of outputs and outcomes and provide reporting and feedback when required. Support, when necessary, the development of opportunities by contributing as an SME in response to client RFPs and / or the construction of proposal documents and responses. Develop timely, accurate reporting that can convey technical findings to non-technical audiences at all levels when necessary. When required, work … with the Director of Cyber Advisory and Head Consultant to continuously improve capability, enhance & integrate service offerings, and build the Professional Services team Skills / Must have: 5 years in a client-facing information / cyber security / GRC role Professional certifications including but not limited to CISSP, CCSP, CISM, CRISC, CISA, CDPSE. Experience in auditing and … implementing security standards such as ISO27001/ 2, NIST CSF, and others. Exceptional verbal, written communication, and presentation skills. Ability to articulate technical requirements to non-technical audiences. Proven self-management skills and ability to work on multiple assignments concurrently. Ability to travel to meet business needs. Benefits: Opportunity to work with high-profile More ❯
digital transformation initiatives. Develop and deliver a compliance strategy aligned with legislation (e.g., UK GDPR, Data Protection Act 2018, PCI-DSS), internal policies, external frameworks (e.g., NIST CSF, ISO27001) and aligned with sector-specific best practice (e.g UCISA, NCSC) Develop and deliver a Security Assurance Testing program, including internal and external audit, penetration testing and … Desirable Certifications Industry-recognised certifications such as CISSP, CISM, GIAC (e.g., GDSA, GCIH, GCIA), and CompTIA CASP+ Framework-related qualifications (e.g. ISO27001 Lead Implementer / Auditor, NIST CSF, TOGAF or SABSA) demonstrating capability in structured security operations and strategic alignment. To learn more about this exciting opportunity and benefits we offer, please read the More ❯
Key Responsibilities Collaborate with IT, legal, and policy teams to develop, manage, and ensure compliance with industry regulations and internal policies Implement and support information security and privacy standards / frameworks (e.g. ISO27001, NIST, CIS) Work directly with engineering teams and architects to review system and data architectures in line with best practices Analyse … non-technical audiences Manage stakeholder expectations across projects with a pragmatic, agile, and solution-oriented approach Key Skills & Experience In-depth knowledge of cybersecurity frameworks such as NIST, ISO27001, and CIS Proven experience in a similar governance-focused role involving internal controls, risk management, and audit readiness Strong ability to bridge the gap between technical More ❯
tools for access governance, identity lifecycle, and privileged access management in alignment with defence-grade standards Security Assurance & Compliance Ensure commission controls comply with MOD policies (e.g. JSP 440 / JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and … DV Clearance : Must hold active Developed Vetting (DV) clearance (or immediate transfer eligibility) Access Control Expertise : Deep experience in identity & access management, particularly designing and enforcing commission controls, RBAC / ABAC models, access provisioning, and entitlement workflows. Tools & Technologies : Hands-on with identity platforms (e.g. Active Directory, Azure AD, Okta), PAM / IGA systems, SSO / SAML … / OAuth, and access governance tools. Security Framework Knowledge : Understanding of defence and public-sector security frameworks (JSP 440 / 604, STIGs, ISO27001, Government Functional Standard 007) Incident & Risk Handling : Proven ability to conduct security incident investigations relevant to unauthorized access and remediate gaps. Communication Skills : Strong ability to engage with both technical More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
AppCheck Ltd
to join AppCheck in a new role focused on developing our Asset Management product offering, which brings together existing capabilities as well as developing substantially new features and UX / UI. We’re looking for an experienced Product Manager who can liaise with commercial leadership, customers and technical teams, while building the product roadmap and driving progress towards and … PM) role will be responsible for the end-to-end lifecycle of this capability, leading on the discovery, development, launch, and post-launch of the product and new features / enhancements post-launch. Key Accountabilities: Realising Customer Needs. The PM will be accountable for developing insights into our customers, the risks that they manage, and discover new opportunities to … of working in an organisation using Agile Software Development practices such as XP and Continuous Delivery. Experience of managing and prioritising effort across multiple deliverables that are in scoping / development. Knowledge & Skills: Strong communication skills with the ability to use data and narrative to drive action and decision with both internal / external stakeholders and delivery teams. More ❯
tight SLA’s and KPI’s for our customers leveraging vulnerability and assessment tools such as Qualys and Microsoft’s EDR offering. Analyse vulnerability test reports and provide remediation / mitigation plans to the team. Integrate with our vendors and security providers to identify the most up-to-date information on the latest vulnerabilities and deliver key awareness and … LIMA’s Operation team to plan and implement internal security adoption across all our platforms including our hosted cloud platform, aligning to CE+, ISO27001/ 27002 and ITIL. With the Technical Services Manager, identify and implement the best practice security posture for LIMA’s Managed Services Engineers when working with customers and vendors. Produce … experience with technical accreditations or demonstrable experience in security and vulnerability remediation technologies: Security Tooling: OWASP ZAP, Nmap, Wireshark Assessment Tooling: Nessus, Qualys, etc Remediation Tooling: Microsoft Endpoint Management / Intune Microsoft Security / Compliance: MFA,?Conditional Access, SSPR, DLP, IPM, IRM, DKIM, MCAS Application packaging for automated deployment Intermediate scripting experience utilising PowerShell or Python You should More ❯
failure. Essential Skills & Experience: At least 2 years of hands-on experience in information security or IT infrastructure within an enterprise environment. Familiarity with security standards such as ISO27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk … apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
now looking for an experienced and dynamic Senior Cyber Security Engineer to join our vibrant office with hybrid working. Senior Cyber Security Engineer – Responsibility: Carry out daily security engineering / operation tasks under an ITIL framework Develop an understanding of the threats, risks, vulnerabilities and evolving attack vectors facing the business. Using strong technical knowledge, continuously analyse and make … recommendations to implement effective security controls, system hardening and security improvement projects with a particular focus in application / web hosting security. Assist in the management of patching, vulnerability analysis and penetration testing to ensure recommendations are risk assessed and implemented in a timely manner Senior Cyber Security Engineer – Skills: Experience in Security Engineering, Network Security, and / … protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA / CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it will not be possible to respond to all applications and only applicants More ❯
failure. Essential Skills & Experience: At least 2 years of hands-on experience in information security or IT infrastructure within an enterprise environment. Familiarity with security standards such as ISO27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk … apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
failure. Essential Skills & Experience: At least 2 years of hands-on experience in information security or IT infrastructure within an enterprise environment. Familiarity with security standards such as ISO27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerability scanning, risk … apply now. Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
governance, risk, and assurance. Key Responsibilities: 1. Governance, Risk & Compliance (GRC) Management Develop, implement, and maintain GRC policies, frameworks, and procedures aligned with industry standards and regulatory requirements (ISO27001, NIST, SOC 2, GDPR, HIPAA, PCI DSS). Conduct … workshops to gather requirements for risk assessments and security reviews, ensuring risk mitigation strategies are in place. Maintain a risk register and track risk management initiatives. Lead third-party / vendor risk assessments requirement gathering, ensuring supplier security and compliance. Collaborate with leadership to align GRC practices with business objectives. 2. Compliance & Assurance Ensure the organization meets regulatory requirements … and industry best practices. Manage compliance audits (ISO27001, SOC 2, PCI DSS, GDPR, HIPAA) and coordinate with internal / external auditors. Conduct compliance monitoring and provide periodic reports on adherence to policies. Develop and implement assurance programs to validate control effectiveness. Stay updated on changing regulations and emerging compliance risks. 3. Business Analysis & Process More ❯
in relation to Data Protection and Information Management. The successful candidate will be responsible for: Develop, own and implement our Data Protection Strategy, including associated policies. Lead the UK / EU data privacy compliance framework and ensure its continuous improvement. Be the named point of contact with the regulatory bodies,s seeking advice where necessary. Ensure serious information breaches … business operations. Oversee Data Protection Impact Assessments (DPIAs), advising stakeholders on risks and guiding mitigation efforts. Development and upkeep of the required Records of Processing Activities (ROPA) documentation. Experience / Qualifications Must have: Degree or Relevant Experience Expert knowledge of UK / EU GDPR and Data Protection Act 2018. Hands-on experience leading a data compliance programme or … Management Systems. Ability to communicate, negotiate and influence at all levels of the Group. Knowledge of global privacy regulations (e.g. UK, EU, Middle East). Desirable: Certifications like CIPP / E, CIPM, CIPT C-DPO or similar. Leadership experience and team development skills. Background in Aviation, Technology. What We Offer: Competitive salary Generous holiday allowance and company pension scheme. More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
Role Title: Security Logging and monitoring specialist Duration: contract to run until 31 / 12 / 2025 Location: Knutsford, hybrid 2 / 3 days onsite Rate: up to £478.40 p / d Umbrella inside IR35 Role purpose / summary You will assists in the secure design and implementation of changes across various business areas, technologies … vulnerabilities are essential, along with excellent communication, teamwork, multitasking, and attention to detail. Familiarity with compliance standards such as GDPR, HIPAA, PCI-DSS, and frameworks like NIST and ISO27001 is also important. A Security Logging Specialist requires a bachelor's degree in a relevant field (or equivalent experience) and preferred certifications (e.g., CISSP, CISM, CISA More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Lowell Financial Ltd
Flexible, Hybrid working available. Join us as an Information Security Officer! You'll play a central role in shaping and implementing our security strategy, ensuring it aligns with ISO27001 standards. You'll manage and monitor risks, maintain compliance with legal and regulatory requirements, and lead our response to cyber incidents, including simulations and investigations. Your … and assessments, while promoting a strong security culture through awareness initiatives and tailored training programs. What we are looking for: Professional certifications such as CISSP, CISM, CISA, CCSP, ISO27001 Implementor, or equivalent. Strong knowledge of information security, risk management, and data protection-ideally within the financial sector. Proven ability to build effective relationships with stakeholders More ❯
Information Security Analyst Hull / Hybrid A great opportunity for an Information Security Analyst to join one of the UK’s leading enterprise manufacturing businesses. You will join a company that has experienced year on year growth and is looking to hire due to the expansion of the team. You will be part of a business driving innovation in … the business is investing in to grow and become a critical function within its IT landscape. You will play a key role in the organisation’s journey to ISO27001 and CES, and be instrumental in implementing the GDPR, DLP compliance and security awareness initiatives. To be successful in this role you must have the following … experience: At least 3 years’ experience working as an Information Security Analyst Strong understanding of ISO27001 Experience GDPR Compliance Experience of Microsoft environment Security certifications such as CISM are a bonus The role is based in Hull and has a two stage interview process that can be wrapped up within a week. Please apply or More ❯
against agreed targets. Who we’re looking for Ideally, you’ll have experience leading within a risk management role and have a good knowledge of methodologies such as IEC 62443 and ISO 27005. Knowledge of control frameworks such as NIST, IEC 62443, ISO27001, ITIL (Information Technology Infrastructure Library), and More ❯
todeliver against agreed targets. Who we're looking for Ideally, you'll have experience leading within a risk management role and havea good knowledge of methodologies such as IEC 62443 and ISO 27005. Knowledge ofcontrol frameworks such as NIST, IEC 62443, ISO27001, ITIL (InformationTechnology Infrastructure Library), and SABSA is More ❯
Middlesbrough, North Yorkshire, North East, United Kingdom Hybrid / WFH Options
Reed Technology
Compliance Analyst (Information Assurance) Location: Teesside Department: Digital / ICT Contract Type: Permanent Salary: Up to £45,000 per annum, depending on experience About the Role We're looking for a proactive and detail-focused Compliance Analyst to support our information assurance and data protection efforts. This is a great opportunity for someone with a solid foundation in GDPR … documentation skills. A collaborative approach and the ability to work across departments. Desirable (but not essential) Experience with tools like OneTrust , Varonis , or similar platforms. Certifications such as CIPP / E , CIPM , or ISO27001 Lead Implementer . Exposure to security projects or risk management frameworks Benefits: Competitive salary and performance bonuses. Comprehensive health, dental … and vision insurance. Generous pension scheme. Opportunities for professional development and continuous learning. Flexible working hours and remote work options. Employee discounts and perks. Permanent / Hybrid Working / Monday - Friday Next Steps? If you would like to know anything more about this role or even just want to hear what other DevOps, Cloud and Security positions I More ❯
Accrington, Lancashire, North West, United Kingdom Hybrid / WFH Options
Freight Personnel
prioritisation of functional and non-functional requirements across the UK business units. * Translate approved requirements into clear user stories, detailed acceptance criteria, and well-defined delivery plans within Jira / Confluence. * Portfolio & Road-map Planning: * Build and maintain a consolidated UK IT demand portfolio, strategically balancing new initiatives, essential technical debt reduction, and business-as-usual (BAU) activities. * Facilitate … the UK. * Demonstrable success in managing technology initiatives within complex, multi-platform environments (experience in e-commerce, shipping, or logistics is highly advantageous). * Strong practical knowledge of Agile / Scrum methodologies, effective backlog management, proficient use of Jira / Confluence, understanding of API concepts, and awareness of UX / UI best practices. * Hands-on experience establishing … e.g., sales performance, margin improvement, EBITDA contribution). Education & Certifications * Bachelor's degree in Computer Science, Information Systems, Business, or a related field. * Desirable: * Relevant certifications such as Agile / Scrum (e.g., PSM, CSM), ITIL, Prince2, security certifications (e.g., CISSP), or ISO27001 awareness. Key Performance Indicators (KPIs) * Project delivery performance (on-time /More ❯
be crucial to upholding quality as we grow, both in the UK and across our international offices. You'll be confident working with traditional management systems such as ISO standards (e.g., Information Security, Quality Management), while also appreciating modern agile and flexible delivery practices. You'll act as a quality advocate - helping us learn, share and improve internally … ll have the confidence to question assumptions and engage with senior colleagues in a constructive way, always focused on improvement and outcomes. Ensure the business maintains our existing ISO certification set through documentation, running board level reviews, and auditing teams. Facilitate the certification of the international group business units to the same Quality and Information Security standards of … Onboarding colleagues, suppliers and partners to Apadmi process and management systems. What you'll bring to the team You will have previous experience of creating, maintaining and auditing ISO management systems within a creative product company, preferably in a digital consultancy or software development environment working on large scale applications development and systems integration. You will be excited More ❯
Cyber Security / Infrastructure Consultant - 6-Month Contract - Outside IR35 We are seeking a Cyber Security Consultant for a high-impact 6-month contract to lead the review, design, and implementation of critical cyber security enhancements across our IT estate. You'll work hands-on with infrastructure, policies, and tooling to ensure our clients systems and data are resilient … strengthen our security posture Develop and implement security policies aligned with Cyber Essentials, ISO27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS / IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incident response, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous … communicator and critical thinker who thrives in fast-paced environments Join us to make a tangible impact on our clients cyber resilience. Interested? Please Click Apply Now! Cyber Security / Infrastructure Consultant - 6-Month Contract - Outside IR35 More ❯
Cyber Security / Infrastructure Consultant – 6-Month Contract - Outside IR35 We are seeking a Cyber Security Consultant for a high-impact 6-month contract to lead the review, design, and implementation of critical cyber security enhancements across our IT estate. You’ll work hands-on with infrastructure, policies, and tooling to ensure our clients systems and data are resilient … strengthen our security posture Develop and implement security policies aligned with Cyber Essentials, ISO27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS / IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incident response, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous … communicator and critical thinker who thrives in fast-paced environments Join us to make a tangible impact on our clients cyber resilience. Interested? Please Click Apply Now! Cyber Security / Infrastructure Consultant – 6-Month Contract - Outside IR35 More ❯
Cyber Security / Infrastructure Consultant – 6-Month Contract - Outside IR35 We are seeking a Cyber Security Consultant for a high-impact 6-month contract to lead the review, design, and implementation of critical cyber security enhancements across our IT estate. You’ll work hands-on with infrastructure, policies, and tooling to ensure our clients systems and data are resilient … strengthen our security posture Develop and implement security policies aligned with Cyber Essentials, ISO27001, NIST, and GDPR Configure and deploy essential tools: firewalls, IDS / IPS, endpoint protection, and encryption Overhaul Active Directory, Group Policies, and server configurations Lead incident response, forensic analysis, and threat mitigation Monitor and adapt to new threats with continuous … communicator and critical thinker who thrives in fast-paced environments Join us to make a tangible impact on our clients cyber resilience. Interested? Please Click Apply Now! Cyber Security / Infrastructure Consultant – 6-Month Contract - Outside IR35 More ❯
brands, ensuring our security approaches and technology align. Cloud Security Integration: You'll work with development, DevOps, and cloud engineering teams to embed cloud security controls into our CI / CD workflows and infrastructure-as-code. Cloud Security Posture: You'll utilise cloud-native and third-party security tools to keep an eye on our cloud security posture and … Linux, Windows, Apple & Android OS . Knowledge of network perimeter security, including firewalls, WAF, anti-virus, and O365 compliance & security centre . Familiarity with NIST (CSF Framework 2.0), ISO27001, PCI-DSS, and GDPR . Experience … operating and managing SIEM solutions , vulnerability management tools, and secure configuration tooling. Ability to use PowerShell and Python scripting for security automation. Experience working in or with agile and / or SecOps oriented teams . A proven track record of analysing security requirements and applying architectural best practices. Previous work experience in an IT, InfoSec, or system administration role. More ❯
Maintain secure on-premise network architectures including segmentation, access control, and perimeter defence. Collaborate with other teams to ensure compliance with internal security policies and external regulations (e.g., ISO27001, NIST, GDPR). Threat Intelligence - analyse potential threats, identify vulnerabilities, and implement measures to mitigate risks. Conduct vulnerability scans, validate findings and use a risk-based More ❯