plans. Maintain and update security policies, procedures, and incident response plans. Deliver security awareness training and advise clients on best practices. Support audits and compliance initiatives (ISO 27001, NIST, GDPR, etc.). Work cross-functionally with internal and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We … Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting / automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem More ❯
plans. Maintain and update security policies, procedures, and incident response plans. Deliver security awareness training and advise clients on best practices. Support audits and compliance initiatives (ISO 27001, NIST, GDPR, etc.). Work cross-functionally with internal and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We … Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting / automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem More ❯
plans. Maintain and update security policies, procedures, and incident response plans. Deliver security awareness training and advise clients on best practices. Support audits and compliance initiatives (ISO 27001, NIST, GDPR, etc.). Work cross-functionally with internal and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We … Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting / automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem More ❯
london (city of london), south east england, united kingdom
Franklin Fitch
plans. Maintain and update security policies, procedures, and incident response plans. Deliver security awareness training and advise clients on best practices. Support audits and compliance initiatives (ISO 27001, NIST, GDPR, etc.). Work cross-functionally with internal and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What We … Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting / automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem More ❯
IT operations, systems, and processes, including: Cybersecurity controls (e.g., firewalls, encryption, access management). Cloud computing controls (e.g., AWS, Azure, Google Cloud). Dataprotection controls (e.g., GDPR compliance, data backups). Incident management processes and disaster recovery testing. Test both the design and operating effectiveness of IT controls. Prioritise control testing activities based on risk assessments More ❯
are seeking a Cyber Security Analyst for a 6-month full-time temporary role to strengthen our security posture, conduct penetration testing, and ensure compliance with ISO27001, HIPAA, and GDPR regulations. Key Responsibilities Conduct penetration testing on various hardware and software systems, identifying vulnerabilities and recommending remediation measures. Manage and support ISO27001, HIPAA, and GDPR compliance, ensuring adherence to regulatory … Security, Information Security, or a related field . Strong understanding of penetration testing techniques across multiple platforms (hardware and software). Experience managing ISO27001 and HIPAA compliance and supporting GDPR audits. Proficiency in security tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity More ❯
are seeking a Cyber Security Analyst for a 6-month full-time temporary role to strengthen our security posture, conduct penetration testing, and ensure compliance with ISO27001, HIPAA, and GDPR regulations. Key Responsibilities Conduct penetration testing on various hardware and software systems, identifying vulnerabilities and recommending remediation measures. Manage and support ISO27001, HIPAA, and GDPR compliance, ensuring adherence to regulatory … Security, Information Security, or a related field . Strong understanding of penetration testing techniques across multiple platforms (hardware and software). Experience managing ISO27001 and HIPAA compliance and supporting GDPR audits. Proficiency in security tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity More ❯
are seeking a Cyber Security Analyst for a 6-month full-time temporary role to strengthen our security posture, conduct penetration testing, and ensure compliance with ISO27001, HIPAA, and GDPR regulations. Key Responsibilities Conduct penetration testing on various hardware and software systems, identifying vulnerabilities and recommending remediation measures. Manage and support ISO27001, HIPAA, and GDPR compliance, ensuring adherence to regulatory … Security, Information Security, or a related field . Strong understanding of penetration testing techniques across multiple platforms (hardware and software). Experience managing ISO27001 and HIPAA compliance and supporting GDPR audits. Proficiency in security tools such as Burp Suite, Kali Linux, Metasploit, Wireshark, Nessus, or equivalent . Good knowledge of network security, firewalls, managed switches, and server configurations . Familiarity More ❯
Information Security Analyst , you will help shape and execute our security and compliance strategy. You will support compliance frameworks such as ISO / IEC 27001, SOC 2, HIPAA, and GDPR , help manage risk, and ensure that security practices are embedded in our daily operations. You’ll have the opportunity to grow within the team, taking ownership of operational security work … the table: Experience in information security, risk management, or compliance, preferably in a SaaS environment. Understanding of security frameworks such as ISO / IEC 27001, SOC 2, HIPAA, and GDPR . Experience with security compliance automation tools (e.g., Vanta, Drata, or similar platforms). Ability to work collaboratively with multiple teams, balancing compliance requirements with business needs. Strong problem-solving More ❯
IT certifications such as CompTIA A+, Network+ • Cyber certifications such as CISM, CISA, CEH, or CompTIA Security+ Understanding of regulatory frameworks and industry standards (e.g., NIS, NIST, ISO 27001, GDPR). Experience in scripting or programming languages including PowerShell for automating security tasks. Person Specification: Communication. Structures and conveys information and ideas effectively. Communicates to ensure they are understood by More ❯
and best practices to strengthen the knowledge base within the cyber resilience practice. Required Skills & Qualifications Technical Expertise Deep understanding of threat intelligence, risk management, incident response, compliance (e.g., GDPR, ISO 27001), and security architecture. Experience with a range of security technologies including: SIEM (e.g., Rapid7 InsightIDR) XDR (e.g., SentinelOne) Firewalls (e.g., Fortinet) Vulnerability Management (e.g., Rapid7 InsightVM) SSE /More ❯
London, England, United Kingdom Hybrid / WFH Options
PA Consulting
implementation of designed solutions, ensuring adherence to the architecture and best practices. Security and Compliance : Ensure that all solutions comply with internal security standards and relevant regulatory requirements (e.g., GDPR, HIPAA), including data privacy, security, and disaster recovery considerations. Documentation : Develop and maintain detailed documentation of solution designs, architecture principles, and integration approaches for ongoing projects and future reference. More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
PA Consulting
implementation of designed solutions, ensuring adherence to the architecture and best practices. Security and Compliance : Ensure that all solutions comply with internal security standards and relevant regulatory requirements (e.g., GDPR, HIPAA), including data privacy, security, and disaster recovery considerations. Documentation : Develop and maintain detailed documentation of solution designs, architecture principles, and integration approaches for ongoing projects and future reference. More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
PA Consulting
implementation of designed solutions, ensuring adherence to the architecture and best practices. Security and Compliance : Ensure that all solutions comply with internal security standards and relevant regulatory requirements (e.g., GDPR, HIPAA), including data privacy, security, and disaster recovery considerations. Documentation : Develop and maintain detailed documentation of solution designs, architecture principles, and integration approaches for ongoing projects and future reference. More ❯
technologies, best practices and IT-regulations that apply to financial institutions or its outsourcing partners. In-depth knowledge of relevant regulatory requirements and industry standards (ISO 27001, SOC 2, GDPR, DORA, etc.). Experience with cloud security (AWS, Google etc.), application security, and DevSecOps practices is a significant plus. Proven experience in developing and implementing security strategies and programs. Extensive More ❯
skills & knowledge: Broad knowledge of cyber security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of experience in GRC, risk management, or compliance. A bachelor's degree in computer science, Cyber Security or similar More ❯
including Defender for Office 365, Microsoft Purview, Entra ID (formerly Azure AD), and Intune. Strong knowledge of security frameworks (e.g., Zero Trust, NIST, ISO 27001, CIS), regulatory compliance (e.g., GDPR, HIPAA), and risk management. Solid understanding of cloud identity models, conditional access, MFA, RBAC, and privileged access management. Proficiency with automation and scripting (e.g., PowerShell, Microsoft Graph API) for configuration More ❯
Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CISA (Certified Information Systems Auditor) ISO 27001 Lead Auditor / Implementer CRISC (Certified in Risk and Information Systems Control) GDPR Certification (e.g., IAPP CIPP / E, CIPM for dataprotection compliance) Experience Requirements: 3-5+ years of experience in Information Security, Compliance, or IT Risk Management. Experience … with regulatory frameworks in UK & EU : GDPR (GeneralDataProtectionRegulation) ISO 27001 (Information Security Management Systems) Cyber Essentials Plus (UK government-backed security framework) DORA (Digital Operational Resilience Act) - EU financial sector PCI-DSS (if handling payment data) Experience in: Managing vendor risk assessments for third-party compliance. Handling incident response & reporting … e.g., Data Breach Notifications under GDPR). Key Skills & Technical Knowledge: Deep understanding of dataprotection laws (UK GDPR, EUGDPR, DPA 2018) . Familiarity with risk management frameworks like NIST CSF, CIS Controls, and ISO 27005 . Experience with cyber security tools (e.g., SIEM, Malware Protection, Firewalls and others) is a plus. Strong reporting More ❯
how they are being utilized and hosted, continually review opportunities to improve the overall controls around data security. Keep informed of new and updated industry frameworks and regulations: GDPR, ISO 27001 / 2, SANS Top 20 Critical Security Controls, NIST CSF, SP 800-53, PFMI, CPMI ISOCO and FFIEC handbook. Keep informed of new and emerging security threats & assess … security management. Experience developing or managing security programs preferably across several domains including metrics and reporting for program maturity and risk reduction. Experience and / or training on GDPR requirements and other dataprotection laws. Experience defining program roles and responsibilities, assessing / identifying knowledge gaps across teams and implementing required training plans. Ability to collaborate effectively More ❯
London, England, United Kingdom Hybrid / WFH Options
Wiz
to adapt quickly to changing circumstances. Knowledge of Security and Privacy Frameworks: In-depth knowledge of security and privacy frameworks, such as SOC 2, ISO 27001, NIST CSF, CIS, GDPR, HIPAA, etc. Cloud Security Understanding: Strong understanding of cloud security, dataprotection principles, and modern SaaS infrastructure (e.g., AWS, GCP, Kubernetes). Technical Communication Skills: Ability to discuss More ❯
architectures, indexing strategies, and performance tuning. Strong analytical and problem-solving skills for troubleshooting complex data issues. Knowledge of data governance frameworks (DCAM, DAMA DMBOK, ISO 8000, GDPR compliance). Familiarity with data security principles and regulatory compliance requirements. Ability to work independently and collaboratively in a fast-paced, global environment. Excellent communication and stakeholder engagement skills. More ❯
City of London, England, United Kingdom Hybrid / WFH Options
Staging It
integration tools (e.g., Kafka, Talend) and APIs. Familiarity with big data technologies (Hadoop, Spark) and real-time streaming. Expertise in cloud security, data governance, and compliance (GDPR, HIPAA). Strong SQL skills and proficiency in at least one programming language (Python, Java, Scala). Excellent problem-solving, communication, and project management skills. Experience with DevOps, CI /More ❯
and optimising semantic models and reports. · Implement governance policies and frameworks to maintain data quality and ensure compliance with data security best practices and regulatory requirements (e.g., GDPR, HIPAA). Data Platform Integration · Experience integrating Power BI with other data sources and platforms (e.g., Azure, Snowflake, SharePoint, SAP, Salesforce) · Experience with REST APIs for dataMore ❯
London, England, United Kingdom Hybrid / WFH Options
Applicable Limited
consumption. Data Management and Governance: Strong knowledge of data management principles and best practices, including data governance frameworks. Experience with data security and compliance regulations (GDPR, CCPA, HIPAA, etc.). Leadership and Communication: Exceptional leadership skills to manage and guide a team of architects and technical experts. Excellent communication and interpersonal skills, with a proven ability More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Lagofire
of these: Experience in a hands-on Cyber Security focused role, primarily in the data security domain. A strong & demonstrable knowledge of security frameworks, standards and regulations (NIST, GDPR for example). Familiarity with cloud security principles and experience working with cloud platforms such as AWS and Snowflake. A clear and demonstrable understanding of data science principles and More ❯