Manager) CISA (Certified Information Systems Auditor) ISO 27001 Lead Auditor/Implementer CRISC (Certified in Risk and Information Systems Control) GDPR Certification (e.g., IAPP CIPP/E, CIPM for dataprotection compliance) Experience Requirements: 3-5+ years of experience in Information Security, Compliance, or IT Risk Management. Experience with regulatory frameworks in UK & EU : GDPR (General DataProtection Regulation) ISO 27001 (Information Security Management Systems) Cyber Essentials Plus (UK government-backed security framework) DORA (Digital Operational Resilience Act) - EU financial sector PCI-DSS (if handling payment data) Experience in: Managing vendor risk assessments for third-party compliance. Handling incident response & reporting (e.g., Data Breach Notifications under GDPR). Key Skills & Technical Knowledge: Deep … understanding of dataprotection laws (UK GDPR, EU GDPR, DPA 2018) . Familiarity with risk management frameworks like NIST CSF, CIS Controls, and ISO 27005 . Experience with cyber security tools (e.g., SIEM, Malware Protection, Firewalls and others) is a plus. Strong reporting and communication skills-ability to brief executives and regulators. Ability to design, implement, and More ❯
data. The ideal candidate will have a deep understanding of cybersecurity threats, risk management frameworks, regulatory compliance, and modern security technologies. This role also includes responsibilities typical of a DataProtection Officer, ensuring that data privacy and governance meet the high regulatory standards of the financial sector. Responsibilities: Strategic Management and Security Operations Develop, implement, and maintain … goals with business objectives. Lead risk assessments and threat modelling exercises for internal systems and third-party services. Manage the deployment and maintenance of security solutions (SIEM, firewalls, endpoint protection, DLP, etc.). Oversee the organization's incident response and business continuity plans, including simulations and real-time responses. Conduct regular security audits and work with internal/external … secure systems development and operations. Compliance & Risk Management Ensure compliance with regulatory and legal security requirements (e.g., ISO 27001, NIST, HIPAA, GDPR, SOX, etc.). Ensure compliance with applicable dataprotection laws (e.g., GDPR, CCPA, GLBA). Guide DataProtection Impact Assessments (DPIAs) for high-risk financial data processing activities. Work closely with Legal, Risk More ❯
ITG) Talent Acquisition Manager - Technology at Inspired Thinking Group (ITG) We are looking for an enthusiastic and detail-oriented Senior Security Analyst to join our growing information security and dataprotection team. The Role: The Senior Security Analyst is an experienced security professional responsible for performing more advanced security and dataprotection tasks with a higher … level of autonomy. In this role, you will be responsible for conducting comprehensive security and dataprotection assessments, overseeing vulnerability management, developing and updating security and dataprotection policies, reviewing configurations, and providing expert guidance to the organization. You will be expected to operate with minimal supervision and mentor junior analysts as needed. This is a … able to progress to a fully funded level 7 qualification (MSc) in Cyber Security. Responsibilities: KPI Reporting & Metrics Analysis: Lead the accurate tracking of KPIs related to security and dataprotection performance and risk management. Analyse data to identify trends, areas of improvement, and potential security and dataprotection risks. Prepare detailed reports for management More ❯
Overseeing, educating and assessing the implementation of Digital Safety policies, associated security standards and security NFRs ensuring they are effectively embedded within the organisation. Overseeing processes to safeguard company data throughout all processes and systems, working with Digital Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with … found. Collaborating with other teams and departments to foster a culture of security and awareness within the organisation. Delivering training sessions and workshops to staff on cyber security and protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas … for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding of dataprotection, cyber security, privacy and confidentiality. Detailed understanding of the importance of access control in the protectionMore ❯
stakeholders, ensuring that security solutions align with business objectives and regulatory requirements. Your expertise in cybersecurity technologies will drive the development of secure solutions, incorporating identity and access management, dataprotection, network security, and compliance strategies. You will also ensure seamless integration of these security measures within existing systems while staying ahead of industry trends and emerging threats. … security from the ground up. Security Assessment & Planning : Identify and mitigate security risks, ensuring regulatory compliance. Identity & Access Management : Implement RBAC, MFA, and IAM solutions to safeguard sensitive data. DataProtection & Encryption : Protect data at rest, in transit, and in use through encryption and tokenization. Network Security : Design secure network architectures, implement IDS/IPS, firewalls, and … paid days for volunteering/charity work Work Visa and Relocation Assistance : Support for international talent, including visa sponsorship and relocation assistance Private Medical Insurance : Optional family cover Income Protection & Life Insurance Pension Scheme : Optional Wella Pension Scheme Employee Assistance Programme (EAP) Staff Discounts : Up to 80% discount on hair products and 50% off GHD products Gym Benefits Enhanced More ❯
Overseeing, educating and assessing the implementation of Digital Safety policies, associated security standards and security NFRs ensuring they are effectively embedded within the organisation. Overseeing processes to safeguard company data throughout all processes and systems, working with Digital Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. Working with … found. Collaborating with other teams and departments to foster a culture of security and awareness within the organisation. Delivering training sessions and workshops to staff on cyber security and protection of data-in-use related topics to ensure understanding and compliance. Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas … for concern or improvement. Support during security incidents to work to minimise cyber-attack or understand data loss. KEY SKILLS Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. Detailed understanding of dataprotection, cyber security, privacy and confidentiality. Detailed understanding of the importance of access control in the protectionMore ❯
Overseeing, educating and assessing the implementation of Digital Safety policies, associated security standards and security NFRs ensuring they are effectively embedded within the organisation. · Overseeing processes to safeguard company data throughout all processes and systems, working with Digital Safety, Data Teams, IT operations and our IT teams to minimise data breaches or data leaks. · Working with … found. · Collaborating with other teams and departments to foster a culture of security and awareness within the organisation. · Delivering training sessions and workshops to staff on cyber security and protection of data-in-use related topics to ensure understanding and compliance. · Preparing reports on Technical Assurance activities performed and presenting them to management and stakeholders, highlighting any areas … for concern or improvement. · Support during security incidents to work to minimise cyber-attack or understand data loss. Requirements of the Role KEY SKILLS · Technical cyber security knowledge and practical experience of cloud computing technologies e.g. AWS, GCP and Azure. · Detailed understanding of dataprotection, cyber security, privacy and confidentiality. · Detailed understanding of the importance of access More ❯
Information Security and Governance in the delivery of the Information Security and Governance (ISG) activities of the Trust providing assurance that the security, confidentiality and integrity of systems and data is maintained. Support the delivery of projects to achieve both CareCERT, Cyber Essentials and the Digital Security and Protection Toolkit (DSPT) accreditation for the Trust and implement processes … maintenance of this accreditation & provide support in the day-to-day management of information security and governance service provision to all users ensuring the Trust’s compliance with the DataProtection Act 1998, Access to Health Records Act 1990, Freedom of Information Act and those regulations that supersede or supplement these from time to time. Interpret complex legislation … or regulations related to information governance and information security such as ISO/IEC 27001, the DataProtection Act 1998, NHS Information Risk Management, Computer Misuse Act, implementing and enforcing suitable and relevant information security policies and procedures across the Trust. The role will include supporting the implementation and development of systems, policies and procedures which comply with More ❯
Onetrace Great products start with great people. Our relentless focus on user experience has been the cornerstone of our growth, helping us become the market leading software for fire protection subcontractors across the UK. We've grown by staying obsessed with building software that actually works for the subcontractors on the ground; fast, intuitive, and simple to use. We … our journey? Check out our LinkedIn page. About the Role We're looking for an Information Security Manager to lead the systems, practices, and frameworks that protect Onetrace's data, people and infrastructure as we grow. This is a cross-functional, hands-on role with a strong strategic lens -you'll own our information security posture end-to-end … You'll proactively manage risks and help create a secure environment where teams can move fast without compromising on trust or safety. You'll also guide how we approach dataprotection, tooling configuration and technical policy, embedding scalable and secure practices across our operations. This is an opportunity to build on strong foundations and shape the future of More ❯
timely manner. The post-holder will be responsible for the co-ordination of all relevant policies and procedures and for recommending changes to ensure the maintenance of compliance with DataProtection legislation across King's College Hospital. Main duties of the job To use their specialist knowledge to provide advice and training around IG, including Freedom of Information … FOI), Dataprotection (DP), information rights and Confidentiality. To make recommendations for the provision of clear and accessible guidance to all staff groups and to ensure the organisation meets both its statutory and legal obligations. To take a solution focused approach to IG encouraging a culture of identifying opportunities and designing systems and services in a way that … complies with DataProtection legislation, ensuring that the implementation of the service is achieved in a practical and supportive way and that IG is not perceived as an obstacle or blocker. About us King's College Hospital NHS Foundation Trust is one of the UK's largest and busiest teaching Trusts with a turnover of c£1.8 billion More ❯
City of Westminster, England, United Kingdom Hybrid / WFH Options
Clear IT Recruitment Limited
in their Central London office. This role dose come with a hybrid working. We are seeking a Dashboard Developer to play a pivotal role in how we display complex data in an intuitive, easy to view and use dashboards. Key responsibilities will include translating user requirements into dynamic and user-friendly dashboard solutions. You'll work collaboratively with cross … functional teams to understand their needs and prepare visually appealing representations of data that facilitate actionable insights. Furthermore, you will play a pivotal role in envisioning how these upgraded dashboards can leverage the capabilities of the Data Lake, maximizing data accessibility and relevance. Experienced desired: • Experience of working with SQL, data and databases to explore data. … Proven experience in designing and developing interactive dashboards and reports using PowerBI, Tableau, QlikView or another similar platform. • Familiarity with data warehousing concepts and cloud platforms (e.g., Azure, AWS). • Proficient in SQL for data manipulation and extraction. • Experience of working with big data storage solutions, such as Data Warehouses and/or Data Lakes. More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
State Street
integration of encryption services across a diverse infrastructure. As financial institutions increasingly adopt hybrid cloud and IoT-enabled banking solutions, this role will play a critical part in securing data at rest, in transit, and in use, ensuring end-to-end cryptographic protection across applications, infrastructure, and connected devices. The ideal candidate will have deep expertise in cryptographic … key management, Hardware Security Modules (HSMs), cloud security, IoT encryption protocols, and enterprise data protection. This role can be performed in a hybrid model, where you can balance work from home and office to match your needs and role requirements. Who We Are Looking For State Street is seeking an experienced Encryption Program Analyst to help design, implement, and … integration of encryption services across a diverse infrastructure. As financial institutions increasingly adopt hybrid cloud and IoT-enabled banking solutions, this role will play a critical part in securing data at rest, in transit, and in use, ensuring end-to-end cryptographic protection across applications, infrastructure, and connected devices. The ideal candidate will have deep expertise in cryptographic More ❯
objectives. Plan and execute detailed control testing activities acrossIT operations, systems, and processes, including: - Cybersecurity controls (e.g., firewalls, encryption, accessmanagement). - Cloud computing controls (e.g., AWS, Azure, GoogleCloud). - Dataprotection controls (e.g., GDPR compliance, databackups). - Incident management processes and disaster recoverytesting. Test both the design and operating effectiveness of ITcontrols. Prioritise control testing activities based on … risk assessments, focusing on high-risk areas such as paymentsystems, customer dataprotection, and regulatoryreporting. Document and communicate control deficiencies torelevant stakeholders. Work with technology teams to develop, track, andimplement remediation plans to address identified controlgaps. Perform follow-up testing to validate the resolution ofissues and confirm effectiveness. Assess IT controls of third-party vendors and serviceproviders, ensuring … Familiarity with IT control frameworks such as NISTCybersecurity Framework, ISO 27001, and COBIT. Proficiency with GRC platforms and testing tools (e.g., RSAArcher, ServiceNow, or LogicGate). Advanced knowledge of data analysis tools (e.g., Excel,SQL) and reporting tools (e.g., Tableau, Power BI). Strong understanding of cloud security, dataprotection technologies, and cybersecurity protocols. Experience in managing More ❯
IT services, including architecture and business analysis, IT project delivery, IT service management (and the IT service desk), infrastructure services, IT security, and innovation management. The second function is Data, Management Information (MI), and Reporting, which includes fulfilling TESC contract reporting obligations and providing business insights to drive efficiency and productivity improvements. Your new role The Head of Information … effective relationships with business stakeholders is crucial to gain quality feedback, prioritising requirements, and ensure their effective delivery. You'll be required to develop a strategy and plan for Data & Information Management, Business Insight, and Reporting. Ensuring effective and reliable IT operations for all users, formalised into Service Level Agreements, is essential. Leading the management team in shaping and … Governance, including architecture decisions, risk management, technology operations, TESC reporting, and project and product delivery, ensuring compliance with policies and regulations. Identifying and mitigating risks, including IT Security and DataProtection, in alignment with the corporate Risk Framework, is another critical responsibility. Supporting internal and external audit activities related to Data/Information and Technology, such as More ❯
London, England, United Kingdom Hybrid / WFH Options
JaJa Finance Ltd
Hours of Work: Mon - Fri, 9:00 - 17:30 Travel Requirements: None About Jaja Our Mission: Empowering our customers to buy, borrow, and build—driven by technology, fuelled by data, and built for the future. Our Company Values: Care Deeply, Adapt & Thrive, Challenge Everything, Go for It! Own It, Make It Simple. Jaja is an innovative UK-based consumer … APIs using Java and related technologies (Spring, JPA, Kafka, JUnit). Apply design patterns, SOLID principles, and clean code practices. Work with relational databases and SQL to ensure efficient data management. Design, deploy, own and maintain microservices in a cloud environment (AWS, Google Cloud, or Azure). Debug complex issues and implement effective solutions. Ensure security best practices, including … dataprotection and access control. Collaborate with agile teams using practices such as pair programming and code reviews. Use project management, source control, and CI tools (e.g., Jira, Git, Jenkins). About You We’re seeking passionate individuals who align with our values—caring deeply about customer experience, adapting to challenges, and owning their work to deliver simple More ❯
technology. By applying for this role, you accept if successful, that information from your application will be transferred into the national NHS Electronic Staff Record (ESR) system. Your personal data may be transferred from the Trust to another NHS organisation where your employment transfers within the NHS. This is in accordance with the streamlining programme which aims at saving … technology. By applying for this role, you accept if successful, that information from your application will be transferred into the national NHS Electronic Staff Record (ESR) system. Your personal data may be transferred from the Trust to another NHS organisation where your employment transfers within the NHS. This is in accordance with the streamlining programme which aims at saving … or equivalent qualification/relevant experience Understanding of Information Security principles. Desirable CISSP, CISM or Security + Certification Industry standard IT qualifications e.g. Microsoft, Cisco, ITIL Knowledge of the DataProtection Act Experience Essential A working Knowledge of Health Computing Systems or a similar large organisation and data structures. Experience with network and switch technologies such as More ❯
IT operations management principles, and third-party security management. A little more about your role Specific areas of responsibility may fall into any one of the following areas of Data Classification and Labeling: Work with the Business Information Security Officer, Regional Business and IT Leadership and peers within the Information Security Office to ensure the following deliverables are effectively … responsibility, in order to deliver the information security strategy and goals and the management of security risk. Information Security Governance: Oversee WSPs implementation and maintenance of its ISO27001 aligned Data and Information Security Management System. Establish and maintain the Information Security Governance framework; including running the Information Security Committees; coordinating IS risk management, executive reporting and participate in other … in one or more of the following disciplines - IT governance (e.g., CGEIT), security (e.g., CISSP, CISM), internal audit (CISA). Working (not necessarily technical) knowledge of security technologies (encryption, dataprotection, network intrusion prevention, host intrusion prevention, firewalls, privilege access, etc.) Working (not necessarily technical) knowledge of information technologies (networking concepts, protocols, servers, workstations, laptops, LAN/WAN More ❯
with regional business objectives, ensuring a balance between security requirements and operational efficiency. Monitor and ensure compliance with regional regulations, including GDPR, NIS2, and other country-specific financial and dataprotection laws. Act as a subject matter expert for regulatory requirements, providing guidance and reports to stakeholders. Collaborate with EMEA-based clients to understand their security requirements and … in the financial services industry. Excellent communication and stakeholder management skills. Desirable Qualifications, Skills & Abilities Knowledge of networks technologies (protocols, design concepts, access control) Knowledge of security technologies (encryption, dataprotection, design, privilege access, etc.) Knowledge of network design and engineering Certifications such as CISSP, CISM, CRISC, or equivalent are strongly preferred. Proficiency in time management, communications, decision More ❯
platform enables businesses with thousands of suppliers to efficiently on-board and manage the end-to-end lifecycle of all suppliers, and to find, re-use and maintain supplier data and information across any spreadsheet, app or system. High quality supplier data is essential to digital transformation and the key to becoming customer of choice for all suppliers. … Some of the world's largest companies, in a wide range of industries, trust HICX for the management of their supplier data; these include BAE Systems, Mondelez, Baker Hughes and EDF Energy. Minimum 2 years in professional Java programming with experience in application design, software development, and maintenance A BSc in Computer Science or similar field English language fluency … and location. Work with a diverse, international team. Tons of amazing career opportunities in a fast-growing in-demand industry. Apply for this job HICX collects and processes personal data in accordance with applicable dataprotection laws. If you are a European Job Applicant see the privacy notice for further details. HICX does not discriminate on the More ❯
with regional business objectives, ensuring a balance between security requirements and operational efficiency Monitor and ensure compliance with regional regulations, including GDPR, NIS2, and other country-specific financial and dataprotection laws Act as a subject matter expert for regulatory requirements, providing guidance and reports to stakeholders Collaborate with EMEA-based clients to understand their security requirements and … in the financial services industry Excellent communication and stakeholder management skills Desirable Qualifications, Skills & Abilities Knowledge of networks technologies (protocols, design concepts, access control) Knowledge of security technologies (encryption, dataprotection, design, privilege access, etc.) Knowledge of network design and engineering Certifications such as CISSP, CISM, CRISC, or equivalent are strongly preferred Proficiency in time management, communications, decision More ❯
Insights at hyperexponential We are hiring an Analyst to help build a world-class finance function at hyperexponential, supporting rapid, sustainable growth with data, automation, and strategic insight. This is an opportunity to join a small but dynamic Central Functions team and to play a pivotal role, working together to establish scalable processes and deliver powerful insights that will … this role reports into the finance team but with a remit that will likely expand into broader operational and strategic analytics across hx. hyperexponential is an agile, high-growth, data-driven company and it needs a data function to match! Our team at hyperexponential is: Technology-driven: we leverage the latest cloud and AI technologies to drive automation … new skills and keep on top of fast moving market trends Your mission Finance at hx is a strategic function: not just financial planning, but enabling execution through better data, automation, and systems thinking. You'll help us scale smarter by embedding robust metrics, building intelligent processes, and sharing insights that unlock growth. Our remit includes core financial planning More ❯
London, England, United Kingdom Hybrid / WFH Options
WSP
IT operations management principles, and third-party security management. A little more about your role... Specific areas of responsibility may fall into any one of the following areas of Data Classification and Labeling: Work with the Business Information Security Officer, Regional Business and IT Leadership and peers within the Information Security Office to ensure the following deliverables are effectively … responsibility, in order to deliver the information security strategy and goals and the management of security risk. Information Security Governance: Oversee WSPs implementation and maintenance of its ISO27001 aligned Data and Information Security Management System. Establish and maintain the Information Security Governance framework; including running the Information Security Committees; coordinating IS risk management, executive reporting and participate in other … in one or more of the following disciplines - IT governance (e.g., CGEIT), security (e.g., CISSP, CISM), internal audit (CISA). Working (not necessarily technical) knowledge of security technologies (encryption, dataprotection, network intrusion prevention, host intrusion prevention, firewalls, privilege access, etc.) Working (not necessarily technical) knowledge of information technologies (networking concepts, protocols, servers, workstations, laptops, LAN/WAN More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
with a revolutionary dream to make business information accessible to all. Twenty-five years later, we’ve not only realised this dream, changed the market for the better, made data intelligence accessible to all businesses big and small but most importantly, opened up new avenues of data intelligence for businesses with machine learning, AI and connected data. From … risk management through to opportunity identification, our industry-leading solutions, power decisions for companies by turning their data into actionable insights that help them become stronger, grow faster and thrive. THE TEAM Creditsafe’s Information Security and Compliance team are motivated by protecting company reputation, safeguarding existing revenue, and supporting the generation of future revenue. We realise that security … Plans of team members. Develop and implement security policies, processes, and procedures to comply with SOC2 and ISO27001 standards. Participate in Steering groups for Identity and Access Management and DataProtection Setting and aligning team objectives and tasks to help achieve the overall Information Security and Compliance function’s strategy and goals Participate in Quarterly Business Reviews with More ❯
Working knowledge of IT architecture frameworks such as TOGAF and/or project management methodologies Working knowledge of regulatory and legal requirements frameworks related to information security for healthcare data, such as HIPAA, EU DataProtection Directive and/or equivalent regional frameworks is preferred Experience in information technology related positions with working knowledge of IT infrastructure … networks design, databases, processing systems, web applications, mobile technology, cloud, big data, virtualization, protocols and technologies supporting encryption, authentication, access control, information systems attack patterns, intrusion detection, and network security IQVIA is a leading global provider of advanced analytics, technology solutions and clinical research services to the life sciences industry. We believe in pushing the boundaries of human science … and data science to make the biggest impact possible – to help our customers create a healthier world. Learn more at #J-18808-Ljbffr More ❯
standards, ensuring sustained technology value for the business. Platform Architecture: Oversee the design, architecture, and development of scalable, high-performance, and secure platforms, including cloud infrastructure, microservices, APIs, and data pipelines. Scalability & Reliability: Ensure the platform is highly available and scalable to meet the demands of a growing customer base and evolving business requirements. Implement strategies to prevent downtime … and manage disaster recovery. Collaboration: Collaborate closely with product engineering, data science, security, and other cross-functional teams to drive cohesive, integrated solutions that meet both technical and business requirements. You will break down silos between teams and departments, ensuring seamless communication and shared accountability for platform success. Technology Leadership: Stay ahead of emerging trends and technologies, and ensure … to ensure a reliable platform with high uptime and optimized performance. Security & Compliance: Partner with security teams to ensure that the platform complies with industry regulations and standards, including dataprotection, privacy, and security best practices (e.g., GDPR, SOC 2, etc.). Cost Management: Optimize platform operations and infrastructure for cost-efficiency, particularly in cloud environments. Implement monitoring More ❯