Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 47 countries. By uniting unique high-end technologies across the full digital continuum with … class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships and … provide quality solutions in a fast-paced environment, then, read below! The candidates must be eligible to obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 47 countries. By uniting unique high-end technologies across the full digital continuum with … class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships and … provide quality solutions in a fast-paced environment, then, read below! The candidates must be eligible to obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
data-driven, trusted and sustainable digital transformation. As a next generation digital business with worldwide leading positions in digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 47 countries. By uniting unique high-end technologies across the full digital continuum with … class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships and … provide quality solutions in a fast-paced environment, then, read below! The candidates must be eligible to obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology more »
this role is of interest, please apply or reach out to Jacob – 07893921057/j.collen@lockemccloud.com Locke & McCloud are the UK’s leading cyber security & informationsecurity staffing company – through having a sole focus on the cyber & informationsecurity space we have been able to … foster solid relationships with some of the UK’s most exciting cyber security consultancies & end users. Our focus on the informationsecurity space allows us to be able to help you find the most exciting. more »
Security Operations Analyst Egress Software Technologies, a leading Cyber Security company, is dedicated to your wellbeing and career development. We offer unparalleled work-life balance and transparent career paths, celebrating your unique contributions. Passionate about Cyber Security? Join us to work in a stable yet exciting industry. … Financial Services, Legal, Healthcare, and Government sectors, from advanced threats, ensuring they can achieve their missions safely. At the forefront of the IT Cyber Security industry, Egress can provide an unrivalled career path in Security Operations. The Team The three Egress security teams report to the Chief … InformationSecurity Officer (CISO), these are: Security Operations – the day-to-day management of operational processes and incidents Cyber Security – defining security best practice of technologies and internal pentesting Compliance & Risk – managing accreditations, auditing, and risk management This role forms part of the Securitymore »
To ensure our services and applications are fit for the modern market, our team collaborates with every department. We develop, explore and implement the informationSecurity practices helping us to protect the data of our clients in our services of accounting, tax and business consulting. But, just as … importantly, we maintain the functionality of our InformationSecurity Management System (ISMS) and ensure governance of the technology and security processes that keeps us advancing. And you could too. In an InformationSecurity role at BDO, you'll become part of a team that act … deliver the Assurance program and analytical work. The Assurance Manager role is the focal point for effective engagement between the business streams and the InformationSecurity team on Assurance related matters. This role will be a trusted adviser to senior stakeholders and provide broad knowledge of BDO's more »
Reigate, England, United Kingdom Hybrid / WFH Options
Jellyfish
fulfilment go hand in hand. Job Description Reporting to our General Counsel, In this role, you will work with the Legal and Compliance and InformationSecurity functions to develop and monitor policies and standards applicable to the business and in compliance with GDPR and other relevant privacy legislation. … clauses for international data transfers) and other third-party data processing and data sharing arrangements in partnership with the organisation's Legal, Procurement and Informationsecurity functions. As privacy expert, partner with business teams to evaluate new initiatives, plans, and processes to meet data protection compliance requirements Ensure … filing and fee requirements with the relevant supervisor authority are achieved. Participate in the Data Privacy and Information Governance Committee or similar. Manage and conduct ongoing reviews of our privacy governance framework including Binding Corporate Rules (BCRs)] and regular and ad hoc reporting on data privacy compliance within the more »
The Role: We are looking for a Cloud Security Engineer with experience on AWS, to join our growing team. The successful candidate will have an essential role in ensuring the informationsecurity of our business. You will be working in a team that is designing and building … resilient and secure Cloud environments that proactively prevent security threats. The main responsibilities of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to … ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate in efforts that shape the company’s security policies, procedures and standards for use in Cloud environments Create technical and managerial level securitymore »
Microsoft Security Consultant Location:- Remote, visits to office locations/customers when required. Salary:- £60-70k + 10% Bonus + Bens dep on exp and certifications Environment:- Architecture, LLD, Implementation, Microsoft Defender, Microsoft Azure Security Centre, Azure, Intune, Endpoint Protection Platforms, EDR, SIEM, SOC, Risk Assessments, MDM … IAM, Customer Facing, Configuration. My client, a prestigious provider of managed services is looking to hire at Microsoft Security Consultant/Architect with strong LLD and Implementation skills. The ideal candidate will have a deep understanding of security principles, excellent problem-solving skills, and a proactive approach to … identifying and mitigating security risks. Day to Day Duties Include:- As a Security Consultant/Architect you will liaise with customers on a consultancy basis, designing bespoke solutions for communicated problems. Working with the wider Security team, you will oversee the implementation of solutions and will provide more »
a high pace and rewarding environment for a great company with a large scope of progression.Ideal Candidate:Ideal Candidate:Have a strong background in informationsecurity, risk management, and compliance, as well as a minimum of 3 years experience in designing and delivering client-facing ISO 27001 related … InformationSecurity consultancy, DPIAs and other Data Protection related services.Develop a Virtual InformationSecurity Advisor serviceDeveloping and ISO 27001 Implementation programmeManaging the existing Internal Audits Managed Service offeringYou will be responsible for carrying out Data Protection Impact Assessments for existing clients, and managing a dedicated Data … Protection offering from the ground up, including:Establishing ROPAEstablishing DPIA questionnaires and processesPerforming DPIAsDesigning and implementing Performing Supplier due diligence processes.Oversee our organisation’s informationsecurity management system (ISMS) in accordance with ISO 27001 standardsConduct risk assessments, manage the company Risk Register and Risk Treatment Plan, and oversee more »
a high pace and rewarding environment for a great company with a large scope of progression.Ideal Candidate:Ideal Candidate:Have a strong background in informationsecurity, risk management, and compliance, as well as a minimum of 3 years experience in designing and delivering client-facing ISO 27001 related … InformationSecurity consultancy, DPIAs and other Data Protection related services.Develop a Virtual InformationSecurity Advisor serviceDeveloping and ISO 27001 Implementation programmeManaging the existing Internal Audits Managed Service offeringYou will be responsible for carrying out Data Protection Impact Assessments for existing clients, and managing a dedicated Data … Protection offering from the ground up, including:Establishing ROPAEstablishing DPIA questionnaires and processesPerforming DPIAsDesigning and implementing Performing Supplier due diligence processes.Oversee our organisation’s informationsecurity management system (ISMS) in accordance with ISO 27001 standardsConduct risk assessments, manage the company Risk Register and Risk Treatment Plan, and oversee more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT Resources Limited
InformationSecurity Threat Detection Specialist 12 Month Fixed Term Contract £45,000 - £50,000 + exceptional benefits Leeds/Hybrid, once per week/month in the office Our client, a very well reputable global business, is looking to hire an enthusiastic InformationSecurity Threat Detection … Specialist to join them as they proceed on their security transformation journey! In this position, you will play a crucial role in the Threat Detection Team and be responsible for configuring and implementing security monitoring tools to detect security incidents, supporting stakeholders across Security and the … Threat Intelligence and Threat Hunting. Knowledge of monitoring tools across SIEM, Automation and Threat Intelligence platforms. Familiarity with networking protocols and the latest cyber security trends. Experience with AWS Security tools - AWS Config Guard Duty, AWS Inspector, AWS Security Hub etc. The Offer: Base Salary more »
Qualifications: Minimum 5 years+ experience leading a Cyber Security Assurance function or similar such as Cyber Security Integration function, Cyber Security Engineering function with some experience in assurance testing techniques and methodologies. Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, related field or equivalent training … and/or experience. Professional InformationSecurity certification by a recognised professional body such as Certified in InformationSecurity Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+ … . Track record leading a security team or function where you have had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and Vulnerability Management programs. Understanding risk, resource availability and business more »
a Group ISMS Manager to join us in either Hove or London! You'll play a key role in maintaining the L&G group InformationSecurity Management System (ISMS), in line with the requirements of the ISO 27001:2022 standard and any iterations thereafter. This is a group … maintain ISO 27001 accreditation within the scope of the group certification What you'll be doing: Supportingdevelopment of the assurance approach for maintaining group informationsecurity policies and standards, in line with ISO 27001:2022 and any iterations thereafter Authoring and maturingthe Group ISMS Operations Manual and Statement … stakeholders to determine the impact of the changes on the delivery of customer outcomes Qualifications Who we're looking for: Previous experience managing an InformationSecurity Management System (ISMS), in line with ISO 27001 requirements. Excellent understanding and practice of IT architecture, infrastructure and informationsecuritymore »
Active SC Clearance requried* Job Summary: The Security Lead will oversee the security aspects of the Oracle Cloud Fusion migration, ensuring that all data and systems are secure throughout the process. This role involves developing security strategies, implementing security controls, and monitoring compliance with security standards. Responsibilities: Develop and implement a comprehensive security strategy for the Oracle Cloud Fusion migration. Ensure compliance with all relevant security standards and regulations. Identify potential security risks and develop mitigation plans. Implement security controls and monitoring mechanisms to protect data and systems. Conduct security audits and assessments to ensure the integrity of the migration process. Provide training and guidance to the project team on security best practices. Monitor and respond to security incidents during and after the migration. Qualifications: Bachelor's or Master's degree in Cybersecurity, InformationSecuritymore »
Technical InformationSecurity Consultant required for market-leading financial services firm. The role will be centred on ensuring security is delivered into a wide range of projects. There will be a focus on working closely with DevOps teams and embedding security throughout a software development life … cycle. Responsibilities: Act as the main security point of contact & SME for required projects Manage security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, and vulnerability management and risk mitigation on internally … externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand Security assessment of various components like Web apps, Containers, Platforms etc Reviewing security assessment reports and create a remediation pipeline Experience in web application security assessments like SAST more »
Cheltenham, Gloucestershire, South West, United Kingdom
Guidant Global
Information Assurance Security Manager On site Gloucestershire Contract £550 - £650 per day inside IR35 We're currently seeking a number of ambitious Information Assurance Security Managers to work with our exceptional client in a secure environment, supporting challenging and highly rewarding projects. These contract roles will … require you to conduct security clearance prior to assignment. The contracts are open to full time (37.5 hours) and part time (22.5 hours) per week onsite. The Information Assurance Security Manager is a member of the business unit/mission area who acts as the primary risk … area and key stakeholders in relation to IA and risk management issues. The primary aim is to help those developing systems to understand the InformationSecurity, Legal and Policy risks and to identify suitable mitigations within, and related to, the relevant Frameworks, working with the wider risk management more »
medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure … we embrace difference. In this role youll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security architectures and solutions that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their … inhouse Information and Cyber Security resources combining expertise in informationsecurity, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk more »
medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure … we embrace difference. In this role youll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security architectures and solutions that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their … inhouse Information and Cyber Security resources combining expertise in informationsecurity, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk more »
medical Life Assurance ComprehensiveEmployee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberforts growth. Youll be joining a culture of knowledge sharing and continuous learning with expert peers in Secure … we embrace difference. In this role youll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security architectures and solutions that match their requirements. Youll work in close partnership with clients to ensure the delivery of expert services by complementing their … inhouse Information and Cyber Security resources combining expertise in informationsecurity, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate, risk more »
Life Assurance Comprehensive Employee rewards package THE ROLE This is an exciting opportunity to join our world class Consultancy arm, as a Technical Cyber Security Consultant, supporting the next phase of Cyberfort’s growth. You’ll be joining a culture of knowledge sharing and continuous learning with expert peers … embrace difference. In this role you’ll work within our Consulting team, supporting new and existing clients across various sectors to define and implement security architectures and solutions that match their requirements. You’ll work in close partnership with clients to ensure the delivery of expert services by complementing … their inhouse Information and Cyber Security resources combining expertise in informationsecurity, solution architecture and business advice. Working across the business and multiple technology platforms, you will play a key role in ensuring our clients make the best use of their existing technology and make proportionate more »
adapt and transform, and together we achieve enduring results.An innovation and transformation consultancy, we are over 4000 specialists in consumer and manufacturing, defence and security, energy and utilities, financial services, government and public services, health and life sciences, and transport. Our people are strategists, innovators, designers, consultants, digital experts … guided by our client work and needs; however, you have autonomy to manage your time and diary to suit your work/life balance.The Security Architect is a key consulting role, working with PA’s clients across the private and public sectors to define security architectures and solutions … to match their business requirements and risks. It will allow you to combine your expertise in informationsecurity, solution architecture and business advice to define secure solutions in some of the most challenging environments. You will have the opportunity to be genuinely creative in providing clients with innovative more »
The Fortune Group are recruiting for a Cyber Security Manager to join are client based in London. Suitable Cyber Security Manger will be responsible for ensuring the confidentiality, integrity and availability of computer systems and sensitive information. The primary responsibility of the Cyber Security manager is to … lead the Cyber Security function in ensuring that existing and new systems introduced into the business adhere to the Security controls mandated by the business. Responsible for Creation and maintaining policies and procedures as well as the Training and awareness activities required. You will support the IT and … business teams in exploiting growth opportunities and managing threats in an assured and optimal way, by creating and maintaining a positive security environment and culture. You will optimise security to add value and protect the brand, enabling the company to retain its trusted position with its investors, customers more »
Job summary This role is part of the ICT Enterprise Security Team which implements and manages the processes and policies to cover all aspects of technical and physical security across all Infrastructure assets. The team also assists in ensuring all new technologies and technical changes adhere to Security … ICT service remains compliant with NHS and industry regulations and standards. An organisation such as the ICB is reliant on its IT systems and information being secure and available at all times. In addition, it is essential that IT Services are delivered in a cost effective manner to industry … wide standards such as ITIL, CE+ and ISO27001. The post holder will provide assistance to the Lead Enterprise Security Manager to ensure all aspectsof Security and related tasks are delivered within timeframes set to budget and within defined scopes.The role is designed to build a combination of subject more »
Senior Information Governance Lead About the Role As the Information Governance Manager, you will lead efforts to ensure NHS England’s compliance with crucial data protection laws such as the UK GDPR and Data Protection Act 2018. You will set IG standards, provide privacy by design support, and … mitigate risks, promote public trust, and drive innovation through effective data governance. Your expertise will be vital in shaping NHS England’s approach to informationsecurity and ethical data use. Role Scope: Length of Contract: This is a fixed-term contract position with a duration of 6 months. … staff. Offering privacy by design advice to ensure the safe, lawful, and transparent handling of personal and patient data. Providing oversight and assurance of information governance compliance across NHS England and its data-sharing partners. Hosting services for the NHS England Advisory Group on Data and the National Data more »