloud systems. Strong analytical … Experience in semi / fully unstructured datasets and NoSQL environments Awareness of working in a regulated environment, with experience of data legislation and cyber security accreditations e.g., GDPR, ISO27001, Cyber Essentials. Expertise in Business Intelligence, ideally via Power BI for data visualization and reporting Use of DevOps (CI / CD) concepts to test, schedule, and deploy to a More ❯
effective solutions. Benefits include: 401(k), health, dental, vision insurance, life insurance, disability coverage, paid time off, and professional development support. Job Responsibilities: Develop data warehousing blueprints, evaluate hardware / software platforms, and integrate systems. Assess reusability of current data for analysis. Design data warehouses, including data design, database architecture, and metadata management. Build relational databases, perform data access … analysis, and design archive / recovery processes. Review and develop object / data models and metadata repositories for better data management. Knowledge of cybersecurity, privacy principles, networking, protocols, and risk management is required. Maintain databases and optimize performance. Understand database management systems, query languages, and data warehousing principles. Manage physical and virtual data storage media. Communicate effectively with … team members and stakeholders. Required Skills: MS / MA in Computer Science with 10 years' experience or BA / BS with 12 years' experience in data management, programming, and architecture. Eligibility for Top Secret clearance with completed T5 investigation. Must hold four Microsoft Certifications from specified options, including Azure and Security certifications. Alternatively, at least one role-based More ❯
contact you as soon as possible. Open Jobs Jun ID Job Title Job Description Cyber Security Architect Yakshna Solutions, Inc ., (YSI) is a CMMI Level 3 assessed, ISO 9001, 20000:1, 27001 certified, woman-owned small business enterprises, headquartered in Herndon, Virginia, USA. YSI provides professional IT solutions and services to business corporations and government … includes the following: 401(k), health, dental, and vision insurance, Life insurance, short-term and long-term disability insurance, paid time off, training and professional development assistance. Job Responsibilities / Required Skills: Responsible for the overall maintenance of the government's information technology security systems and protocols. Design and implement security measures for hardware, software, and network platforms to … and network infrastructure. Assess existing cybersecurity systems and protocols and design and implement upgrades to existing measures and implement new procedures. Provides timely detection, identification, and alerting possible attacks / intrusions, anomalous activities, and misuse activities and distinguish these incidents and events from begin activities. Use cyber defense tools for continual monitoring and analysis of system activity to identify More ❯