of Sonata One. This role is critical in protecting the confidentiality, integrity, and availability of our information systems and data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a Data Protection Officer, ensuring that data privacy and governance meet the high … regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain information security policies, standards, and procedures. Lead the organization's cybersecurity strategy, risk assessments, and security roadmap. Manage information security projects and initiatives across IT and business units. Collaborate with senior leadership to align security goals with business objectives. Lead risk assessments and threat … z2bz0 years of experience in information security, preferably in financial services. In-depth understanding of security frameworks (e.g., ISO/IEC 27001, NIST CSF, CIS Controls) and cybersecurity principles, practices, and regulatory requirements in the finance sector. Experience in security technologies such as firewalls, IDS/IPS, SIEM, encryption, and identity management. Experience with secure cloud computing platforms (e.g., Azure More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Certifications such as CISSP, CISM, OSCP, GIAC (preferred but not mandatory). Must be eligible for SC security clearance. Experience More ❯
architecture of the client's IT systems. The Security Architect will draw upon Enterprise Security Architecture or Security Solutions Architecture to: - Identify business objectives, user needs, risk appetite and cybersecurity obligations - Identify vulnerabilities, perform threat modelling, undertake risk assessment, evaluate the effectiveness of security controls - Verify and evidence alignment to 'Secure by Design' principles, corporate security policy/standards … documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. Standards and guidelines Assiting with the identification of identified risks and emerging cybersecurity vulnerabilities and threats. The subsequent analysis to quantify and lead risk mitigation plans Work with Service Management to ensure that partners and suppliers adhere to agreed standards, policies and … verify/evidence appropriate compliance and security KPIs Work closely with 1st, 2nd and 3rd lines of defence on all matters relating to cybersecurity, information assurance, cyber risk, data privacy including regulatory and compliance considerations Lead the development and enhancement of governance, risk and compliance aligned to policy, standards an industry good practice Ensure that continuous assessment, identification, analysis More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Smart DCC
events generated by our security tools. You will be joining an exciting and growing area and will be instrumental in supporting and advancing the operational security capabilities of the CyberSecurity Team. There will be opportunity to work on and establish new Security Projects, as well as provide an advisory role to other elements of the business on best practice. … The role will require establishing relationships with key stakeholders in Risk, Technology and Operations, as well as establishing yourself as a Subject Matter Expert (SME) for cybersecurity within the organisation. What will you be doing? Lead incident response for potential incidents identified, ensuring that incidents are correctly reported and documented in accordance with the relevant policies and procedures. Act More ❯
Category: Other EU work permit required: Yes Job Reference: f2624fb961fe Job Views: 6 Posted: 22.06.2025 Expiry Date: 06.08.2025 Job Description: Role Profile Reports to: Head of Infrastructure, Network and CyberSecurity Key Relationships: Digital Transformation and Tech, Retail, Facilities, 3rd Party Partners Location: Piccadilly, with occasional travel to all sites Role Purpose This role offers a strategic opportunity within the More ❯
financial environments. Required Qualifications Bachelor's or Master’s degree in Computer Science, Information Security, or a related technical field, or equivalent practical experience. 10+ years of experience in cybersecurity, with at least 3 years focused on cloud security architecture. 5+ years of experience in cloud security engineering, with a strong focus on Google Cloud Platform (GCP). Extensive experience More ❯
financial environments. Required Qualifications Bachelor's or Master’s degree in Computer Science, Information Security, or a related technical field, or equivalent practical experience. 10+ years of experience in cybersecurity, with at least 3 years focused on cloud security architecture. 5+ years of experience in cloud security engineering, with a strong focus on Google Cloud Platform (GCP). Extensive experience More ❯
environment, with physical hubs in New York, London, Singapore, Sweden and Cyprus. About the Role We are seeking a strategic and hands-on Head of InfoSec to lead our cybersecurity initiatives with a strong emphasis on governance, risk management, and compliance (GRC) . This role is critical in shaping and enforcing security policies, driving enterprise-wide risk management, and ensuring … as a trusted partner in navigating complex enterprise and regulatory expectations. Security Operations: Provide oversight and strategic direction for the Security Operations Center (SOC) . Monitor and respond to cybersecurity threats, incidents, and vulnerabilities. Ensure incident response and disaster recovery plans are current, tested, and effective. Implement and maintain security tools, processes, and technologies to protect data and infrastructure. Policy … organizational risk. Training & Awareness: Lead company-wide security awareness training programs. Foster a culture of security across all departments through education and engagement. Requirements 10+ years of experience in cybersecurity, with 5+ years in a senior leadership role (CISO, VP of Security, or equivalent). Deep knowledge of governance frameworks and compliance standards (e.g., SOC 2, ISO 27001, HIPAA, NIST More ❯
financial environments. Required Qualifications Bachelor's or Master’s degree in Computer Science, Information Security, or a related technical field, or equivalent practical experience. 10+ years of experience in cybersecurity, with at least 3 years focused on cloud security architecture. 5+ years of experience in cloud security engineering, with a strong focus on Google Cloud Platform (GCP). Extensive experience More ❯
Pension Scheme Death in service cover About UBDS Group At UBDS Group our mission is to support entrepreneurs who are setting new standards with technology solutions across cloud services, cybersecurity, data and AI, ensuring that every investment advances our commitment to innovation, making a difference, and creating impactful solutions for organisations and society. Equal Opportunities We are an equal opportunities More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
KX
KX Belfast, Northern Ireland, United Kingdom Join or sign in to find your next job Join to apply for the Information Security Analyst role at KX KX Belfast, Northern Ireland, United Kingdom Join to apply for the Information Security Analyst More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
Job Description Location/s: Newcastle Recruiter contact: Nikki George Mott MacDonald is a global engineering, management, and development consultancy with over 20,000 employees across more than 50 countries and 140+ offices. We work across various industries, delivering impactful More ❯
Job Title: CyberSecurity ManagerLocation:Wiltshire, United Kingdom (with some travel required)Salary:£62,000 - £73,000 (depending on experience) + Bonus + Excellent BenefitsClearance:Must be a British National and SC Cleared or EligibleAbout the Role:We are seeking a highly skilled and motivated CyberSecurity Manager to lead and enhance our cybersecurity posture. This is a pivotal … work closely with the Security Operations Centre (SOC), senior stakeholders, and cross-functional teams to maintain a robust security framework aligned with industry best practices.Key Responsibilities:* Lead and manage cybersecurity incidents, ensuring timely resolution and root cause analysis.* Oversee the implementation and maintenance of InfoSec and CyberSecurity compliance and assurance programs.* Ensure alignment with ISO 27001, NIST, and … risks, strategies, and progress.* Stay current with the evolving threat landscape and emerging technologies.* Support audits and regulatory inspections as required.Essential Skills & Experience:* Proven experience in incident management and cybersecurity operations.* Strong knowledge of ISO 27001, NIST, and other security frameworks.* Experience with governance, risk, and compliance (GRC) processes.* Familiarity with Security Operations Centres (SOC) and threat detection tools. More ❯
Job Title: CyberSecurity Manager Location: Wiltshire, United Kingdom (with some travel required) Salary: £62,000 - £73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible About the Role: We are seeking a highly skilled and motivated CyberSecurity Manager to lead and enhance our cybersecurity posture. This … closely with the Security Operations Centre (SOC), senior stakeholders, and cross-functional teams to maintain a robust security framework aligned with industry best practices. Key Responsibilities: * Lead and manage cybersecurity incidents, ensuring timely resolution and root cause analysis. * Oversee the implementation and maintenance of InfoSec and CyberSecurity compliance and assurance programs. * Ensure alignment with ISO 27001, NIST, and … strategies, and progress. * Stay current with the evolving threat landscape and emerging technologies. * Support audits and regulatory inspections as required. Essential Skills & Experience: * Proven experience in incident management and cybersecurity operations. * Strong knowledge of ISO 27001, NIST, and other security frameworks. * Experience with governance, risk, and compliance (GRC) processes. * Familiarity with Security Operations Centres (SOC) and threat detection tools. More ❯
Job Title: CyberSecurity Lead Location: West Midlands, United Kingdom Salary: 62,000 - 73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible About the Role: We are seeking a proactive and experienced CyberSecurity Lead to drive and enhance our organisation's cybersecurity strategy. This is a … You will work closely with the Security Operations Centre (SOC), senior stakeholders, and cross-functional teams to maintain a secure and resilient environment. Key Responsibilities: Lead the response to cybersecurity incidents, ensuring timely resolution and root cause analysis. Oversee the development and implementation of information security compliance and assurance programmes. Ensure alignment with ISO 27001, NIST, and other relevant … strategies, and progress effectively to stakeholders. Stay informed on emerging threats, technologies, and regulatory changes. Support internal and external audits and regulatory inspections. Essential Skills & Experience: Proven experience in cybersecurity operations and incident management. Strong knowledge of ISO 27001, NIST, and related frameworks. Experience with GRC processes and tools. Familiarity with SOC operations and threat detection technologies. Excellent understanding More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate about cybersecurity, threat detection, and investigative analysis. Key Responsibilities 🔍 Advanced Incident Detection & Response Lead the investigation and resolution of complex cyber incidents, including APTs, malware outbreaks, and data breaches. Take charge of … teams to manage regulatory reporting during security incidents. Your Profile 🔑 Essential Skills & Experience: Bachelor’s degree in Computer Science, Information Security, or a related field. 6–8+ years in cybersecurity with a focus on incident response and threat hunting. Proven experience investigating APTs, ransomware, and data exfiltration attempts. Deep knowledge of SIEM platforms (e.g., Splunk, LogRhythm, ArcSight) and EDR solutions. More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Focus on SAP
response efforts, conduct proactive threat hunting, perform digital forensics, and collaborate cross-functionally to safeguard our digital assets and infrastructure. This is a pivotal role for those passionate about cybersecurity, threat detection, and investigative analysis. Key Responsibilities Advanced Incident Detection & Response Lead the investigation and resolution of complex cyber incidents, including APTs, malware outbreaks, and data breaches. Take charge of … teams to manage regulatory reporting during security incidents. Your Profile Essential Skills & Experience: Bachelor’s degree in Computer Science, Information Security, or a related field. 6–8+ years in cybersecurity with a focus on incident response and threat hunting. Proven experience investigating APTs, ransomware, and data exfiltration attempts. Deep knowledge of SIEM platforms (e.g., Splunk, LogRhythm, ArcSight) and EDR solutions. More ❯
Management) Skills as needed to perform testing of application controls (e.g., BC/DR, Application Security Testing, Interface Controls) Skills as needed to perform testing of information security and cybersecurity controls (e.g., Vulnerability Management … Incident Response, Network Security) Analytical and organizational skills are necessary to conduct audits Strong issue writing and workpaper documentation skills Knowledge and awareness on NIST 800-53 controls, NIST CyberSecurity Framework, SANS and Center for Internet Security (CIS) is a plus Knowledge of technology controls around Cloud Computing reviews - AWS, Azure and Google cloud is a plus Knowledge of More ❯
improve IAM focused standards and procedures to ensure secure and efficient management of user identities and access. Manage user access to systems, applications, and data, ensuring compliance with IT Cybersecurity standards. Identify gaps or potential improvements in the IAM landscape. Prepare responses to risk assessments and audits that identify and mitigate potential IAM risks. Participate in security IAM incident investigations … KPI and KRI metrics and reports for executive management. Create IAM presentations for an executive audience. Build business cases for any new capabilities or solutions needed. Collaborate with the Cybersecurity and solution architects to create and maintain the IAM strategy and roadmap. What you will bring: Minimum of 10 years of experience in IT or Security, with at least … management role overseeing IAM programs. Professional certification such as Certified Identity and Access Manager (CIAM) or Certified Identity Management Professional (CIMP), CISSP, or CISM is highly desirable. Experience with cybersecurity frameworks and standards, such as NIST, ISO 27001, or similar. General understanding of operational risk and risk-related control frameworks and practices such (ISO 27001, NIST SP 800-53, NIST More ❯
Head of Cybersecurity Salary £60 - 70k 3 days on site per week in London Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies, implementing security solutions, and managing risks while ensuring compliance with … line management responsibilities, needing a bridge between the business and technical, overseeing with technical knowledge but not hands on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic … investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations, and best practices. Essential Requirements More ❯
Head of Cybersecurity Salary £60 - 70k 3 days on site per week in London Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies, implementing security solutions, and managing risks while ensuring compliance with … line management responsibilities, needing a bridge between the business and technical, overseeing with technical knowledge but not hands on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic … investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations, and best practices. Essential Requirements More ❯
Social network you want to login/join with: Public or Higher education experience is beneficial An established institution is seeking a Head of Cybersecurity to oversee its cybersecurity operations and establish a robust enterprise security strategy. This role will be instrumental in developing policies, implementing security solutions, and managing risks while ensuring compliance with industry standards and best practices. … line management responsibilities, needing a bridge between the business and technical, overseeing with technical knowledge but not hands on, focusing on stakeholder engagement. Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic … investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat detection and response. Collaborate with internal stakeholders and external agencies to maintain a strong security posture. Provide cybersecurity training and guidance to staff and students. Lead cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations, and best practices. Degree in More ❯
assets through proactive security measures, advanced threat intelligence, and world-class support. Join a dynamic, innovation-driven team where your skills make a real impact. Your Mission: As a CyberSecurity Engineer, you’ll take charge of designing and implementing advanced security systems, supporting clients in improving their security posture, and staying ahead of emerging cyber threats. You’ll play … and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We’re Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms More ❯
assets through proactive security measures, advanced threat intelligence, and world-class support. Join a dynamic, innovation-driven team where your skills make a real impact. Your Mission: As a CyberSecurity Engineer, you’ll take charge of designing and implementing advanced security systems, supporting clients in improving their security posture, and staying ahead of emerging cyber threats. You’ll play … and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We’re Looking For: A degree in Cybersecurity, IT, or equivalent experience. 4+ years in a cybersecurity role, preferably within an MSP or fast-paced environment. Strong hands-on experience with SIEM, EDR, VPNs, firewalls, and cloud platforms More ❯