audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert More ❯
or similar). Experience with monitoring tools (SolarWinds SentryOne, Zabbix etc.). Excellent problem-solving, communication, and documentation skills. Some familiarity with financial services regulations and compliance (PCI DSS, GDPR, DORA) would be useful but is not essential. Desirable (but not required) experience: Some interest in learning and using automation tools such as Azure DevOps, Terraform, Node-Red, Packer. Proven More ❯
Wallingford, Oxfordshire, South East, United Kingdom
Hays
ll Bring: Proven experience in a senior security, governance, or assurance role A professional qualification (e.g., CISSP, CISM) or relevant degree Strong knowledge of frameworks such as Cyber Essentials, GDPR, ISO27001, and NIST Technical expertise in Cloud, Data Analytics, Microsoft / AWS / Azure environments Experience managing change projects and influencing cross-functional teams Excellent communication and stakeholder engagement More ❯
projects, including migrations, deployments, and optimiSations. Strong expertise in M365 services, including Teams, SharePoint Online, OneDrive, Intune, Power Platform , and Copilot . Experience with security and compliance frameworks (e.g., GDPR, HIPAA, ISO 27001) within M365 environments. Excellent communication and stakeholder management skills, with the ability to translate technical concepts to non-technical audiences. Relevant Microsoft certifications (e.g., Microsoft 365 Certified More ❯
Mountain Ash, Mid Glamorgan, Wales, United Kingdom Hybrid/Remote Options
Informed Recruitment LTD
basis protected by appropriate law. All hiring decisions are made based on merit, competence, and business need. As defined under the GeneralDataProtectionRegulation (GDPR), Informed Recruitment is a Data Controller and a Data Processor, and our legal basis for processing your personal data is 'Legitimate Interests'. You have the right More ❯
Cardiff, Mountain Ash, Mid Glamorgan, United Kingdom Hybrid/Remote Options
Informed Recruitment
basis protected by appropriate law. All hiring decisions are made based on merit, competence, and business need. As defined under the GeneralDataProtectionRegulation (GDPR), Informed Recruitment is a Data Controller and a Data Processor, and our legal basis for processing your personal data is 'Legitimate Interests'. You have the right More ❯
SQL Database. Exposure to big data technologies such as Hadoop, Spark, and Databricks. Experience with Azure Synapse Analytics or Cosmos DB. Familiarity with data governance frameworks (e.g., GDPR, HIPAA). Experience implementing CI / CD pipelines using Azure DevOps or GitHub. Understanding of real-time data streaming tools (e.g., Azure Event Hubs). Role details: Job role More ❯
CASP+, CEH, or SIEM certifications. Strong knowledge of log correlation, analysis, forensics, and chain of custody requirements. Familiarity with regulatory frameworks (NCSC CAF, ISO / IEC 27001 / 27002, GDPR, CIS, NIST). Practical knowledge of SIEM, SOAR, EDR, AV, IDS / IPS, NAC, AD, DLP, web / email filtering, behavioural analytics, TCP / IP and OT protocols, and security More ❯
of project management methodologies, such as Agile, Scrum, or Waterfall. * Understanding of business intelligence concepts and practices. * Awareness of regulatory requirements related to data privacy and security (e.g., GDPR). Skills: * Strong leadership and team management abilities. * Excellent communication and stakeholder management skills. * Analytical mindset with problem-solving capabilities. * Strategic thinking and ability to align data initiatives with More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
release quality. Security, Risk, and Compliance Implement robust access controls (ACLs, roles), dataprotection, auditability, and compliance with enterprise policies (e.g., ITIL / ISO / SoX /GDPR as applicable). Stakeholder Engagement Translate business objectives into target-state architectures and roadmaps; articulate trade-offs and recommended approaches to technical and non-technical stakeholders. Minimum Qualifications Bachelor's More ❯
South East London, London, United Kingdom Hybrid/Remote Options
Anson Mccade
security guidance Support bid work, proposals and shaping of security solutions for new client engagements Stay current with emerging threats, technologies and regulatory requirements (ISO 27001, NIST, Cyber Essentials+, GDPR) Required Experience Proven experience as a Cybersecurity Architect / Security Consultant in cloud and application security Strong technical understanding of AWS, Azure or GCP security architecture (certifications desirable) Hands-on More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom Hybrid/Remote Options
Atom Bank
container security tools for Kubernetes and Docker environments. Advanced scripting and automation skills (Python, PowerShell, Bash, etc.) Demonstrated ability to navigate and implement compliance frameworks such as PCI DSS, GDPR, SOC 2, and ISO 27001. Familiarity with financial industry-specific security and privacy standards. Relevant Security certifications (e.g. CISSP, SSCP, CCSM, CISM, etc.) Relevant public-cloud certifications (e.g. GCP Professional More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security frameworks, standards, and regulations (examples: ISO27001, NIS2, GDPR, and CAF). Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks. Ability to collaborate effectively with various internal and external stakeholders. Relevant certifications such as Microsoft Security More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid/Remote Options
AJ BELL BUSINESS SOLUTIONS LIMITED
data loss prevention systems also highly advantageous Experience working within recognised Information Security frameworks and best practices such as ISO27001, NIST etc. Knowledge of relevant regulatory requirements (e.g. GDPR/ FCA / PRA) Experience in an Information Security role gained in a financial services or e-commerce environment is preferred Strong written communication skills, with ability to contribute to More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security frameworks, standards, and regulations (examples: ISO27001, NIS2, GDPR, and CAF). Understanding of the Cyber Kill Chain and MITRE ATT&CK frameworks. Ability to collaborate effectively with various internal and external stakeholders. Relevant certifications such as Microsoft Security More ❯
audits. - Strong knowledge of information security frameworks and standards. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert More ❯
audits.- Strong knowledge of information security frameworks and standards.- Excellent analytical and problem-solving skills.- Strong communication and interpersonal skills.**Preferred Qualifications:**- Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX.- Familiarity with security tools and technologies such as SIEM, DLP, and endpoint protection. CISA / CISSP / CCSP MCSA-Microsoft Windows Server MCSE- Microsoft Certified Solution Expert More ❯
Docker) • Build CI / CD pipelines for reliable code deployment Security & Compliance • Implement security best practices across the platform (IAM, secrets management, encryption) • Support compliance initiatives (ISO 27001, NIST, GDPR, MCERTS, etc.) • Manage network configuration, firewalls, and secure endpoints Monitoring & Reliability • Set up observability and monitoring tools (Prometheus, Grafana, Datadog, or CloudWatch) • Ensure high availability, scalability, and cost efficiency of More ❯