threats, and technology solutions. Ensure compliance with relevant laws, regulations, and industry standards. Prepare and present security reports to senior management. Skills Preferred Skills / Requirements Ideally around 5 years of experience in cybersecurity or a related field. Knowledge of security frameworks and standards (e.g., ISO27001 … ITIL, NIST). Experience with security tools and technologies (e.g., firewalls, IDS / IPS). Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to work independently and as part of a team. Experience with cloud and internet security. Familiarity with regulatory requirements (e.g., GDPR, HIPAA … . Qualifications / training desirable but not essential. More ❯
testing and testing applications hosted on platforms like AWS, Azure, or Google Cloud. Understanding of DevSecOps practices and experience integrating security testing into CI / CD pipelines. Experience: Minimum of 5-7 years of experience in information security, with at least 3 years focusing on penetration testing, vulnerability assessment … Qualys, OpenVAS) and penetration testing tools (e.g., Metasploit, Burp Suite, Kali Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
and standardised tools that support long-term business needs. Cybersecurity Oversight: Develop and implement a cybersecurity strategy aligned with industry best practices (e.g., ISO27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full … work and global operations. IT Support & Service Delivery: Establish a scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding / offboarding processes. Collaboration Tools & Intranet: Lead the implementation and management of internal collaboration tools, including the development of an intranet or SharePoint environment to More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Quinbrook Infrastructure Partners
and standardised tools that support long-term business needs. Cybersecurity Oversight: Develop and implement a cybersecurity strategy aligned with industry best practices (e.g., ISO27001, NIST). Protect company systems and data through robust policies, security tools, and continuous monitoring. Device & Endpoint Management : Oversee the full … work and global operations. IT Support & Service Delivery: Establish a scalable and responsive global IT support model, including ticketing systems, SLAs, and standardised onboarding / offboarding processes. Collaboration Tools & Intranet: Lead the implementation and management of internal collaboration tools, including the development of an intranet or SharePoint environment to More ❯
IAM, vulnerability management, and SIEM configuration. Strong grasp of networking fundamentals, including DNS, WAF, and ingress, paired with experience in CPSM. Familiarity with GIT / version control, SDLC pipelines and implementing compliance frameworks (NIST2, SOC2, ISO27001). Benefits: 25 days annual leave in addition … to Bank holidays. Hybrid working pattern; 3 days a week in the office, 2 days remote. Discretionary commission / bonus scheme. Company pension scheme. Life and medical insurance, and eyecare scheme. Employee Assistance Program. Cycle to work scheme. Family-friendly policies. Recruit and Reward scheme. Access to perk-box … to ensuring equal opportunities, fairness of treatment, dignity and respect, and the elimination of all forms of discrimination in the workplace for all employees / contractors and job applicants. More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Lloyds Bank plc
Network Security Prevention, Detection, Compliance and Assurance team - part of the wider Network Security & Traffic Management Lab - which manages critical controls like Intrusion Prevention / Detection Systems (IPS / IDS) and Network Detection & Response (NDR) across our on-prem and multi-cloud environment. In this role, you'll … ll need Demonstrable experience in network security or infrastructure roles, with deep technical knowledge of security boundary devices such as firewalls and intrusion detection / prevention systems Firewall policy expertise:Good understanding of firewall rule sets and network security policy standard practices - you know how to design and review … code" frameworks. You're comfortable using technology to simplify complex processes. Compliance and controls knowledge:Familiarity with regulatory standards and certification frameworks (e.g. ISO27001, PCI-DSS) and experience participating in audits or maintaining key security controls. You understand how to translate regulatory requirements into practical More ❯
ideally in financial services or highly regulated environments. Proven capability in third-party risk management, client due diligence, and compliance framework s (NIST, ISO27001, DORA, etc.). Experience in managing audits and regulatory engagements across multiple jurisdictions. Excellent communication skills – able to translate complex technical … managed across a major financial institution. If you would like to discuss this role in confidence reach out to Javed Hussain 0208 142 3930 / javed.hussain@marlinselection.com More ❯
ideally in financial services or highly regulated environments. Proven capability in third-party risk management, client due diligence, and compliance framework s (NIST, ISO27001, DORA, etc.). Experience in managing audits and regulatory engagements across multiple jurisdictions. Excellent communication skills – able to translate complex technical … managed across a major financial institution. If you would like to discuss this role in confidence reach out to Javed Hussain 0208 142 3930 / javed.hussain@marlinselection.com More ❯
principles and the unique challenges posed by AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI / ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for … Communicate security risks and recommendations effectively to both technical and non-technical audiences. What experience you'll bring: 7+ Years experience in a Cyber / Information Security Role. Hold a current and relevant Security Certifications (e.g., CISSP, CISM). Extensive knowledge of security best practices, frameworks, and standards (e.g. … ISO27001). Proven experience as a Security Architect, with a strong focus on AI security. Deep understanding of AI / ML concepts, including model development, data pipelines, and deployment. Strong understanding of ethical AI principles and practices. Experience with AI security tools and technologies. More ❯
performing security team, shape SOC strategy, and work with cutting-edge technologies in a fast-paced, collaborative environment. What You'll Do Lead 24 / 7 SOC operations, ensuring timely threat detection and incident response Drive continuous improvement in SOC processes, playbooks, and performance metrics Manage, mentor, and grow … Bring 5+ years in cybersecurity operations, with at least 2 years in a leadership role Strong hands-on knowledge of SIEM, EDR, SOAR, IDS / IPS, Firewalls, and cloud security Deep understanding of MITRE ATT&CK, NIST, ISO27001, CIS frameworks Proven experience in incident … be considered, please ensure you complete your application on the Computappoint website. Services offered by Computappoint Limited are those of an Employment Business and / or Employment Agency in relation to this vacancy More ❯
tools (GuardDuty, CloudTrail, Config, WAF). Proficiency in CloudFormation, Terraform, and scripting languages like Python or Bash. Knowledge of compliance standards (SOC 2, ISO27001, GDPR, PCI-DSS) and experience ensuring compliance in AWS environments. Experience with security incident response, monitoring, and post-incident remediation. Ability More ❯
security concepts including cryptography, authentication and authorization, access control, secure architectures, threat modeling, vulnerabilities and software security. Strong knowledge of regulatory requirements (e.g. GDPR, ISO27001, PCI-DSS) and experience in regulatory reporting. 3-5 years of experience in GRC, risk management, or compliance. A bachelor's degree in computer science More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Focus on SAP
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Focus on SAP
Ansible for AWS environments. Container & Orchestration: Design, deploy and manage Docker containers on Kubernetes (and Rancher), ensuring high availability and efficient resource usage. CI / CD Pipelines: Create and maintain GitLab CI / CD or Jenkins pipelines for automated build, test, security scans (Blackduck, Checkmarx, SonarQube) and deployment … workflows. AWS Architecture: Architect and operate AWS services—including VPC, EC2, EBS, Route 53, WAF, ALB / ELB, Network ACLs, Security Groups, KMS and S3—to meet performance, security and compliance requirements. Monitoring & Observability: Implement application and infrastructure monitoring with Prometheus & Grafana; manage centralized logging with the ELK stack. … Orchestration: Strong proficiency with Docker and Kubernetes (plus Rancher). Cloud Mastery: Deep working knowledge of AWS core services (VPC, EC2, S3, IAM, ALB / ELB, WAF, KMS, Route 53, Network ACLs, Security Groups). IaC & Automation: Proven experience using Terraform and Ansible for repeatable, automated infrastructure deployments. CI More ❯
problem-solving and troubleshooting skills. Preferred: Experience with cloud platforms (e.g., AWS, Azure, GCP) and their integration with CyberArk. Knowledge of DevOps and CI / CD pipelines for secrets management. Familiarity with other PAM tools (e.g., BeyondTrust, Thycotic) is a plus. Strong understanding of cybersecurity frameworks (e.g., NIST, ISO27001). Soft Skills: Strong communication and interpersonal skills. Ability to work independently and as part of a team. Detail-oriented with a focus on delivering high-quality results. Proactive and self-motivated with a passion for cybersecurity. Education and Certifications: Bachelor’s degree in Computer More ❯
About the Job We are seeking a Product Security Specialist with expertise in connected / IoT medical devices or healthcare products to join our team. The ideal candidate will work with clients to advise and shape the overall security strategy for products, ensure secure design, development, and deployment across … testing, threat modeling, security testing) and evaluate residual risks with compensating controls. Solid experience in applying and proving compliance with frameworks like NIST, IEC, HITRUST, HIPAA, GDPR, ISO27001, SOC 2 Type 2, as well as working with Quality Management Systems (QMS). Strong More ❯
industry-standard tools and methodologies, and managing remediation processes. Compliance and Security Controls : Familiarity with implementing security controls aligned with frameworks such as ISO27001, NIST, or CIS, and adapting them to meet organisational needs. Automation and Scripting : Possess skills in automating security tasks using scripting … together. On Fridays, we regularly turn on the speakers, open the beer fridge, and prepare for the weekend. Note: This role is a hybrid / remote role based in the UK. Unfortunately, we cannot currently sponsor visas for candidates outside of the UK. Apply for this job indicates a … required field First Name Last Name Email Phone Resume / CV Enter manually Accepted file types: pdf, doc, docx, txt, rtf Do you have 5 years experience in managing internal information security? Select Do you have hands-on experience building internal security functions, that you would be excited to More ❯
Certified Information Security Manager). 5+ years of IT security experience working on data security enforcement. Strong understanding of security frameworks like NIST, ISO27001, and CIS Controls, and their application to enhance security and ensure compliance. Proven expertise in designing and implementing data security controls … hybrid cloud environments. Hands-on experience with modern enterprise-level data protection tools, including Data Loss Prevention (DLP), Digital Rights Management (RMS), data encryption / tokenization, and data discovery. Strong familiarity with Microsoft security solutions, such as AD RMS, Azure RMS, and Microsoft Purview for data governance, classification, and … proficiency, oral presentation skills, problem-solving, and decision-making skills. Experience in using architecture methodologies such as TOGAF and SABSA. Practical experience in Agile / DevOps organizations and cultures. We know our colleagues work tirelessly to make JD Sports the success it is today and in turn, we offer More ❯
periodic reviews (musters) and conduct spot checks of classified assets Maintain company security documents, asset registers, risk registers, and reports Protectively Marked Material Management / Mustering (PPM) and secure disposal of assets Logging in / out of assets, movement / transport plans, liaising with the authority Maintain … management Advising management on the interpretation and implementation of contractual and legislative security controls. Conduct and administrate internal security audits and address observations and / or non-conformances relating to protective security following an audit Conduct and administrate supply chain security audits and address observations and / or … non-conformances relating to protective security following an audit Update and maintain the ISO27001 ISMS and other security accreditation documents Update and maintain the site risk register Identify new risks, determine mitigations and implement suitable controls and measures Arranging for appropriate security education and awareness More ❯
principles and the unique challenges posed by AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI / ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for … Communicate security risks and recommendations effectively to both technical and non-technical audiences. What experience you'll bring: 7+ Years experience in a Cyber / Information Security Role. Hold a current and relevant Security Certifications (e.g., CISSP, CISM). Extensive knowledge of security best practices, frameworks, and standards (e.g. … ISO27001). Proven experience as a Security Architect, with a strong focus on AI security. Deep understanding of AI / ML concepts, including model development, data pipelines, and deployment. Strong understanding of ethical AI principles and practices. Experience with AI security tools and technologies. More ❯
least 2 years of hands-on experience in information security or IT infrastructure within an enterprise environment. Familiarity with security standards such as ISO27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing More ❯
least 2 years of hands-on experience in information security or IT infrastructure within an enterprise environment. Familiarity with security standards such as ISO27001, Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing More ❯
Security news, proactively raising and responding to emerging threats. Support the wider Security team in our compliance and accreditation activities (GDPR, PCI DSS, ISO27001). Create, maintain, and analyse Security Operations dashboards and reports fed into management, and stakeholders across the business. Identify key trends More ❯
and presenting findings to Senior Stakeholders Hold recognised Cyber Security qualification (CISA, CISMP, CISM or equivalent). Knowledge of industry related frameworks such as ISO27001, PCI DSS This role is based in Northampton and is a hybrid position with on average 2 days a week on-site. The salary is More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
My client a growing information security consultancy, is seeking a qualified, highly motivated and skilled Cyber Essentials / CE Plus Assessor to join our team. We require the applicant to have a minimum of 2 years experience working on CE. Must be able to get to Milton Keynes up … MONTH CONTRACT WHICH LEADS TO A FULL TIME PERMANENT EMPLOYMENT. Salary range £35k - £40k on a permanent basis with additional bonus. As a CE / CE+ Assessor, you will be responsible for our clients entire certification journey from understanding their requirements / vulnerabilities, assessing their compliance against the … Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring / presenting final reports. Additionally, you will also be involved in supporting the sales team as we look to scope and truly understand clients requirements to ensure we More ❯