Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date on the latest cyber threats and technologies Requirements: Essential: Experience in informationsecurity or networking Understanding of network protocols (e.g. TCP/IP, DNS) Strong communication and client-facing skills A proactive, problem-solving mindset Fluent in written and spoken … evenings/weekends for planned exercises (not a 24/7 role) Desirable: Degree or equivalent experience Previous consulting or technical client-facing experience Background in SOC, Pen Testing, InfoSec, or Systems Admin Knowledge of BGP, WAF, CDN, or cloud platforms (AWS, Azure, GCP) Basic scripting (e.g. Python, Bash) for automation or analysis Please note that at times due to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Precise Placements
Senior IR-SOC Engineer - Elite Law Firm - London Are you a security professional looking to step into a high-profile, enterprise environment? One of the world’s most prestigious law firms is seeking a Senior Incident Response & SOC Engineer to join its global InformationSecurity team, based in London . This is a rare opportunity to play …/7 SOC , handling incident response and contributing to the development of detection, automation, and reporting tools. Key Responsibilities: Lead and support incident response (IR) and investigation of security threats across a complex enterprise estate. Manage, tune, and develop SIEM and EDR technologies to enhance threat detection and response capabilities. Implement and refine playbooks , automations , and alerting rules in … collaboration with security partners. Contribute to threat hunting and proactive detection strategies. Produce actionable reporting and metrics for stakeholders, including executive leadership. Desired Experience: Proven experience working in or alongside a 24/7 Security Operations Centre . Strong technical exposure to SIEM (ideally Splunk), EDR (CrowdStrike preferred), and SOAR tools. Expertise in incident handling , threat analysis , and More ❯
Simple, Do The Right Thing, Own It, and Aim For Greatness. About the Role To support our growth, we are looking for SOC Analysts to join our growing cyber security function. This role will be supporting our 24/7 operational capabilities (On-call rota, not shift based). As a member of the Starling SOC team, you will … Incident Triage, Response, and Investigations based on Alerts received from multiple sources which include: Cloud Infrastructure/Security. Endpoint Detection and Response. Perimeter detection tooling. Investigating and responding to security alerts raised by Users. Enhancing and creating analytic triggers to enhance alert efficacy. Continuous development of incident handling and readiness processes. Proactive threat hunting based on threat intelligence. Documentation … care more about aptitude and attitude than specific experience or qualifications. Below is an overview: 3+ years experience in an in-house SOC role and team Understanding of AWS Security Solutions (or other Public Cloud Solutions) Analysis and Incident Response experience with Cloud systems such as AWS or GCP Experience working and supporting analytics/SIEM platforms. Experience working More ❯
Jam Management Consultancy Limited T/A JAM RECRUITMENT
procedures, and processes are clear, performance-oriented, and fully documented. Lead the coordination and documentation of internal audits on key processes. Support training and awareness activities in line with InformationSecurity and Data Privacy standards. Collaborate with the People Team to ensure ongoing colleague training across quality, security, environmental and privacy standards. Continuous Improvement Support the CISO … communicator with strong written and verbal skills. A collaborative, organised and proactive approach with the ability to meet multiple deadlines. Creative problem solver with a genuine interest in data security and regulatory affairs. More ❯
West Berkshire, England, United Kingdom Hybrid / WFH Options
Cedar
this role will focus on the procurement and commercial management of cloud-based software agreements at an international level. You will lead the consolidation of cloud services, ensure data security compliance, and negotiate best-in-class supplier agreements that align with our global strategy. This is a hybrid position, requiring three days per week in our Berkshire office , offering … cost. Draft, review, and negotiate supplier agreements for software and cloud services, ensuring alignment with data security, compliance, and business needs. Collaborate with internal stakeholders including IT, Legal, InfoSec, and Finance to align procurement activity with strategic objectives. Monitor and manage vendor performance, ensuring service delivery against contractual obligations. Conduct market analysis and benchmarking to ensure competitive pricing and … with a focus on cloud services on a global scale . Strong understanding of cloud licensing models (e.g., Microsoft Azure, AWS, Google Cloud, Salesforce, etc.). Experience with data security and regulatory compliance within procurement agreements. Excellent commercial acumen and the ability to drive value through strategic sourcing. High emotional intelligence and strong interpersonal skills to influence and build More ❯
to analyse traffic for common services (DNS, FTP, email etc.) is considered an asset. Exposure to enterprise monitoring tools. Experience of Java Application Server management (JBoss, WildFly etc.). Security focussed mind-set to enforce security standards, both in the environments and when collaborating with teams. Specific technologies used are: AWS (nice to have), VMware (preferred), Windows Server … firewalls, physical servers and switches. Experience and understanding of informationsecurity issues and industry standards such as SSAE16 and ISO 27001 ITIL certification is considered an asset Role and Responsibilities Role and Responsibilities Create reports and analyse performance trends to identify potential improvement areas and/or performance deficiencies Provide analytical value creation initiatives to enable prioritization effort … hosting services comply with relevant national and international industry and quality regulations and frameworks incl. SSAE16 and ISAE3402. Work with the rest of the hosting team to deploy effective security policies, processes and procedures in line with industry benchmarks and regulatory requirements including ISO 27001. Deploy appropriate supporting tools and processes are implemented to enable effective monitoring of the More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Axians Networks Limited
two days a week. KEY RESPONSIBILITIES: Team Leader within the Professional Services/Delivery domain. Support the Axians account teams on strategic accounts. Create strategies, roadmaps & designs. Provide network & security architecture, configuration and implementation. Provide technical presentations, product demonstrations, and proof … of concepts. Complete project, implementation & migration activities. Design & optimization of network routing policies & associated technologies. Ensuring own and Teams adherence to Axians' Management System Manual for Quality (ISO 9001), InfoSec (ISO 27001) and ESG (ISO 14001). ADDITIONAL RESPONSIBILITIES Respond to customer and partner enquiries including RFI's and RFP's. Provide delivery documentation; HLD, LLD & Migration Strategy. Support Axians … service provider & Alt-Net industry would be an advantage. • Team leader or management experience of technical teams: 3+ years. • Technical experience: 8+ years in SD-WAN, switching/routing & Security hands on experience. • Juniper JNCIS/JNCIP specialisation certifications. JNCIE desirable. • Previous Pre-Sales experience would be an advantage. • A deep understanding of networking, security, cloud and emerging More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Bowerford Associates
Prem, Big Data and Data Lake environments. Expert knowledge in data technologies, data transformation tools, data governance techniques. Strong analytical and problem-solving abilities. Good understanding of Quality and InformationSecurity principles. Effective communication, ability to explain technical concepts to a range of audiences. Able to provide coaching and training to less experienced members of the team. Essential … Languages such as Spark, Java, Python, PySpark, Scala or similar (minimum of 2). Extensive Big Data hands-on experience across coding/configuration/automation/monitoring/security is necessary. Significant AWS or Azure hands-on experience. ETL Tools such as Azure Data Fabric (ADF) and Databricks or similar ones. Data Lakes: Azure Data, Delta Lake, Data More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Jisc
managers, architects and customers. Data Quality . Responsible for helping Jisc improve data quality and data governance challenges across the business, highlighting and fixing data quality issues where appropriate. InformationSecurity . Audit and Data Governance functions to ensure the ongoing and documented operational integrity, data quality and availability within operations. Advocacy . Be a trusted advisor to … with operational responsibilities. Strategic Thinking Familiar with stakeholder mapping techniques (RACI knowledge is a plus) and experienced in applying ITIL principles across change management, service delivery, or product management. Security & Privacy by Design A strong advocate for embedding security and privacy from the outset in all work. Qualifications Holds a relevant degree, vocational or professional qualification-or equivalent More ❯
Reigate, England, United Kingdom Hybrid / WFH Options
esure Group
awareness & comms to ensure key messages are understood and data literacy matures Own the delivery of key data governance deliverables and outcomes ensuring requirements of DPO, privacy, legal and infosec teams are met Collaborate with our AI team to **develop** and implement standard methodology for the rollout of GenAI products Work with architects on best design for data products What More ❯
DPO (Data Protection Office) Manager - InformationSecurity, Data Up to £650 per day - Inside IR35 Primarily Remote 6 months My client is an instantly recognisable consultancy who require a DPO (Data Protection Office) Manager to provide clear regulatory compliance support, data protection regulations and data privacy laws for an end client within Financial Services. Key Requirements: Proven commercial … DPO (Data Protection Office) Manager within Financial Services. The ability to provide expert knowledge of Data Protection regulations and Data Privacy Laws including GDPR. Demonstrable experience developing and managing information and data security assurance programmes. Previous experience conducting data privacy compliance assurance reviews and managing Information Data Security within a large, complex environment. The ability to More ❯
Your new company An exciting opportunity has arisen with a high-profile client based in the Reading/Oxford region. They are continually at the forefront of security standards and are seeking a seasoned, confident and reliable Interim Chief InformationSecurity Officer (CISO) to support their teams during a period of change in leadership. Your new role … You will be responsible for continually driving the client's security strategy. You will work alongside the CTO and advocate for the client's informationsecurity needs both internally but also on a wider stage, including across the UK government. You will ultimately be responsible for the further development, direction and delivery of the business. Furthermore, continue … work on the business-wide security refresh programme and provide sound advice to the Senior Leadership team on informationsecurity governance. What you'll need to succeed Previous experience adopting the role of CISO or Head of Cybersecurity Strong experience in senior leadership or management A robust and current understanding of cybersecurity threats and best practice mitigation More ❯
Your new company An exciting opportunity has arisen with a high-profile client based in the Reading/Oxford region. They are continually at the forefront of security standards and are seeking a seasoned, confident and reliable Interim Chief InformationSecurity Officer (CISO) to support their teams during a period of change in leadership. Your new role … You will be responsible for continually driving the client's security strategy. You will work alongside the CTO and advocate for the client's informationsecurity needs both internally but also on a wider stage, including across the UK government. You will ultimately be responsible for the further development, direction and delivery of the business. Furthermore, continue … work on the business-wide security refresh programme and provide sound advice to the Senior Leadership team on informationsecurity governance. What you'll need to succeed Previous experience adopting the role of CISO or Head of Cybersecurity Strong experience in senior leadership or management A robust and current understanding of cybersecurity threats and best practice mitigation More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Rentokil Initial plc
The Senior InformationSecurity Analyst will be responsible for assuring informationsecurity and managing risks related to the use, processing, storage, and transmission of information and the systems and processes used for those purposes. They will be responsible for the collection, processing, preservation, analysis, and presentation of evidence in support of informationsecurity activities. Main tasks: Maintains and improves informationsecurity solutions for organization systems and products that comply with all applicable security policies, standards, and regulatory framework Establishes, implements, and maintains information assurance programs, requirements, and standards based on the analysis of user, policy, regulatory, and resource demands Authors and updates security documentation to include, but … not limited to, standards, policy, system security plans, contingency plans, standard operating procedures, and configuration management plans Analyzes information assurance-related technical problems and provides engineering and technical support for solving these problems Identifies, reports, and resolves security violations while also proactively seeks to uncover indicators of compromise Facilitates, performs analysis, and stores appropriate artifacts to respond More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
ea Consulting Group Ltd
InformationSecurity Manager ?? Reading area (Hybrid - 3-days on site) ?? Full-time | Permanent ?? Competitive salary + benefits Are you passionate about both quality assurance and informationsecurity ? Looking for a hands-on role where you can shape a company's compliance posture while testing real-world security software? If so, this could be a perfect … next step. We're working with a fast-growing, security-focused software company providing cutting-edge user activity monitoring and insider threat detection solutions. Their products are trusted across the public and private sectors-including healthcare, law enforcement, local government, and enterprise clients. They're now hiring a Quality & Compliance Engineer to play a pivotal dual-role-supporting internal … compliance frameworks (ISO 27001, Cyber Essentials Plus) and performing QA testing on security products. It's a rare opportunity to grow into a strategic governance or CISO-type position within an agile and collaborative team. ?? Key Responsibilities Own and manage compliance with ISO 27001 and Cyber Essentials Plus -including audit readiness, policy management, documentation, and staff awareness. Lead governance More ❯
InformationSecurity Third-Party Risk Specialist Hybrid - Southampton - 60% Time on site £42,848 - £55,000 Please note for to apply for this role you must use the link included below. Job summary Are you passionate about informationsecurity and confident assessing and managing supply chain risks? Do you have experience working with third-party suppliers … to embed secure-by-design principles and improve an organisation's security posture? Would you like to play a key role in protecting national infrastructure and influencing how security is embedded across critical digital services? Job description As a Third-Party InformationSecurity Specialist, you will play a vital role within the Maritime and Coastguard Agency … s InformationSecurity team, helping to protect our people, systems, and data across both internal operations and external suppliers. Your work will directly support MCA's broader InformationSecurity strategy, helping to embed best practices and risk awareness throughout the organisation and its supply chain. You'll influence how security requirements are considered from the More ❯
Havant, Hampshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
Cyber Security Specialist Location: Havant Job Type: Full-time, Hybrid (3-4 days per week), 12-month FTC (with likely extension to permanent) Salary: 50 - 53K plus benefits We are seeking a Cyber Security Specialist to lead the implementation of a new InformationSecurity Management System (ISMS) and ensure compliance with security standards. This role … is crucial in driving security improvements, managing risks, and maintaining regulatory compliance within a dynamic IT environment of circa 500 IT users. Key Accountabilities: * Lead the implementation of a new ISMS, ensuring alignment with industry security standards. * Develop and maintain cyber security policies, procedures, and risk management frameworks. * Manage compliance with cyber security regulations, standards, and … frameworks (ISO27001, CAF/eCAF, Cyber Essentials Plus). * Implement and manage security monitoring tools to detect and respond to security events. * Identify and assess security risks and vulnerabilities, developing mitigation strategies. * Support regular audits and assessments to ensure adherence to security policies. * Provide reporting on security incidents, compliance status, and risk assessments. * Collaborate with More ❯
Security GRC Consultant - Contract Location: Remote, UK based - occasional trips to London office needed About the Role We’re partnering with a leading cyber security consultancy to find a Security GRC Consultant who can play a pivotal role in strengthening their clients’ security posture. This is an exceptional opportunity for a GRC professional who thrives on … shaping policy, embedding governance frameworks, and driving alignment between security and business objectives. As a Security GRC Consultant, you’ll act as the crucial link between central security teams and business units, ensuring robust governance, risk management, and compliance practices are not only adopted but embedded across complex environments. What You’ll Do - Act as the primary … liaison between security functions and key business stakeholders, ensuring security requirements are aligned to business priorities.- - Champion the integration of governance, risk, and compliance controls across projects, processes, and systems. - Assess and remediate gaps in security practices and influence operational teams to adopt security-first approaches. - Drive adherence to industry standards and frameworks such as ISO More ❯
your expertise in cutting-edge cybersecurity solutions. Location UK, Milton Keynes What we are looking for We are looking for candidates who meet the following criteria: Proven experience in informationsecurity or computer networking Solid understanding of network protocols such as TCP/IP and DNS Strong communication skills and a proactive, consultative mindset Ability to inspire clients … and lead them toward improved security posture Demonstrated adaptability and eagerness to learn Excellent command of English, both written and spoken Willingness to work occasional nights and weekends for scheduled DDoS simulations or incident response (note: this is not a 24/… shift-based role) Desirable Qualifications and Experience Experience in a client-facing technical or consulting role Background in one or more of the following areas: SOC, Pen Testing, InfoSec, Networking, Systems Administration Knowledge of cybersecurity concepts including BGP, WAF, and CDN Familiarity with cloud platforms (AWS, Azure, GCP) Scripting abilities (e.g., Python, Bash) for automation or data analysis More ❯
Security Risk Analyst - Artificial Intelligence (AI) - Machine Learning (ML) Our client, a global insurance organisation, is looking to recruit the services of an experienced Senior Risk Analyst with deep expertise in Artificial Intelligence (AI), Machine Learning (ML), and Large Language Models (LLMs) to join our client's Security Risk Management team. This role plays a pivotal part in … Collaborate with stakeholders across IT, Data Privacy, Innovation, and Business to identify and mitigate risks. Translate complex technical risks into business-friendly language for executive audiences. Improve and evolve security risk assessment methodologies for advanced AI systems. Develop threat models and propose compensatory controls. Present findings to internal governance groups and help shape AI risk frameworks. Required Skills & Experience … communication skills, up to C-level. Strong analytical and reporting abilities. Familiarity with risk management frameworks (ISO 3100X, NIST 800 series, ENISA, EBIOS, OCTAVE, FAIR). Preferred: Background in informationsecurity and security frameworks (eg, MITRE ATT&CK, ISO 2700X). Experience working in multinational environments. Knowledge of AI governance or ethics is a plus. Please apply More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … Tester - Application (CCT APP), Cyber Scheme Team Leader (CSTL) infrastructure (CSTL-INF) or Web Application (CSTL-Web App). Eligibility : Right to work in the UK and eligibility for security clearance. Key Attributes Analytical thinker with a proactive, detail-oriented approach. Excellent verbal and written communication skills Ability to work effectively under pressure Commitment to maintaining the highest ethical More ❯
aspects of the standard internal audit process, which includes the three phases of planning, execution and reporting out to business management. Performs thorough inquiry and data analysis to understand security and technology operations, assess risk and develops project scope for complex process areas, leveraging business knowledge and expertise. Contributes to overall planning efforts for engagement timeline and approach. Evaluates … records, documents, methods, policies, costs and other factors to determine if areas are conducting operations in accordance with established policies/procedures, best practices, informationsecurity frameworks, control objectives for information and related technology controls and governmental and legal requirements. Able to quickly grasp risk areas and identifies remediation tactics. Applies appropriate audit procedures to the areas … do better for our customers. Drive results and growth. Respect and promote inclusion & diversity. Do what's right for each other, our customers, investors and our communities. Disclaimer: This information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a More ❯
Do you have a background in IT Engineering and a passion for delivering and effective and agile IT Service? Could you bring your information system knowledge to our multi-discipline team to support the UK Armed Forces? If so, we really want to hear from you! With a heritage dating back to the 1930's and based in Portsmouth … operating a product or service. Familiarity with coding and scripting: Be able to understand software development practices and design, prototype, code, test, correct and document programs or scripts. Use informationSecurity practices and available security controls to contribute to protecting solutions and services. Management of services for hardware and software assets used to maintain and monitor continuing More ❯
have previous people management experience. Proven experience in policy development, breach response, regulatory engagement, and staff training is essential, along with a working knowledge of cybersecurity, PCI DSS, and informationsecurity standards. Strong communication skills are key, as is the ability to influence across all levels of the organization. The role involves close collaboration with internal stakeholders across More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Apsley Recruitment Ltd
your ability to understand technical landscapes and translate business needs into actionable direction will be critical to success. Required Skills:- Strong understanding of data management principles, including governance, quality, security, and lifecycle. Solid grasp of enterprise applications and how they support operational and strategic business functions. Familiarity with business intelligence (BI) tools and reporting platforms (e.g., Power BI) Understanding … of cloud-based platforms (e.g., Azure) and their implications for data and application strategy. Familiarity with data warehousing solutions or modern analytics stacks (e.g., Snowflake, Databricks). Understanding of informationsecurity best practices and regulatory frameworks (e.g., GDPR, ISO 27001). Knowledge of ITIL practices or service management frameworks. Your Experience We are looking for someone with:- Experience More ❯