Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
John Lewis Partnership
Apply on JLP Jobs - the official careers website for John Lewis Partnership, John Lewis & Partners, and Waitrose & Partners. About the role Join the InformationSecurity Engineering team at John Lewis Partnership to help build a secure future for an iconic brand. We work to protect our customers, Partners, and business against an ever-evolving cyber threat landscape.The John … Lewis Partnership's InformationSecurity strategy is bold and ambitious. We provide a collection of security services, delivered via people, processes and technology. Working collaboratively, these services ensure that customers can shop with us efficiently, safely and securely, every single day.Our Threat Defence team is at the forefront of our cyber resilience, proactively monitoring threats, identifying vulnerabilities … and engineering robust security defences.As we expand our Security Engineering service, you'll be instrumental in developing cutting-edge capabilities and empowering our Security Operations Centre to stay ahead of the latest threats.This is a great opportunity to directly shape our security posture, getting hands-on with next-generation cyber security tools. You'll thrive More ❯
Software Security Engineer Department: Tech - Security Employment Type: Permanent - Full Time Location: Oxford, UK Reporting To: Head of InformationSecurity Description Are you ready to raise the bar on cyber security and contribute to making our flagship products cyber resilient? We are looking for a Security Engineer to join our InformationSecurity team at our Oxford headquarters. You will be working across software engineering, modelling, and data science bringing your full self, including your security knowledge and expertise to the business. As a Security Engineer at Aurora Energy Research, you will enable our colleagues to improve our secure software development lifecycle, ensure secure operational practices, and support compliance. You … on getting smart ideas into the hands of your colleagues. You enjoy working simultaneously on various initiatives and moving between teams. You will become part of a top-notch informationsecurity team who love solving difficult problems. By joining our InformationSecurity team, you will be part of something big and meaningful: help protect our brand More ❯
South Central Ambulance Service NHS Foundation Trust
Job summary An exciting opportunity has arisen within the Digital Senior Leadership team at South Central Ambulance Service for a Head of Cyber Security (HCOS). We are looking for an enthusiastic, highly motivated, and flexible individual with excellent leadership, technical, interpersonal, communication and organisational skills to lead the Cyber Security Team responsible for safeguarding the Trust's … information, physical assets and cyber infrastructure. Strong stakeholder relationships are vital to this role, both within the trust and with external partners. With a proven track record in management and leadership, you will provide guidance, direction and mentorship to the team and help to develop junior members of staff in their careers. Alongside these responsibilities, it will be important … be Northern House, Bicester. However, ability to attend SCAS sites as required is an important element of the post'. Main duties of the job The Head of Cyber Security (HCOS) will develop, implement and oversee the Trusts cyber security policies, procedures, and strategies. The post holder has operational responsibility for the management of the Cyber SecurityMore ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Cognibox
InformationSecurity Lead Auditor Department: Audit Employment Type: Permanent Location: Reading, UK Reporting To: Regional Operations Manager Description Please note, that a full driving licence is required as this is a field-based role. Join our growing Lead Auditor teams across the UK! At ISOQAR, we draw on our experience, knowledge, and ambition to empower organisations to achieve … solutions, the Alcumus Group helps organisations increase resilience and manage risk, protecting its customers, workforce, stakeholders, and the environment. Due to our continued growth, we are seeking professionals within informationsecurity to join our expanding Lead Auditor teams who support a breadth of clients across the UK . With onsite practical experience and deep knowledge of industry processes … embark on a 12-week training programme, including classroom and onsite learning with a Senior Lead Auditor to achieve your Lead Auditor qualifications within Quality Management Systems (9001) and InformationSecurity Management Systems (27001). What that means day to day The life of a Lead Auditor is both fun and varied, and no two days are the More ❯
Snelshall West, Milton Keynes, Buckinghamshire, England, United Kingdom
DS Smith
About the role Here at DS Smith, a multi-national sustainable packaging provider, we are looking for a Security Assurance Analyst to join our growing Security Team. The mission of the I&T Digital Security organisation is to deliver an efficient and effective service that has scalability and flexibility to support the demands of a FTSE … business.Supporting Head of InformationSecurity Architecture and Assurance as well as working closely with key stakeholders including Head of Governance, Risk and Compliance, Digital Security, IT and business teams you will focus on core areas such as risk management and security due-diligence reviews ensuring compliance with legal, regulatory and relevant security policies and best … practices.In this position you will provide assurance and guidance that the security features, practices, procedures, and architecture of an information system accurately mediates and enforces the security policies.Visibility and the ability to build close working relationships with Information & Technology (I&T) team members, business stakeholders as well as external partners is essential. This will require some More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of Cyber Security Consultant sits within the Cyber Security team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and … policy and standards. In this role you will have a broad and challenging remit, you will therefore need to be flexible and agile in your approach, switching between different security disciplines within the team as necessary. You will be engaging in the delivery of multiple business initiatives by introducing baseline and enhanced security requirements and supporting their implementation … through guidance and advice. You will also be recommending security solutions and then providing design input and technical approvals, assurances, and governance of deliveries that the project carries out with our colleagues and partners. Within the Security team itself you will be expected to collaborate with the wider team and security colleagues providing technical support and guidance More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As the Critical Asset and Classification Lead , you will be part of the InformationSecurity team, focused on identifying, managing, and protecting Thames Water's most critical data assets, often referred to as "crown jewels." This role will also lead the development and implementation of data classification methodologies to ensure appropriate protection based on sensitivity and importance. The … you'll be doing as the Critical Asset and Classification Lead: Critical Asset Framework Development: Lead the development and ongoing refresh of the framework for identifying and protecting critical information systems and data assets. Data Classification Methodology: Design and implement methodologies to classify data assets based on sensitivity, criticality, and business importance. Security Controls Monitoring: Assign and monitor … appropriate security controls aligned with system criticality and data classification standards. Asset Register Management: Maintain and periodically review registers for both critical information systems and information assets. Cross-functional Collaboration: Collaborate with business and digital teams to identify, score, and categorise critical assets and ensure alignment with strategic security objectives. Compliance & Best Practice: Ensure data classification More ❯
value everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 Create & Maintain an informationsecurity management system (ISMS) capable of demonstrating compliance against internal security requirements and external commitments including certification and regulatory requirements. Provide subject matter expertise in the application … to any new or existing programme of work. Prepare and support internal and/or external compliance audit activities. Manage remediation of any audit (internal & External) non-conformities. Ensure security policies (on a risk-based approach) are produced, signed off by relevant stakeholders, published, and communicated. Also, ensure that policies are managed throughout their lifecycle and updated through yearly … or ad-hoc reviews. Produce relevant security standards documentation in consultation with Technical teams. Lead on providing information to Three UK Customers (B2B) regarding Three UK's security practices. Support proactive and effective oversight of technology and security risk management frameworks, methodologies, processes, assurance, remediation, and reporting activities across the company. Assist in designing, building, and More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Our client, a leading global organization, is partnering with a prestigious end client based in Reading. Were excited to offer an outstanding opportunity for a Security Architect with strong background in financial services to join a dynamic team on an initial 6-month contract. If you are interested and have the relevant skills and experience, please apply promptly to … discuss further. Location: Reading, UK (Hybrid 4 days onsite) Contract Duration: 6 Months Rate: £700 - 750 Inside IR35 About the Role We are seeking an exceptionally experienced Security Architect to join a major transformation programme in the financial services sector . This is a hands-on, strategic role that involves shaping cloud security architecture, influencing senior stakeholders, and … helping build secure, resilient systems in one of the most tightly regulated industries in the world. Why This Role is Unique Step into a mission-critical role influencing the security posture of a major financial player. Collaborate on high-scale, multi-cloud projects using cutting-edge technologies (AWS, Azure, GCP). Be part of a forward-thinking environment focused More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
Bracknell, Bracknell Forest, Berkshire, United Kingdom
Jam Management Consultancy ltd
teams build out, document and follow clear procedures, tracking evidence to demonstrate compliance. Coordinating audits and keeping records of key business processes. Driving awareness and training around data privacy, informationsecurity, and wider compliance responsibilities. Working closely with the People Team to ensure all staff stay trained and informed on relevant standards across Quality, Security, Environmental and … Privacy frameworks. Continuous Improvement Acting as a key support to the Chief InformationSecurity Officer (CISO) to nurture a culture of continuous improvement. Identifying opportunities to refine or enhance quality systems and business compliance practices. Certifications & Risk Management Taking ownership of certification activities such as ISO 9001, ISO 14001, ISO 22301, ISO 27001 and PCI-DSS. Coordinating internal … mindset with strong attention to detail. Strong written and verbal communication skills. Confidence working across departments and engaging with auditors and certification bodies. A genuine passion for business improvement, security and compliance. Why this opportunity? Our client is a values-led organisation where compliance isn’t just about box-ticking, it’s about protecting trust, supporting innovation, and leading More ❯
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Robert Half
Working with a scaling business in Oxford to recruit a permanent Software Security Engineer to join the InformationSecurity team. This is a newly created role working across software engineering, modelling and data science teams. This is a role to enable the business to improve their SDLC processes through creating robust and resilient security operations. This … is a permanent role with hybrid working, looking for someone to be in the office 3 days a week in Central Oxford. The Role Build secure products - ensure security is considered throughout the product and software development lifecycle Provide security best practice, build security design patterns, complete security architecture reviews Support on-going BAU software development … processes and champion vulnerability management Provide internal security consultancy and lead on audit engagements, risk activities Skills & Experience Understanding of securing micro-service architectures Working knowledge of modern secure SDLC practices - embedding security into CI/CD piplines Understanding of application security principles (OWASP top 10, OWASP ASVS) AWS, GCP or Azure knowledge Previous experience in software More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
N Consulting Limited
Possibility of remote work: Hybrid, 2 days/week WFO Contract duration: 3 months Location: Reading, UK - JOB DETAILS Role Title: Oracle Cloud Security Consultant Required Core Skills: Oracle Cloud Eco System/Security Services Minimum years of experience: 10+ years Detailed Job Description: • Extensive experience in Cloud Security services, Cybersecurity, InformationSecurity • Expertise in … designing, implementing, and managing robust security solutions across the Cloud ecosystem • Ability to Lead the team and perform the role of Design and Architect. • Expertise in Project Management, Client Management and vendor Management • Ability to lead business transformation and digital strategy initiatives • Expertise in enhancing operations and customer engagement More ❯
office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and Cyber Security and Risk posture. This role is key in building and improving Primark's Cyber Security posture. Duties & Responsibilities Actively progress and improve Primark's cyber security posture … and Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. InformationSecurity/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the … ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cyber security delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have More ❯
performance metrics and ensure effective issue resolution in collaboration with internal teams. Work with project managers and engineers to deliver successful IT projects such as hybrid cloud setups, network security, and software deployments. Advocate for clients within the organisation, leveraging ITIL frameworks and service management tools to escalate and resolve concerns. Account Growth & Opportunity Identification Use data analytics and … team. Mentorship Mentor Account Managers on technical alignment appropriate to their accounts. Work with the Director of Sales Ops & Customer Success to maintain and optimise the tech stack. Compliance & Security Maintain a solid understanding of InformationSecurity Management Systems (ISMS) and ensure compliance with data protection policies and regulations. About you: Experience: Proven experience as a strategic More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development, you'll be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready … Issue detailed reports outlining findings, risks, and recommendations for remediation. • Translate complex technical findings into actionable insights for both technical and non-technical audiences. • Stay updated with the latest security trends, tools, and techniques. • Participate in research and development projects. • Focus on your development by attaining industry recognised certifications. • Be available for occasional on-call duties and on-site More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … Tester - Application (CCT APP), Cyber Scheme Team Leader (CSTL) infrastructure (CSTL-INF) or Web Application (CSTL-Web App). Eligibility : Right to work in the UK and eligibility for security clearance. Key Attributes Analytical thinker with a proactive, detail-oriented approach. Excellent verbal and written communication skills Ability to work effectively under pressure Commitment to maintaining the highest ethical More ❯
following ITIL processes: Business Relationship Management Demand Management Design coordination Change Evaluation Change Management Release and Deployment Management Service Validation and Testing Plus actively support the IT team in InformationSecurity Management KNOWLEDGE, EXPERIENCE, QUALIFICATIONS Bachelor's degree in computer science, business administration, or a related field. Proven industry experience working as an IT Business Analyst Solid track More ❯
Jam Management Consultancy Limited T/A JAM RECRUITMENT
procedures, and processes are clear, performance-oriented, and fully documented. Lead the coordination and documentation of internal audits on key processes. Support training and awareness activities in line with InformationSecurity and Data Privacy standards. Collaborate with the People Team to ensure ongoing colleague training across quality, security, environmental and privacy standards. Continuous Improvement Support the CISO … communicator with strong written and verbal skills. A collaborative, organised and proactive approach with the ability to meet multiple deadlines. Creative problem solver with a genuine interest in data security and regulatory affairs. More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Ultromics
to refine clinical and scientific messaging in marketing and customer engagement. Assist with review of internal research policy, procedures, analytical and data management code, and scientific communication. Follow good information governance practice throughout this job role and ensure compliance with Ultromics' informationsecurity and data protection policies in all applicable assigned tasks. This list of duties is More ❯
in new and exciting ways. Responsibilities Description of Role ROLE SUMMARY: Our customer specialises in the design, build and operation of high integrity data centres, developed to provide optimum security and availability of services within anyone of its key data centre locations at Corsham and Farnborough. By joining our 'Enterprise' operational team as a Fibre and Copper Engineer you … all Add/Moves/Changes (A/M/C) are approved, correctly recorded, labelled and reported correctly. Adhering to compliance requirements for Health and Safety, Environmental, Quality, InformationSecurity and Data Protection relevant to your job, function and location. Qualifications For development purposes the following knowledge, skills and experience are required. SKILLS AND EXPERIENCE: Ability to … complete tasks safely and to the highest standards within given timescales Customer focussed individual with a proactive and flexible approach to working A requirement for the role is SC Security Level Clearance check. Existing SC Clearance level and security checks advantageous however will be facilitated for the right candidate. COMPANY VALUES: At North we embrace the following values More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date on the latest cyber threats and technologies Requirements: Essential: Experience in informationsecurity or networking Understanding of network protocols (e.g. TCP/IP, DNS) Strong communication and client-facing skills A proactive, problem-solving mindset Fluent in written and spoken … evenings/weekends for planned exercises (not a 24/7 role) Desirable: Degree or equivalent experience Previous consulting or technical client-facing experience Background in SOC, Pen Testing, InfoSec, or Systems Admin Knowledge of BGP, WAF, CDN, or cloud platforms (AWS, Azure, GCP) Basic scripting (e.g. Python, Bash) for automation or analysis Please note that at times due to More ❯
your expertise in cutting-edge cybersecurity solutions. Location UK, Milton Keynes What we are looking for We are looking for candidates who meet the following criteria: Proven experience in informationsecurity or computer networking Solid understanding of network protocols such as TCP/IP and DNS Strong communication skills and a proactive, consultative mindset Ability to inspire clients … and lead them toward improved security posture Demonstrated adaptability and eagerness to learn Excellent command of English, both written and spoken Willingness to work occasional nights and weekends for scheduled DDoS simulations or incident response (note: this is not a 24/… shift-based role) Desirable Qualifications and Experience Experience in a client-facing technical or consulting role Background in one or more of the following areas: SOC, Pen Testing, InfoSec, Networking, Systems Administration Knowledge of cybersecurity concepts including BGP, WAF, and CDN Familiarity with cloud platforms (AWS, Azure, GCP) Scripting abilities (e.g., Python, Bash) for automation or data analysis More ❯
role within afast-paced and dynamic environment, focused on the support, troubleshooting, and continuous improvement. Due to the customer requirements successful applicants must be eligible for high level UK Security clearance and DV. Location: Reading The successful candidate will join a highly skilled team of support engineers providing technical infrastructure support. The role will require a flexible working ethic … the development of technical solutions. Participates as part of a team and maintains good relationships with team members, internal DXC Teams and customers. Uses knowledge tools and re- uses information for the benefit of projects, and of professional development. Education and Experience required: Bachelors degree in Computer Science, Engineering, or related field or equivalent work experience. professional-level certification … Identity and Access Management service support Active Directory Active Directory Federation Services (ADFS) Lightweight Directory Access Protocol (LDAP) Privileged Access Management principles knowledge and experience Multi Factor Authentication principles InformationSecurity principles Windows Server 2003 to 2022 Group Policy Windows PKI DFS Microsoft Clustering Great customer service Good understanding of networks and Domain Structure What We Will Do More ❯