Key Responsibilities To analyse specific security environments across the Group as agreed with the CISO and identify improvements. This will be accomplished through a project life cycle starting by writing a Project Initiation Document (PID) which defines the area to be investigated or evaluated and is completed by agreed … is completed to the timetable. To work closely with the CISO and Quality and Compliance Executive to provide assurance that policies and procedures for InformationSecurity are effective and are adhered to by sampling different areas across the global business (performing internal audits or ensuring they are performed … the sampling, use the findings to be proactive in making recommendations for updates to policies and procedures, as required. To liaise with agreed external security agencies (where required) and ensure that any information requested is provided on a timely and secure basis. To keep up to date with More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
Job Description: In broad terms, you should have as many of the following as possible: Experience of owning a security risk management system for highly regulated products based on recognised frameworks such as aerospace, nuclear, automotive, rail or oil & gas; People management, mentoring and development skills; Practical experience of … The ability to understand complex engineering processes and the inter-dependency of the process components; A passion for promoting and improving the safety and security of complex systems; Broad breadth of engineering experience in order to be able to review project demands and advise on resourcing needs, development, delivery … Engineer status with a recognised body; Awarded or looking to achieve an NCSC Certified Cyber Professional (CCP) recognition; Awareness of InformationSecurity (INFOSEC), Communications Security (COMSEC), Transmission Security (TRANSEC), Product Safety and their inter-relationship; Experience of producing and delivering training/awareness material within a More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
ESK Recruitment LTD
A globally established engineering company with a strong focus on employee development (average tenure of six years) is hiring an InformationSecurity Manager to join its Aberdeen-based team. This role leads the Cybersecurity Centre of Excellence and acts as the key link between the broader goals set … by senior cybersecurity leadership and the technical execution carried out by security engineers, architects, and analysts. The position involves converting risk and compliance needs into actionable security frameworks, defining metrics for performance, and managing key infrastructure and governance activities. Key Responsibilities: Lead cybersecurity-related projects and maintain strong … relationships with external vendors. Ensure service levels are met and maintained across all cybersecurity services. Manage security-focused technical staff and coordinate their efforts with broader IT operations. Support the Cybersecurity Director in the creation and execution of security programs. Track and report on newly emerging threats, risks More ❯
aberdeen, north east scotland, United Kingdom Hybrid / WFH Options
ESK Recruitment LTD
A globally established engineering company with a strong focus on employee development (average tenure of six years) is hiring an InformationSecurity Manager to join its Aberdeen-based team. This role leads the Cybersecurity Centre of Excellence and acts as the key link between the broader goals set … by senior cybersecurity leadership and the technical execution carried out by security engineers, architects, and analysts. The position involves converting risk and compliance needs into actionable security frameworks, defining metrics for performance, and managing key infrastructure and governance activities. Key Responsibilities: Lead cybersecurity-related projects and maintain strong … relationships with external vendors. Ensure service levels are met and maintained across all cybersecurity services. Manage security-focused technical staff and coordinate their efforts with broader IT operations. Support the Cybersecurity Director in the creation and execution of security programs. Track and report on newly emerging threats, risks More ❯
InformationSecurity Analyst/Manager £600 p/day (Outside IR35) 4 Days per Week Onsite (London) BurnsSheehan are exclusively partnering with one of Britain's most successful FinTech's who offer card payment solutions, designed to streamline transactions and enhance customer relationships. As they continue their growth … they are engaging with larger customers who are wary of security, particularly around SOC 2 and data protection. As a result, they are looking for a highly skilled and experienced InformationSecurity Analyst/Manager to help lead them through an end-to-end SOC 2 implementation. More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom Hybrid / WFH Options
KPMG UK
Experienced professional (kpmgcareers.co.uk) As a result of the work that we do, we require applicants to hold or be capable of obtaining UK National Security Vetting, the requirements for which could include but not be limited to having resided in the UK for at least the past 5 years … At the end of the day, your well-being is what matters most. What will you be doing? Help manage and co-ordinate cyber security incidents for our clients, working closely with the incident management lead within the team. Digital forensics of relevant incident data (disk, volatile memory, network … to do it? As a result of the work that we do, we require applicants to hold or be capable of obtaining UK National Security Vetting, the requirements for which could include but not be limited to having resided in the UK for at least the past 5 years More ❯
in the last 18 months and are evolving our Marketing structure to reflect that. About the role We are seeking a hands-on IT & InfoSec Manager to own and scale our IT and security functions in a growing FinTech company. As our first in-house IT hire, you will … needs. Plan and budget for IT and security investments, including hardware, software, and services. Work closely with other departments to align IT and InfoSec initiatives with business objectives. Regularly assess the performance of the MSP, identify gaps, and refine the division of responsibilities between in-house and outsourced IT … programs on cybersecurity practices. What you'll need to succeed 5+ years of experience in IT management or system administration 2+ years in an InfoSec-related role Technical Skills: Proficiency in managing SaaS platforms like Microsoft 365, and endpoint management tools (e.g., Jumpcloud). Strong understanding of network infrastructure, including More ❯
industry; as well as our internally used cloud applications and on-prem equipment. Also acting as the liaison with the larger Verisk group for security as well as infrastructure issues. To contribute to the strategy of the team, meet the Company's goals and objectives, and improve the quality … automated software deployment and monitoring at every opportunity; Provide sensible estimates for work items and consistently deliver against them; Support the ongoing modernization process. Security: Maintain an understanding of the regulatory and compliance issues driving Sequel's ISMS; With leaders across the business, assist with the maintenance and management … of Sequel's Risk Registers; Gain an understanding of the key information risks to the business (systems, networks, data, human error, cyber-attacks); Engage in informationsecurity audits, in support of the ongoing measurement of risks and the reduction thereof; Report (qualitatively and quantitatively); Manage SecurityMore ❯
Security Analyst – 2nd Line SDA Division: ICT Services Department: ICT Service Desk Operations Reports to: Service Desk Team Leader Main Goal The Service Desk Analyst - Security Analyst (2nd line) role is to support the stable operation of clients Infrastructure and Applications with a specific focus on IT Security. … customers to ensure a consistent experience. Adopt a proactive approach towards all client activities. Day to day incident management and proactive monitoring of IT Security Systems and associated platforms and components Coordinate small teams delivering security related work packages in line with the company process to meet customer … and business requirements. Document and report on work completed to ensure security compliance with customer and company procedures . Escalate issues in line with company processes to ensure customer demands are met. Evaluate escalations and action appropriately to ensure customer demands are met. Able to adapt quickly to dynamic More ❯
Advert closes: Tuesday 11th February Are you passionate about cyber security and eager to make a significant impact ? The Crown Estate is on a mission to create lasting and shared prosperity for the nation. We are seeking a Cyber Security Solution Architect to join our dynamic team and … At The Crown Estate, we are committed to business reinvention with digital transformation at its core. Under the leadership of the CISO, our Digital Security team ensures resilience against cyber-attacks, data breaches, and other informationsecurity risks. We aim to: Enable the successful adoption of digital … technologies and unlock associated business benefits. Fulfil our legal and moral duty to protect the information of the public, our customers, and our staff. Enhance our reputation as a trusted brand, responsibly generating value and financial returns for the country. As a Cyber Security Solution Architect, you will More ❯
Senior Security Consultant, Professional Services, UK NatSec, WWPS Job ID: AWS EMEA SARL (UK Branch) Are you interested in being part of AWS, the industry leading cloud computing platform? Are you excited about building security solutions at scale? Do you want to help UK public sector organisations operate … the cloud and better achieve their missions through the secure adoption of AWS? Eager to learn from many different organisations' use cases of AWS security services? Our Worldwide Public Sector Professional Services organisation works together with our AWS customers to address their security needs. At AWS, we're … hiring highly passionate and deeply technical Security Consultants to help our customers build comprehensive security models, transform how they secure their sensitive workloads and develop their technical expertise. Our security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects More ❯
Senior Security Consultant, Professional Services, UK NatSec, WWPS Job ID: AWS EMEA SARL (UK Branch) Are you interested in being part of AWS, the industry leading cloud computing platform? Are you excited about building security solutions at scale? Do you want to help UK public sector organisations operate … the cloud and better achieve their missions through the secure adoption of AWS? Eager to learn from many different organisations' use cases of AWS security services? Our Worldwide Public Sector Professional Services organisation works together with our AWS customers to address their security needs. At AWS, we're … hiring highly passionate and deeply technical Security Consultants to help our customers build comprehensive security models, transform how they secure their sensitive workloads and develop their technical expertise. Our security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects More ❯
UK Right to Work Bridge are delighted to be recruiting for one of our clients based in North East looking to recruit an experienced InformationSecurity Manager role. Requirements: Previous experience as an InformationSecurity Manager leading cyber/data security & compliance teams in a More ❯
in Business or a related field. Travel Requirements: 50% of your time in the field working at tradeshows and meeting with customers/clients. InformationSecurity: Informationsecurity is everyone's responsibility. All individuals in the organization are responsible for the security and protection of … company information and IT resources, according to their role. Diversity, Inclusion & Equity: At Rocket, we are committed to an inclusive workplace where every employee can thrive by bringing their full selves to work. We aim to continually promote inclusivity, diversity, and equity. This position is eligible for commissions according More ❯
We are sourcing Cyber (Resiliency) Security Architects of all levels for our client who is a Global Leader within their field. These positions are for the UK division working remotely, except for the occasional client visit. Candidates must be located and authorized to work in the UK without any … visa requirements . Job Role Take the lead on developing, implementing, and maintaining our security strategy within their Service Provider organization. Work closely with our leadership team to design and implement effective security solutions that not only protect our business objectives and regulatory requirements but also provide innovative … emerging threats. Conduct risk assessments and threat modeling to identify and prioritize risks to our business and IT assets, using your extensive experience in security architecture design. Implementation within a Service Provider environment to create a cutting-edge security architecture framework. Work to maintain policies, standards, and guidelines More ❯
in the following areas: strategy, finance, human resources, portfolio and project management, asset and vendor management, and compliance with state and federal privacy and security laws. The DMD is also responsible for ensuring a strong, functional internal and external client satisfaction program, oversight of the organization's incident response … driving key projects and managing staff. A key aspect of this role is coordinating with internal and external partners, including UMass Chan IT and InformationSecurity, as well as managing relationships with development partners. The DMD covers for the MD in their absence. Responsibilities Operational Oversight: Lead and … the key liaison between Digital Solutions key business units and external clients to address operations needs and issues. Liaison with UMass Chan IT/Infosec: Act as the primary liaison between the Digital Solutions department and UMass Chan IT and InformationSecurity teams to ensure alignment on technical More ❯
The team you'll be working with: Job Title: Senior Security Consultant (Architecture - AI Specialist) Overview: We are seeking a highly skilled and experienced Security Architect with a strong specialization in Artificial Intelligence (AI) security. The ideal candidate will be responsible for designing, implementing, and maintaining robust security architectures for AI-powered applications and infrastructure. You will play a critical role in identifying and mitigating security risks associated with AI, ensuring data privacy, and promoting ethical AI practices. This role requires a deep understanding of both traditional security principles and the unique challenges posed by … AI technologies. What you'll be doing: AI Security Architecture: Design and implement secure architectures for AI/ML models, data pipelines, and related infrastructure. Develop security policies and procedures specific to AI systems. Evaluate and select security tools and technologies for AI environments. Risk Assessment and More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Mobile Broadband Network Limited
Reporting to the Head of InformationSecurity, the Security Regulatory Compliance Manager is integral to safeguarding the organization's assets, ensuring smooth operations, and maintaining a positive reputation with key stakeholders, regulators, and the wider industry. This role ensures MBNL's compliance with security regulations such … as TSA, DPA, and CSR, supporting program delivery, security teams, and managed service providers. This role is also fundamental in ensuring MBNL meets its regulatory obligations under TSA by maintaining its ISO27001 certification. What you can expect to be doing: • Deliver security regulatory compliance and manage associated governance … returns. • Balance regulatory compliance with business impact, ensuring controls are effective without hindering business operations. • Oversee Managed Service Providers (MSPs) who manage IT and security for MBNL. Ensure they meet security regulatory compliance and MBNL security requirements. • Chair and manage various governance forums. Gain agreements, understand and More ❯
cutting-edge research from the Technology Innovation Institute (TII) to develop AI products that drive transformative change. We are seeking a skilled and proactive Security Engineer to protect our AI systems, data, and infrastructure against evolving security threats. In this role, you will design, implement, and manage security measures to ensure the confidentiality, integrity, and availability of our systems. You will collaborate with cross-functional teams to embed security into every layer of our development and deployment processes. Key Responsibilities Security Design and Implementation: Design and implement security architectures for AI systems, cloud environments … and data pipelines. Integrate security into the software development lifecycle (SDLC) to ensure secure coding practices. Threat Detection and Response: Monitor and analyze security events to detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Vulnerability Management: Perform regular More ❯
cutting-edge research from the Technology Innovation Institute (TII) to develop AI products that drive transformative change. We are seeking a skilled and proactive Security Engineer to protect our AI systems, data, and infrastructure against evolving security threats. In this role, you will design, implement, and manage security measures to ensure the confidentiality, integrity, and availability of our systems. You will collaborate with cross-functional teams to embed security into every layer of our development and deployment processes. Key Responsibilities Security Design and Implementation: Design and implement security architectures for AI systems, cloud environments … and data pipelines. Integrate security into the software development lifecycle (SDLC) to ensure secure coding practices. Threat Detection and Response: Monitor and analyze security events to detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Vulnerability Management: Perform regular More ❯
Delivery Consultant (Security), Professional Services, UK NatSec, WWPS Job ID: AWS EMEA SARL (UK Branch) The Amazon Web Services Professional Services (ProServe) team is seeking a skilled Delivery Consultant (Security) to join our team at Amazon Web Services (AWS). In this role, you'll work closely with … solutions that meet their technical requirements and business objectives. You'll be a key player in driving customer success through their cloud journey, providing security expertise and best practices throughout the project lifecycle. Our technical Security Consultants help our customers build comprehensive security models, transform how they … secure their sensitive workloads, and develop their technical expertise. Our security consultants deliver architecture guidance, develop security infrastructure and patterns in code, lead proof-of-concept projects, and conduct security workshops for customers. AWS security consultants collaborate with customers to address security and compliance challenges More ❯
of client requests for information. The Role As an IT Bid Assistant you will provide responses to client questionnaires and bid documents from an informationsecurity and IT perspective. This is an excellent opportunity for professionals with a legal, document review or computer science background, who are looking … to work in a fast-paced global business. The Responsibilities Review client requirements to ensure InformationSecurity and technical IT requirements are accurately submitted, using standard responses Highlight risks and exceptions using standard responses and processes Maintain the InformationSecurity & IT responses template The Requirements Experience … detail Good analytical and problem-solving skills Well organised, with good verbal and written communications skills Analytically minded, able to break down and understand information Customer-focused If you are looking for an exciting new challenge to join a leading global service provider, please apply now. Modis International Ltd More ❯
new heights, this opportunity is for you. In a nutshell The principal purpose of the role is to identify, contain, eradicate, and recover from informationsecurity incidents. Assisting the Information and Cyber Security Management team in implementing improvement initiatives that increase our maturity across our Threat … Management capabilities. The role will require extensive Incident Response experience including developing threat hunting capabilities, security use cases and playbooks. Day to day Development of the tools and processes to establish and improve the threat hunting program. Keeping an up-to-date understanding of the cyber threat landscape through … threat intelligence and industry research. Define and design new security use cases and alerts to identify evolving attack scenarios. Participate in industry-based Threat Intelligence sharing groups. Produce reports based on threat activity, trends and reported industry incidents. Leading security incident response processes with support from the principal More ❯
Senior Security Operations Analyst page is loaded Senior Security Operations Analyst Apply locations Cannon Street, London time type Full time posted on Posted 3 Days Ago job requisition id R_13911 Job Title Senior Security Operations Analyst Job Description As one of Europe's leading investment platforms … security at IG is a top priority and our Security Operations team is looking for a Senior Security Operations Analyst to help further enhance our security framework. Who are we: Hello, we're IG Group. No, not Instagram - though we're a pretty big deal ourselves. … cross-functional teams, focused on delivering at pace to improve the experience of traders on our platforms. Your Position within the Team: IG's Security Operations team (SOC) is responsible for managing security-related events within IG. The team's goals are to ensure that security incidents More ❯
Technical Head of InformationSecurity required for financial services firm. The role will be both strategic and technically hands on as it's a small function. What You'll Do Lead and support a small, global cybersecurity team. Create and manage a strategic security plan aligned with … company goals and ISO 27001. Proactively identify and address security risks and threats. Respond to and manage cybersecurity incidents and breaches. Conduct risk assessments, penetration tests, and other security evaluations. Keep senior leadership updated on security posture and key metrics. Build relationships with security leaders in … threats and trends. Ensure compliance through audits and incident response exercises. Collaborate with tech teams to ensure secure software and infrastructure. Manage third-party security vendors and track their performance. Run regular training to promote cybersecurity awareness across the company. What You Bring Experience leading high-performing global securityMore ❯