Inside IR35) Hours: 37.5 per week Role Overview: As a Senior Control Assurance Assessor, you will be part of a team responsible for evaluating and testing the effectiveness of security controls both on-premises and in the cloud, to ensure they are robustly designed and effectively implemented to safeguard Experian's assets. You will conduct assurance activities to assess … to ensure that controls are fit for purpose, in response to emerging risks and regulatory changes. What your background looks like : A bachelor's degree in computer science, management information systems, relevant field, or equivalent demonstrable experience. 3+ years' experience performing IT Audit or security control testing. 8+ years' of experience in InformationSecurity and/… or Information Technology Professional certification such as as CISA, CISM, CISSP, ISO 27001 Lead Auditor, or equivalent Familiarity with industry standards and frameworks e.g., NIST 800-53, ISO 27001/27002, CIS Controls, COBIT. Experience with control testing methodologies, risk assessments, and auditing tools. Familiarity with IT systems, and cybersecurity practices and domains Strong analytical, problem solving and critical More ❯
and used ethically. Talan provides a range of consultancy and outsourcing capabilities including programme management, market design and governance. We also have extensive and award-winning capabilities across cyber security, data privacy and digital transformation. We are IIP Gold accredited and Great Place to Work accredited. The nature of what we do means we are very much a people … the same, but we believe in a flexible approach to working which we know our employees value. Job Description The Role As the Smart Energy Consultant for Smart Meter Security & Privacy, you will be working on one of our Major Accounts in a dedicated team whose responsibility is to assure the security of smart meter devices, as defined … in the Smart Energy Code - the rulebook for smart meters. In your role as a subject matter expert in team, you will support the Security committees, Privacy committee and the SEC Panel - the lead governance committee overseeing the Smart Energy Code. You will work with governance team staff, ensuring draft meeting documentation and minutes they prepare are accurate and More ❯
Cyber Security Analyst London, To £60k/annum plus bonus plus excellent benefits We are currently seeking a skilled Cyber Security Analyst for a reputable financial institution. They’re a leader in the global insurance sector, known for strategic impact and innovative approach. The role: The Cyber Security Analyst will be responsible for safeguarding and enhancing the … technical infrastructure. Key responsibilities include: Infrastructure Security: Protect cloud, network, hardware, and software systems Threat Management: Monitor and address cyber threats, intrusions, and vulnerabilities Collaboration: Work with internal teams and third-party providers to maintain robust security Incident Response: Engage in incident management and disaster recovery planning Support and Guidance: Provide expert advice to support seamless global operations … Required Experience: Experience: 2–4 years in a corporate environment with 200+ users Education: Degree or certifications in Cyber/InformationSecurity Technical Skills: Proficiency in firewalls, SIEM, Azure, and Active Directory Abilities: Strong problem-solving skills and collaborative mindset This is an exciting opportunity to join a progressive team within a dynamic work environment where there are More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Tria
Cyber Security Engineer (DevSecOps) Automation/Cloud/Salesforce Rate: Circa £600/day (Outside IR35) Length: 12 months Location: Milton Keynes/Initially Hybrid (Flexibility) We're working with a well-known insurance company currently undergoing a company-wide transformation programme. As the organisation moves from on-premise to a cloud-based environment, the need for an improved … security posture is mission critical. As the Cyber Security … Engineer, you'll be focused primarily on hands-on engineering work, with some strategic responsibilities. You'll be joining a small but growing security team, reporting into the InfoSec Manager and Head of Technology. Your role will cover areas such as: Setting up a DevSecOps practice - embedding security within DevOps and automation processes. Embedding security into the More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
Tria
Cyber Security Engineer (DevSecOps) Automation/Cloud/Salesforce Rate: Circa 600/day (Outside IR35) Length: 12 months Location: Milton Keynes/Initially Hybrid (Flexibility) We're working with a well-known insurance company currently undergoing a company-wide transformation programme. As the organisation moves from on-premise to a cloud-based environment, the need for an improved … security posture is mission critical. As the Cyber Security … Engineer, you'll be focused primarily on hands-on engineering work, with some strategic responsibilities. You'll be joining a small but growing security team, reporting into the InfoSec Manager and Head of Technology. Your role will cover areas such as: Setting up a DevSecOps practice - embedding security within DevOps and automation processes. Embedding security into the More ❯
and proactive SaaS GRC Specialist to strengthen our Governance, Risk, and Compliance framework as we scale our SaaS operations. In this role, you will ensure that our business processes, security controls, and regulatory obligations are consistently met. You will work across multiple teams—security, legal, product, and operations—helping us maintain trust with customers and regulators while supporting … due diligence requests. Deliver GRC training and awareness sessions to employees across the business. Track regulatory changes and advise leadership on potential business impacts. Requirements Bachelor’s degree in InformationSecurity, Business, Compliance, or related field. 2+ years of experience in GRC, risk management, or compliance (preferably within SaaS or technology companies). Strong knowledge of SaaS compliance … certifications (CISM, CRISC, ISO 27001 Lead Implementer, or similar). Experience working with SaaS platforms (AWS, Azure, Salesforce, HubSpot, etc.). Familiarity with vendor risk management and third-party security assessments. Exposure to data privacy laws beyond GDPR (CCPA, UK-GDPR, HIPAA). Role Type Permanent or Contract London-based (Hybrid) or remote About Us Discover tailored data privacy More ❯
london (city of london), south east england, united kingdom
Lex Dinamica
and proactive SaaS GRC Specialist to strengthen our Governance, Risk, and Compliance framework as we scale our SaaS operations. In this role, you will ensure that our business processes, security controls, and regulatory obligations are consistently met. You will work across multiple teams—security, legal, product, and operations—helping us maintain trust with customers and regulators while supporting … due diligence requests. Deliver GRC training and awareness sessions to employees across the business. Track regulatory changes and advise leadership on potential business impacts. Requirements Bachelor’s degree in InformationSecurity, Business, Compliance, or related field. 2+ years of experience in GRC, risk management, or compliance (preferably within SaaS or technology companies). Strong knowledge of SaaS compliance … certifications (CISM, CRISC, ISO 27001 Lead Implementer, or similar). Experience working with SaaS platforms (AWS, Azure, Salesforce, HubSpot, etc.). Familiarity with vendor risk management and third-party security assessments. Exposure to data privacy laws beyond GDPR (CCPA, UK-GDPR, HIPAA). Role Type Permanent or Contract London-based (Hybrid) or remote About Us Discover tailored data privacy More ❯
and proactive SaaS GRC Specialist to strengthen our Governance, Risk, and Compliance framework as we scale our SaaS operations. In this role, you will ensure that our business processes, security controls, and regulatory obligations are consistently met. You will work across multiple teams—security, legal, product, and operations—helping us maintain trust with customers and regulators while supporting … due diligence requests. Deliver GRC training and awareness sessions to employees across the business. Track regulatory changes and advise leadership on potential business impacts. Requirements Bachelor’s degree in InformationSecurity, Business, Compliance, or related field. 2+ years of experience in GRC, risk management, or compliance (preferably within SaaS or technology companies). Strong knowledge of SaaS compliance … certifications (CISM, CRISC, ISO 27001 Lead Implementer, or similar). Experience working with SaaS platforms (AWS, Azure, Salesforce, HubSpot, etc.). Familiarity with vendor risk management and third-party security assessments. Exposure to data privacy laws beyond GDPR (CCPA, UK-GDPR, HIPAA). Role Type Permanent or Contract London-based (Hybrid) or remote About Us Discover tailored data privacy More ❯
office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and Cyber Security and Risk posture. This role is key in building and improving Primark's Cyber Security posture. Duties & Responsibilities Actively progress and improve Primark's cyber security posture … and Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. InformationSecurity/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the … ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cyber security delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have More ❯
Shefford, Bedfordshire, South East, United Kingdom
Intercity Technology Limited
Tier 3) to play a key role in delivering, managing, and optimising our clients cloud and hybrid infrastructures. You will be responsible for ensuring the stability, performance, scalability, and security of mission-critical systems, with a primary focus on Microsoft Azure and associated modern workplace technologies. This senior-level position requires excellent troubleshooting skills, deep technical knowledge across cloud … and on-prem platforms, and a passion for automation and continuous improvement. You will also collaborate with architecture, security, and project teams to ensure operational excellence and long-term platform sustainability. The hours of work for this role are on a shift pattern Monday - Sunday, 7am - 7pm. Key Responsibilities as a Cloud Operations Engineer (Tier 3) : Operate, monitor, and … Proactively monitor system health, performance, and availability using Azure Monitor, Log Analytics, and other tools. Manage and optimise compute, storage, and networking resources. Apply and manage governance, compliance, and security policies across cloud estates. Execute backup, disaster recovery, and business continuity procedures. Systems Management & Optimisation: Maintain and troubleshoot Azure and hybrid cloud environments. Perform proactive monitoring, incident response, and More ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
IET
know you Is Imposter syndrome creeping in? Dont worry wed rather hear from you this time than not hear from you at all! Read on for a little more information about the role; but also, keep in mind that were open to discussing flexible ways of working, including reduced hours and working in an agile way, supported by a … platforms. Introduce and enhance self-service reporting capabilities for stakeholders across the organisation. Work closely with analytics and business teams to optimise data accessibility, usability, and quality. Collaborate with InformationSecurity to implement robust data security measures. Design and deliver advanced analytics and BI solutions using tools such as Power BI. Lead and develop the Data team … To find out more, head over to our Work for the IET site. By submitting an application for this role, you hereby consent to the processing of your personal information by iRecruit, our Applicant Tracking System tool, in accordance with applicable data protection laws and our privacy policy. Full information on our Recruitment Privacy Statement can be here More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications ? Desirable Skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
add value. Your purpose The Network Security Engineer supports the Lead Network Security Engineer in delivering the Network Security Roadmap. This role supports the implementation of Infosec-driven initiatives and acts as the second line of escalation for Network Security Incidents and ad hoc service and portfolio support requests. This role is accountable for establishing and … for the Global Network Team. Your role Support Network Security Roadmap: Assist in delivering the Network Security Roadmap. Subject Matter Expertise: Provide network subject matter expertise on Infosec-driven initiatives. Incident Escalation: Second line of escalation for network security incidents, as well as specific security Service and Portfolio Requests i.e. Meraki configuration and firewall changes. On … to assess complex technical problems and develop effective solutions. Expertise in troubleshooting and resolving network security-related issues. Ability to work closely with cross-functional teams, including architecture, infosec and regional implementation teams. Dedication to performing the role within recognised values and behaviours. More ❯
innovation, optimises our systems, and ensures smooth operations across The IN Group (TIG). We’re structured into five specialist areas: Infrastructure – keeping our tech ecosystem strong and reliable. InformationSecurity – ensuring our security measures are always effective. Service Delivery – running the Service Desk and resolving IT support issues. Product Development – optimising and enhancing our product pipeline. More ❯
innovation, optimises our systems, and ensures smooth operations across The IN Group (TIG). We’re structured into five specialist areas: Infrastructure – keeping our tech ecosystem strong and reliable. InformationSecurity – ensuring our security measures are always effective. Service Delivery – running the Service Desk and resolving IT support issues. Product Development – optimising and enhancing our product pipeline. More ❯
london (city of london), south east england, united kingdom
The IN Group
innovation, optimises our systems, and ensures smooth operations across The IN Group (TIG). We’re structured into five specialist areas: Infrastructure – keeping our tech ecosystem strong and reliable. InformationSecurity – ensuring our security measures are always effective. Service Delivery – running the Service Desk and resolving IT support issues. Product Development – optimising and enhancing our product pipeline. More ❯