Team (QRM) provides leadership, guidance, and tools to help partners and staff manage quality and risk matters. The team is comprised of an Advisory and Compliance Team, a Chief InformationSecurity Office Team, an Economic Crime Team, a Legal Team including a Commercial & Contracts Team, the Independence and Ethics Team and the Regulatory Supervisory Team, plus the Quality … opportunities for enhancing our delivery and providing additional services to organisations we work with.Role Purpose The Third Party Risk Manager is responsible for implementation of the BDO third party security framework. This includes assessing the informationsecurity risks of our 3rd parties, by evaluating the 3rd parties' security controls and ensuring supplier and supply chain informationsecurity risks to BDO and BDO client services are identified, assessed and managed. This role reports to the InformationSecurity Manager. Principal AccountabilitiesLeads in the execution and continuous improvement of the informationsecurity supply chain framework, which includes ensuring that security controls are implemented within the supply chain lifecycle at BDO Co-ordinates More ❯
Team (QRM) provides leadership, guidance, and tools to help partners and staff manage quality and risk matters. The team is comprised of an Advisory and Compliance Team, a Chief InformationSecurity Office Team, an Economic Crime Team, a Legal Team including a Commercial & Contracts Team, the Independence and Ethics Team and the Regulatory Supervisory Team, plus the Quality … opportunities for enhancing our delivery and providing additional services to organisations we work with.Role Purpose The Third Party Risk Manager is responsible for implementation of the BDO third party security framework. This includes assessing the informationsecurity risks of our 3rd parties, by evaluating the 3rd parties' security controls and ensuring supplier and supply chain informationsecurity risks to BDO and BDO client services are identified, assessed and managed. This role reports to the InformationSecurity Manager. Principal AccountabilitiesLeads in the execution and continuous improvement of the informationsecurity supply chain framework, which includes ensuring that security controls are implemented within the supply chain lifecycle at BDO Co-ordinates More ❯
Team (QRM) provides leadership, guidance, and tools to help partners and staff manage quality and risk matters. The team is comprised of an Advisory and Compliance Team, a Chief InformationSecurity Office Team, an Economic Crime Team, a Legal Team including a Commercial & Contracts Team, the Independence and Ethics Team and the Regulatory Supervisory Team, plus the Quality … opportunities for enhancing our delivery and providing additional services to organisations we work with.Role Purpose The Third Party Risk Manager is responsible for implementation of the BDO third party security framework. This includes assessing the informationsecurity risks of our 3rd parties, by evaluating the 3rd parties' security controls and ensuring supplier and supply chain informationsecurity risks to BDO and BDO client services are identified, assessed and managed. This role reports to the InformationSecurity Manager. Principal AccountabilitiesLeads in the execution and continuous improvement of the informationsecurity supply chain framework, which includes ensuring that security controls are implemented within the supply chain lifecycle at BDO Co-ordinates More ❯
Team (QRM) provides leadership, guidance, and tools to help partners and staff manage quality and risk matters. The team is comprised of an Advisory and Compliance Team, a Chief InformationSecurity Office Team, an Economic Crime Team, a Legal Team including a Commercial & Contracts Team, the Independence and Ethics Team and the Regulatory Supervisory Team, plus the Quality … opportunities for enhancing our delivery and providing additional services to organisations we work with.Role Purpose The Third Party Risk Manager is responsible for implementation of the BDO third party security framework. This includes assessing the informationsecurity risks of our 3rd parties, by evaluating the 3rd parties' security controls and ensuring supplier and supply chain informationsecurity risks to BDO and BDO client services are identified, assessed and managed. This role reports to the InformationSecurity Manager. Principal AccountabilitiesLeads in the execution and continuous improvement of the informationsecurity supply chain framework, which includes ensuring that security controls are implemented within the supply chain lifecycle at BDO Co-ordinates More ❯
Team (QRM) provides leadership, guidance, and tools to help partners and staff manage quality and risk matters. The team is comprised of an Advisory and Compliance Team, a Chief InformationSecurity Office Team, an Economic Crime Team, a Legal Team including a Commercial & Contracts Team, the Independence and Ethics Team and the Regulatory Supervisory Team, plus the Quality … for enhancing our delivery and providing additional services to organisations we work with. Role Purpose The Third Party Risk Manager is responsible for implementation of the BDO third party security framework. This includes assessing the informationsecurity risks of our 3rd parties , by evaluating the 3rd parties' security controls and ensuring supplier and supply chain informationsecurity risks to BDO and BDO client services are identified , assessed and managed. This role reports to the InformationSecurity Manager. Principal Accountabilities Leads in the execution and continuous improvement of the informationsecurity supply chain framework , which includes ensuring that security controls are implemented within the supply chain lifecycle at BDO Co More ❯
We are looking for an enthusiastic and detail-oriented Data Protection Manager to join our growing informationsecurity and data protection team. This is an ideal opportunity for someone with existing data protection knowledge and experience to further their career in informationsecurity and data protection. The Role: The Data Protection Manager will be responsible for … driving the technical implementation of data protection practices across our systems and infrastructure. You will work collaboratively with the wider InformationSecurity team to deliver a consistent and easily understood approach. Reporting to the Director of InformationSecurity and Data Protection Officer, you will play a hands-on role in ensuring that our platforms, applications, and … third-party services are aligned with data protection policies, regulatory requirements, and informationsecurity best practices. The ideal candidate is eager to learn and grow within the data protection and informationsecurity fields while contributing to the team's efforts to protect our organisation's data and IT infrastructure. This role focusses on the operational aspects More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
InstaVolt
self-service capabilities for common support tasks to improve efficiency and user experience. Collaborate with the CTO and technology leaders to align IT strategies with business goals, supporting scalability, security, and regulatory compliance. Manage and optimise hybrid cloud environments (e.g., Azure, AWS, Google Cloud) in support of internal services and business operations. Deliver demonstrable progress in the company's … support team, including recruiting, coaching, performance management, and professional development. Manage relationships with external vendors, MSPs, and technology partners to ensure cost-effective and reliable service delivery. Collaborate with InfoSec and Legal teams to ensure compliance with relevant regulations (e.g., ISO 27001, GDPR). Lead incident response and disaster recovery planning/testing for internal platforms and operational IT. Requirements … Needed: Bachelor's degree in information technology, Computer Science, or related experience. 10+ years of experience in IT operations and support services, with at least 5 years in a leadership role. Proven experience managing enterprise IT systems, cloud platforms, and service desk operations in a 24 7 environment. Strong knowledge of ITSM frameworks and modern collaboration tools (e.g., M365 More ❯
research and make recommendations on products, services, protocols, and standards in support of all infrastructure procurement and development efforts Assist with the planning and deployment of infrastructure and cloud security measures Develop, implement, and maintain policies, procedures, and associated training plans for cloud administration Ensure services conform to the agreed compliance requirements set forth by current and planned accreditations … to continuously optimise systems and processes, using stakeholder feedback, taking account of technological improvements and new design patterns with cloud technologies Key Working Relationships Internal: Economists/Business Analysts Information Technology/Infrastructure Architects CIO/Head of IT Marketing & Business Development External: As Required Skills, Knowledge & Expertise Required: 6+ years of experience in IT Support and Operations Excellent … communication skills. You will have a natural ability to build rapport with stakeholders at all levels to influence decisions Proven experience in IT infrastructure, Cloud and Security systems planning and development following best practices and informationsecurity Significant experience with Microsoft Azure, Intune, PIM and storage accounts Experience in evaluation and decision making Working technical knowledge of More ❯
The IT Security Operations Center's mission is to preserve the confidentiality, integrity, and availability of our assets by identifying operational and security risks and collaborating with business, functional, and customer stakeholders to develop plans that manage risk to acceptable levels. We are currently seeking a Sr. Cyber Incident Response Analyst to join our team. About the Role … Monitor for and investigate suspicious or malicious activity and alerts Review Change Management requests for security relevance and impact Daily review of system, application logs, and custom monitoring tools Malware and Advanced Persistent Threat (APT) analysis and remediation Incident Response and Investigations Availability for rotating on-call shifts (up to 2 - 3 times per year) About You Bachelor's … degree preferred or equivalent related field experience Professional Certifications preferred, including SANS GIAC or CISSP Microsoft, Linux, Networking or related certifications a plus. Experience in Information Technology Extensive experience in informationsecurity incident response and operations management Extensive experience of OS, application, and network security weaknesses, vulnerabilities, and remediation Experience researching, analyzing, and resolving complex problems More ❯
changes are carefully evaluated, approved, and properly communicated to affected stakeholders. • Ensure that all incidents, changes, and requests are tracked and properly documented for reporting purposes. User Management and Security: Initially required to establish a working Security group for the business and subsequently to own the implementation and processes within ITSM. Oversee user account management processes for systems … like Microsoft O365, ensuring proper account provisioning, modification, and deactivation. Ensure that security protocols such as Zero Trust are enforced and that sensitive information is handled in accordance with company policies and compliance requirements. Facilitate regular reviews of access controls, permissions, and security posture. System Maintenance and Performance Optimisation: • Manage the scheduling and execution of preventive maintenance … management certification. A minimum of 5+ years of experience in IT support or service operations management. Good understanding of IT infrastructure, systems, and applications, as well as experience with security frameworks (e.g., Zero Trust). Strong understanding of cybersecurity principles (e.g., Cyber Essentials, CompTIA Security+). Ability to manage complex technical issues while maintaining a focus on customer service More ❯
Go back Kingston and Richmond NHS Foundation Trust Chief Technology Officer Information: This job is now closed Job summary The Chief Technology Officer (CTO) is responsible for the development, implementation, and management of a comprehensive Digital Technology architecture and solutions across technology and data, and in areas such as enterprise architecture, innovation management, and data integrity whilst supporting wider … priorities and plans for service development.4. Present to senior groups as required to ensure DDAT issues maintain a high profile, including the presentation of highly complex, sensitive or contentious information when significant barriers to acceptance exist, potentially challenging environments.5. Promote the value and importance of effective DDAT throughout the Trust.6. Provide professional leadership for the wider digital community within … awards. Wherever you work across our organisation, we look forward to welcoming you. Job responsibilities Please see the attached supporting job description and person specification document, which contains more information about the role and requirements. Please ensure your application refers to the job description and person specification Person Specification Qualifications Masters or relevant industry experience Professional certification in relevant More ❯
make a difference. Position Summary This is a great opportunity to grow your career and lead enterprise engagements as a Senior Consultant! In this position you will assess the security and compliance of client firms against regulatory and industry requirements and standards, and against security best practice frameworks. You will have a strong understanding of framework requirements, perform … timelines and deliverables. As a Senior Consultant, you will regularly interact with peers and clients as both an auditor and assessor, depending on the engagement. This role will audit information systems with confidence and accuracy to ensure the integrity and effectiveness of security measures. You will test technical controls, policies and procedures, laws, regulations, and industry best practices. … sales. Travel 25-50%. Ability to be successful when working remotely. What You'll Bring Current PCI-QSA certification preferred (will consider former QSA) One of the following InformationSecurity certifications required: CISSP, CISM or ISO 27001 Lead Implementer. One of the following Audit certifications required: CISA, GSNA, CIA, IRCA ISMS Auditor or higher, or ISO More ❯
execute innovative compliance testing programs. Manage deep-dive investigations into technology processes. Conduct regular risk assessments and provide recommendations. Prepare and present reports to senior leadership on IT and security risk posture and attack surface. Develop and implement innovative IT risk monitoring solutions. Partner with first and second line of defence stakeholders, including risk managers and security leads … to effectively address ICT and security risks. Leverage data analytics to revolutionize compliance assurance. Drive continuous improvement in our Assurance Program. Stay up to date with emerging threats, regulations and their impact on IT assurance. BASIC QUALIFICATIONS Experience in compliance, audit or risk management. Bachelor's degree or equivalent. Proven experience in developing and executing compliance or audit testing … frameworks. 7+ years of progressive experience within financial services in informationsecurity, cybersecurity, operational resilience and/or privacy risk. Analytical mindset with a talent for problem-solving. Excellence in stakeholder management and communication. Ability to thrive in a fast-paced, innovative environment. PREFERRED QUALIFICATIONS Master's degree or equivalent. Highly valued payments systems experience. Second line risk More ❯
to include RIB and ETAP as part of the software group. This involves leading the existing team, driving the IDAM transformation program, and aligning with business objectives to integrate security and compliance seamlessly into business processes. The role includes developing the IDAM strategy, delivering a step change in how IDAM is approached, owning IDAM platforms, governance, and processes, and … fostering collaboration across HR, IT, R&D, Procurement, and Security teams to safeguard the organization's digital assets while enabling secure and effective user experiences. Key Responsibilities Develop and implement IDAM strategies, solutions, and policies to safeguard sensitive data and ensure compliance with business objectives and internal policies. Lead the team in managing user access provisioning, de-provisioning, authentication … Act as a subject-matter expert on all IDAM disciplines, including identity lifecycle, governance, access management (SSO, MFA), and identity verification. Collaborate across HR, IT, R&D, Procurement, and Security teams to align security requirements and drive the adoption of IDAM systems within the business. Evaluate and implement emerging IDAM technologies to enhance security, user experience, and More ❯
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … analysis support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practice in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec's technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo's to provide independent challenge More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
Aztec
governance model for managing Technology risks. Risk Identification, Assessment and Mitigation Lead the 2LoD oversight of Technology risks including identifying, assessing and monitoring risks related to technology infrastructure, cyber security, data, AI and resilience. Oversee and challenge the Technology risk and control environment, including both their Principal and Risk and Control Self-Assessment (RCSA) processes. Conduct independent assurance reviews … to support risk-based decision-making. Report emerging technology risks within risk governance as part of integrated risk reporting. Provide subject matter expertise on emerging technology risks, including cloud security, AI, operational resilience, and data privacy. Risk Culture and Awareness Take a lead role in embedding a strong risk culture across Technology functions. Drive risk maturity within Technology functions … and sharing best practices in clear easy to understand language. Deliver training programmes on technology, cyber, and resilience risks. Strategic challenge of Aztec's technology, data, AI and cyber security strategies, and be able to articulate and assess the associated risks. Lead 2LoD oversight on Technology related transformation initiatives including attendance at project SteerCo's to provide independent challenge More ❯
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
that matter, achieve, and sustain operational excellence. You will be at the heart of fulfilling our mission by working closely with our Global Operations teams, Business operations teams, and Security operations teams to develop plan and execute IT Continuity Services across multiple Data Centers and geographic regions. The role requires advanced skills that enable the individual to deliver a … activities Participate in a 24x7x365 on-call rotation Respond to and manage service issues and problems Responsible for awareness and compliance to policy and guidelines Report any breaches in informationsecurity or policies Identify repeatable operational tasks and issues; create automated resolutions to these situations to reduce operational overhead within the virtualization function as well as other enabling More ❯
will be beneficial Process Automation, BPM and Digital Platforms, e.g. Pega Cloud technology (knowledge of any or all of Azure, AWS and Google would be beneficial) Experience of handling informationsecurity and privacy challenges Interest and awareness in emerging technologies Experience of vendor packages. An appreciation of Artificial Intelligence and Machine Learning Academic and prior experience A university … as possible. Join us in building a better working world. Apply now. Who we are Please note: Prior to finalizing your application, you will be asked to provide personal information across several dimensions of diversity and inclusiveness click apply for full job details More ❯
will be beneficial Process Automation, BPM and Digital Platforms, e.g. Pega Cloud technology (knowledge of any or all of Azure, AWS and Google would be beneficial) Experience of handling informationsecurity and privacy challenges Interest and awareness in emerging technologies Experience of vendor packages. The following are of particular interest: An appreciation of Artificial Intelligence and Machine Learning More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
McCabe & Barton
A leading Financial Services client is now looking for an InformationSecurity Consultant on a permanent basis. The role is offering a base of £75,000 (with flexibility) plus an attractive benefits package. The client has offices in London and on the South Coast, and hybrid/remote working is available. As a pivotal second-line team member … you will collaborate closely with the InformationSecurity Manager to safeguard the organisation against cyber, information, physical, and technical security risks. Your expertise will drive robust governance frameworks, policy management, and compliance with industry standards, ensuring the protection of our systems, suppliers, and people. You’ll play a key role in ensuring the systems, suppliers, and … people comply with security standards and regulations. From assessing technical controls and supplier risks to supporting incident response and contributing to the PCI-DSS and ISO 27002:2022 compliance, this is a role where you’ll make a visible impact. Candidate Qualifications and Skills Experience in Financial Services : Proven background working within the financial services sector, with an understanding More ❯
team of experts have extensive knowledge and experience in the financial services sector and are passionate about delivering solutions that make a difference. The Role We are seeking an InformationSecurity & Business Continuity Analyst to join our team. This role is crucial in ensuring the security and integrity of our information systems and data. You will … be responsible for implementing and maintaining security measures to protect our organisation's assets from cyber threats and ensuring compliance with industry standards. Key Responsibilities Assist in the planning and implementation of security controls and testing to ISO27001 standards, including developing and enforcing security policies and best practices to ensure compliance. Perform business impact analyses (BIA) across … key technology processes, systems and facilities and identify any gaps that may exist in critical information gathered and recorded. Support the IS Manager in Disaster Recovery (DR), and Business Continuity (BC) planning activity, ensuring that alternate facilities are provisioned and ready in the event of a disaster. Threat Management – assist with threat assessment and work with business units in More ❯