Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
credentials. • Proven experience in managing security operations teams in a similar industry. • Familiarity with SOC2, PCI-DSS, ISO22301 and ISO27001 standards. Desirable Qualifications: • Bachelor’s or masters degree in CyberSecurity, Computer Science, Information Technology, or a related field • Cloud security qualifications such as ISC2 CCSP, CSA CCSK and AWS Security Speciality • ISO27001 Lead Implementor • Strong knowledge of cloud and on More ❯
ICT CyberSecurity Engineer An exciting new opportunity has opened up for an experienced ICT CyberSecurity Engineer to take on a key role within a dynamic and evolving organisation. This newly created position is focused on safeguarding all ICT systems and managing information security across the business. Location : Cardiff/St Athan Salary : £45,000 - £50,000 Contract Type … Permanent/Full-time (Monday - Friday) Key Responsibilities: CyberSecurity Oversight: Lead the implementation, maintenance, and enforcement of IT security policies and systems. Drive a proactive approach to threat detection and incident response to ensure robust protection of infrastructure. Advanced Technical Support: Act as a senior technical resource within the ICT team, providing 3rd and 4th line support across a … range of business-critical systems. Policy & Framework Development: Create and refine cybersecurity risk management policies and frameworks in line with recognised standards such as NIST, ISO 27001, and others. Documentation & Training: Maintain up-to-date security documentation and deliver regular cybersecurity awareness training across departments. Communicate relevant security updates and best practices throughout the organisation. Data Protection Compliance More ❯
ICT CyberSecurity Engineer An exciting new opportunity has opened up for an experienced ICT CyberSecurity Engineer to take on a key role within a dynamic and evolving organisation. This newly created position is focused on safeguarding all ICT systems and managing information security across the business. Location : Cardiff/St Athan Salary : 45,000 - 50,000 Contract Type … Permanent/Full-time (Monday - Friday) Key Responsibilities: CyberSecurity Oversight: Lead the implementation, maintenance, and enforcement of IT security policies and systems. Drive a proactive approach to threat detection and incident response to ensure robust protection of infrastructure. Advanced Technical Support: Act as a senior technical resource within the ICT team, providing 3rd and 4th line support across a … range of business-critical systems. Policy & Framework Development: Create and refine cybersecurity risk management policies and frameworks in line with recognised standards such as NIST, ISO 27001, and others. Documentation & Training: Maintain up-to-date security documentation and deliver regular cybersecurity awareness training across departments. Communicate relevant security updates and best practices throughout the organisation. Data Protection Compliance More ❯
Cardiff, Eglwys-Brewis, South Glamorgan, United Kingdom
Vibe Recruit
ICT CyberSecurity Engineer An exciting new opportunity has opened up for an experienced ICT CyberSecurity Engineer to take on a key role within a dynamic and evolving organisation. This newly created position is focused on safeguarding all ICT systems and managing information security across the business. Location : Cardiff/St Athan Salary : £45,000 - £50,000 Contract Type … Permanent/Full-time (Monday - Friday) Key Responsibilities: CyberSecurity Oversight: Lead the implementation, maintenance, and enforcement of IT security policies and systems. Drive a proactive approach to threat detection and incident response to ensure robust protection of infrastructure. Advanced Technical Support: Act as a senior technical resource within the ICT team, providing 3rd and 4th line support across a … range of business-critical systems. Policy & Framework Development: Create and refine cybersecurity risk management policies and frameworks in line with recognised standards such as NIST, ISO 27001, and others. Documentation & Training: Maintain up-to-date security documentation and deliver regular cybersecurity awareness training across departments. Communicate relevant security updates and best practices throughout the organisation. Data Protection Compliance More ❯
The CyberSecurity Architect will work closely with the solution architects and enterprise architects to improve and maintain the cybersecurity of NAVBLUE'S products, services and infrastructure. The ideal candidate will play a critical role in designing and implementing cybersecurity frameworks to align with the business objectives and mitigate potential threats. Main Responsibilities: Perform Security Risk and Threat analysis … regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor's degree in technical discipline Training and education in cybersecurity principles Experience: 5+ years of Security Architecture/Engineering, and/or Network architecture, and/or Security Operations and/or Experience in software development; software architecture an More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Ventula Consulting
Supporting audits, compliance reviews, and risk assessments Collaborating with internal teams and third-party partners to drive secure operations Ideal Candidate Profile: 5+ years in IT and/or cybersecurity roles Hands-on experience with Microsoft Sentinel and Defender Knowledge of Microsoft 365 and Azure security services (ideal but not essential) A recognised security qualification (e.g., CISMP, GSEC, Level 4+ More ❯
making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cybersecurity transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a … Secure Systems, Network & Cloud Security, System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP … in business growth and bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cybersecurity certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the UK CyberSecurity Council for Risk Management. IEng or More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
Global Risk & Brand Protection protects, preserves and enhances the Deloitte brand. We navigate the dynamic risk landscape across the areas of risk management, confidentiality & privacy, cybersecurity oversight, regulatory, independence & conflicts, and Anti-Corruption/financial crimes. We foster trusting relationships across the Deloitte network through collaboration, facilitation and responsive guidance. Connect to your career at Deloitte Deloitte drives progress. More ❯
Data Loss Prevention/DLP/Insider Threat Analyst required by Harrington Starr’s global client to play a key role in their CyberSecurity Engineering team. The role will play a key role in protecting the organisation from exposure to data loss/theft. Key accountabilities will include: Developing and administering DLP policies Perform analysis and triage of DLP … for Data Loss Prevention Regular usage of DLP tools such as Microsoft Purview In order to be suitable, you will need: Experience in a dedicated DLP role or a cybersecurity role with a heavy DLP focus. Hands-on experience of DLP policy, incident management, data protection and reporting Experience of Microsoft Purview, M365, and Proofpoint technologies Practical experience End More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Reed Technology
on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications * Proven experience in IT risk management, security governance, and compliance. * Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. * Experience in IT audit coordination and risk assessment methodologies. * Excellent communication and stakeholder management skills. * Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits * 10% discretionary performance related More ❯
information. DHCW runs or works with more than 100 services and delivers major national digital transformation programmes to support this. In addition, DHCW provides expert advice in relation to cybersecurity and information governance. We give frontline staff the digital tools which help them provide safer and more efficient care. We are also giving patients and the public digital tools More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Hays
security controls, governance, and incident response processes, while ensuring compliance across complex and sensitive technology environments. What you'll need to succeed Proven experience as a Business Analyst in cybersecurity, IT risk, or compliance-focused projects Strong understanding of cybersecurity principles, risk management, and regulatory compliance Experience working with or aligning to ISO27001, NIS Regulations, or similar standards would More ❯
Network & Infrastructure projects is essential alongside strong communication and stakeholder management skills. Ideally the Infrastructure Project Manager will have delivered a range of network and infrastructure project workstreams including - CyberSecurity, Network/Comms, Azure/Cloud/SaaS £550 a day Inside IR35 – via an accredited umbrella 6 month initial contract – extension highly likely - long term Programme Start Mid … of delivering network and infrastructure projects (Windows Server, Windows 10, O365, Telephony, Storage etc) A background of Data Centre migration projects Ideally have good knowledge of Network Security and Cybersecurity projects. Previous experience of Azure/Cloud/SaaS environments Defining deliverables, resource requirements and project plans Monitoring and managing project and stage progress Management of project budgets, documentation More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Reed Technology
on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications * Proven experience in IT risk management, security governance, and compliance. * Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. * Experience in IT audit coordination and risk assessment methodologies. * Excellent communication and stakeholder management skills. * Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits * Hybrid working * Generous annual More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Reed Technology
on IT governance, compliance, and risk mitigation strategies. Required Skills & Qualifications Proven experience in IT risk management, security governance, and compliance. Strong knowledge of ISO27001, GDPR, PCI-DSS, and cybersecurity frameworks. Experience in IT audit coordination and risk assessment methodologies. Excellent communication and stakeholder management skills. Desirable - Certifications such as CRISC, CISA, CISM, or CISSP Benefits Hybrid working Generous annual More ❯
3rd Line IT Support Engineer (CyberSecurity) Swansea £35,000 to £45,000 + Company Benefits, Company Bonus & Training Are you an 3rd Line IT Support Engineer looking to join a proactive company engaged in cybersecurity, partnered with the best-in-class vendors, providing industry leading solutions, all while using cutting edge technology at the forefront of the industry … Do you want to join a close-knit, fast growing company, that provides advanced cybersecurity solutions that is dedicated to the growth and personal development of all of its members, wherever they are in the world? On offer is the chance to join a company who invests in you. With professional development time every week, experienced tech experts to More ❯
Employment Type: Permanent
Salary: £35000 - £45000/annum Company Bonus, Company Benefits, Tra
3rd Line IT Support Engineer (CyberSecurity) Swansea £35,000 to £45,000 + Company Benefits, Company Bonus & Training Are you an 3rd Line IT Support Engineer looking to join a proactive company engaged in cybersecurity, partnered with the best-in-class vendors, providing industry leading solutions, all while using cutting edge technology at the forefront of the industry … Do you want to join a close-knit, fast growing company, that provides advanced cybersecurity solutions that is dedicated to the growth and personal development of all of its members, wherever they are in the world? On offer is the chance to join a company who invests in you. With professional development time every week, experienced tech experts to More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
CyberNorth
Benefits Annual leave Company pension Employee discount Paid volunteer time Tech scheme Full job description Job Title:Operational Risk Manager (IT and CyberSecurity - 6 months FTC) Working Pattern:Monday to Friday, 36.25 hours per week Salary:up to £60,000 FTE and benefits Location:Flexible, we support fully remote or hybrid working from any of our UK offices in … oversight, specifically IT and cyber risk oversight, in a financial services regulated environment or similar, and be able to advise senior stakeholders on the effective management of IT and CyberSecurity risks. Key responsibilities & accountabilities: Developing and implementing an independent oversight model for cyber and technology risks across Tandem Bank. Collaborating with colleagues across all three lines of defence to More ❯
ABOUT THE CLIENT: Our client is a Digital Transformation and a CyberSecurity Consultancy and are currently looking for a Solution Architect to join their dynamic team! They offer innovative digital and cybersecurity solutions to their clients who are from the public and private sectors. You’ll be working on interesting large-scale Government and private sector projects. ROLE … Architect with deep expertise in Dynamics 365 (D365), Power Platform, AI and Azure. This role is ideal for a professional who combines architectural leadership with a strong understanding of cybersecurity within the Microsoft ecosystem. The architect will play a pivotal role in designing secure, scalable solutions by leveraging Microsoft technologies to identify, assess, and mitigate security risks. Responsibilities include conducting … Senior Level – Experience in Microsoft stack with a history of working as a technical consultant or architect within a Microsoft Dynamics CE (CRM) environment. Hands on Power Platform Experience. CyberSecurity experience within Azure. Proven track record of Presales within a Consultancy. In depth understanding D365 CE and experience of working on full life cycle implementations across various versions of More ❯
technology landscape. This role is critical in driving improvements in risk mitigation, security controls, governance, incident response, and regulatory compliance. What you'll need to succeed - Proven experience managing cybersecurity or IT risk-related projects in complex or regulated environments. - Strong understanding of cybersecurity frameworks, risk management, and compliance requirements. - Experience working with or aligning to ISO27001, NIS Regulations, or More ❯
technology landscape. This role is critical in driving improvements in risk mitigation, security controls, governance, incident response, and regulatory compliance. What you'll need to succeed - Proven experience managing cybersecurity or IT risk-related projects in complex or regulated environments. - Strong understanding of cybersecurity frameworks, risk management, and compliance requirements. - Experience working with or aligning to ISO27001, NIS Regulations, or More ❯
be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the CyberSecurity Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to … In-depth knowledge of IAM principles, technologies, and best practices. Familiarity with IAM frameworks and standards. Strong analytical and problem-solving skills. Bachelor's or Master's degree in CyberSecurity, Information Technology or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling More ❯
be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the CyberSecurity Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to … In-depth knowledge of IAM principles, technologies, and best practices. Familiarity with IAM frameworks and standards. Strong analytical and problem-solving skills. Bachelor's or Master's degree in CyberSecurity, Information Technology or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling More ❯
be implementing IAM strategies, ensuring compliance with policies and managing access to resources effectively, this role significantly Key Responsibilities: Develop and implement a comprehensive IAM strategy aligned with the CyberSecurity Strategy. Design IAM architectures that support secure and efficient access controls across the business. Establish and enforce access governance policies and procedures. Conduct periodic access reviews and certifications to … In-depth knowledge of IAM principles, technologies, and best practices. Familiarity with IAM frameworks and standards. Strong analytical and problem-solving skills. Bachelor's or Master's degree in CyberSecurity, Information Technology or related field. (desired) Benefits: 25 days annual leave plus bank holidays which can be tailored to celebrations that reflect your beliefs Pension - 5% employee contribution, doubling More ❯
sprint commitments and customer expectations Who you'll work with Internal o Senior Product Owner o Technical Delivery Lead o Technical Architect o Solution Architect o Application Analysts • ITS CyberSecurity Team • All other business areas and support functions External • External bodies and stakeholders About you SCRUM Certified Product Owner Experience of working in agile teams Experience of working in More ❯