Peterlee, County Durham, United Kingdom Hybrid / WFH Options
Everflow Limited
be passionate about communication and collaboration, continual improvement and will possess a 'can do' approach to their work. You will have an automation-first approach to delivery, which considers security at every layer, and be able to design efficient cloud-based solutions. We are a Microsoft-house with a focus on being cloud agnostic through evolution in our technology … the platform strategy including design of secure cloud solutions working alongside our Enterprise and Solution Architects becoming the steward of our cloud infrastructure. • Be a leader in relation to InformationSecurity, especially in cyber security and DevSecOps, providing advice and support to colleagues around the business. • Take a lead in continual delivery following an automation-first approach … pipelines. • Promoting and maintaining good practice in relation to engineering principles, including TDD, DRY & SOLID, to safeguard code quality and overall system design. • Evaluating new technologies to improve efficiency, security, and scalability • Building out proofs-of-concept to support technology evaluation or product pipeline research. • Providing expertise in enterprise level authentication security • Providing out of hours support such More ❯
Net Talent are delighted to be partnering with an ambitious Managed Security Service Provider established in Scotland with a growing global footprint. They are driven to help protect organisations against the rising threat of cyber-attacks in an ever-evolving digital world. The have become a known Microsoft Security Partner with NCSC status as well as several prestigious … deliver exceptional client services. This role is critical in maintaining business continuity by providing first-line technical support, incident management, and problem resolution while upholding the highest standards of informationsecurity that our clients expect. Technical Support & Incident Management Provide technical support via phone, email, and ticketing systems for hardware, software, and network issues Triage and prioritise incoming … rights across various systems and applications Deploy and configure new hardware and software according to company standards Monitor system performance and proactively identify potential issues before they impact operations Security & Compliance Ensure all support activities comply with cybersecurity best practices and industry standards Assist with security incident response when required, following established protocols Maintain strict confidentiality of sensitive More ❯
fast-moving, delivering a comprehensive range of professional services and managed services both onsite and remotely. The Cyber Practice consists of highly skilled professionals delivering a myriad of offensive security testing and governance, risk, and compliance (GRC) services in support of Claranet’s vision. Taking a customer first approach, Claranet’s Cyber Practice prides itself in providing world-class … services designed to meet the specific and individual needs of all customers, across all industries. Position Summary As a Security Consultant, you will be responsible for delivering customer projects across a range of GRC services in line with your current capabilities, and future capabilities after suitable training/mentoring. You will be responsible for providing professional service delivery including … but not limited to; consultancy services and audit/assessment services against multiple security compliance frameworks/standards, and delivery of other GRC consultancy services as required to service our customers’ needs. This role will require additional activities as part of your job responsibilities to support the delivery of services which will include, but not limited to; customer scoping More ❯
alignment. Present continuous improvement and process optimisation solutions for clients. Support system testing in conjunction with IT and operations. Comply with all company policies and procedures, including Health & Safety, InformationSecurity, Site Security, and GDPR. Perform any other reasonable and appropriate duties. Qualifications, Skills, and Attributes: Significant experience working with the SAP platform in a warehouse environment More ❯
Employment Type: Permanent
Salary: £30000 - £32000/annum Leading Benefits package
alignment. Present continuous improvement and process optimisation solutions for clients. Support system testing in conjunction with IT and operations. Comply with all company policies and procedures, including Health & Safety, InformationSecurity, Site Security, and GDPR. Perform any other reasonable and appropriate duties. Qualifications, Skills, and Attributes: Significant experience working with the SAP platform in a warehouse environment More ❯
ITC Infotech is looking for a Cyber Security Analyst to join our team in Edinburgh, UK. Your X-Factor Work ethic - You are a consummate professional. Aptitude - You have an innate capacity to transition from project to project without skipping a beat. Communication - You have excellent written and verbal communication skills for coordination across projects and teams. Impact - You … You have the drive to succeed paired with a continuous hunger to learn. Leadership - You are trusted, empathetic, accountable, and empower others around you. Working as a member of InformationSecurity team, the Cyber Cloud Monitoring Analyst is part of the global team that is responsible for providing 24/7 real-time monitoring of the firm's … cloud security posture within Azure, AWS, and CGP. This team is also responsible for incident identification, documentation, remediation and tracking for all cloud services. More specifically, the Supplier Personnel will support the global Cyber Cloud Monitoring function and have following key responsibilities: Perform investigation and escalation for complex or high severity security threats or incidents and handles and More ❯
Fully remote (UK based), United Kingdom Hybrid / WFH Options
VC Talent
global impact, now hiring (fully remote UK based) A rare senior leadership opportunity that's perfect for a seasoned CISO, Director of InformationSecurity, or Head of InfoSec & Data. In today's landscape of escalating cyber threats, we're seeking a leader who has already stood at the frontline. Guiding complex organisations through high-pressure incidents with clarity … at the highest levels. Translating complex risk into simple, business-aligned language and calmly steering senior leadership through uncertain waters. Who we're looking for: * exceptional leadership in both InfoSec and Data Protection * experience within complex, high-stakes environments * crisis management and incident response * proven ability to engage senior leadership with composure, clarity, and authority. Translating technical risk into simple … CSF * Professional qualification in Cybersecurity (CSIM, CISSP or similar) * Data Protection or Privacy qualification is desirable (CIPP/R or C-DPO) This is a tremendous opportunity for an InfoSec and Data Privacy leader to join a hugely positive organisation with a vast global presence, where your work impacts people on a larger scale. On offer is up to £100k More ❯
Employment Type: Permanent
Salary: £95000 - £100000/annum 32 days hol, great pension, 100% WF
day-to-day delivery of IT services across both shared and in-house environments, with a strong focus on ITIL disciplines - Incident, Problem, Change, and Asset Management - and Cyber Security risk management . The postholder will act as the customer-facing lead for operational IT, ensuring services are reliable, secure, and responsive to user needs. Key Responsibilities Manage the … Problem , Change , and Asset Management Act as the operational interface with the other organisation (the shared service provider) Maintain the CMDB and configuration item lifecycle tracking Lead on cyber security risk assessments , patch assurance , vulnerability management , and coordination with SOC/XDR providers Ensure compliance with cyber and data protection standards (e.g. Cyber Essentials) Monitor service level agreements (SLAs … avoidance of recurring incidents CHMG Change Management Level 5 Authorises, schedules, and reviews IT changes ASMG Asset Management Level 5 Owns and manages the asset lifecycle (including CMDB) SCTY InformationSecurity Level 5 Applies and oversees operational security practices SURE Security Operations Level 4-5 Coordinates patching, vulnerability management, incident response RLMT Stakeholder Relationship Management Level More ❯
procedures Supervises a team of specialists, Deliver risk management services to Hitachi Energy in cooperation with the te Work closely with the stakeholders to prioritize, create reporting, and oversee security findings. Improve management of security risks/issues and help identify areas of risk Reporting on the services, and their continuous improvement. Background: 8+ years of experience in … IT/InformationSecurity Governance in large, global organizations (consulting, audit or industry/operations Experience in planning and operating security risk/issue management-related processes and services. Experience in Risk Management aligned to certification requirements (ISO27001, ISO31000 or similar) required Knowledge of relevant security/governance frameworks (NIST CSF, ISO27001, CobiT, ) required Experience in … service build up a plus Security Governance/Risk Management certification (CISSP, CGEIT, CISM, CRISC ) is a plus Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site as a result of your disability. You may request reasonable accommodations by completing More ❯
are maintained Supervises a team of specialists Delivers risk management services to Hitachi Energy in cooperation with the team Works closely with stakeholders to prioritize, create reporting, and oversee security findings Improves management of security risks/issues and helps identify areas of risk Reports on the services and their continuous improvement Background: 8+ years of experience in … IT/InformationSecurity Governance in large, global organizations (consulting, audit, or industry/operations) Experience in planning and operating security risk/issue management-related processes and services Experience in Risk Management aligned with certification requirements (ISO27001, ISO31000, or similar) required Knowledge of relevant security/governance frameworks (NIST CSF, ISO27001, CobiT, etc.) required Experience … in service build-up is a plus Security Governance/Risk Management certification (CISSP, CGEIT, CISM, CRISC, etc.) is a plus Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy career site due to your disability. You may request accommodations by completing More ❯
Financial Information Resource Management Specialist - 12 Month Fixed Term Contract page is loaded Financial Information Resource Management Specialist - 12 Month Fixed Term Contract Apply locations London time type Full time posted on Posted Yesterday job requisition id R257925 Keen to become part of a truly global, collaborative team of professionals? Your journey begins here. Job Title Financial Information Resource Management Specialist - 12 Month Fixed Term Contract Department Finance Office Location London Reports To Manager, Financial Information Resource Management Working Hours 35 hours per week, 9:30am to 5:30pm but additional hours may be required. We are happy to consider agile and flexible working patterns. Our approach to hybrid working allows for up to 40% of … Reporting. The department is responsible for handling all financial matters in respect of the London Office and the co-ordination of financial affairs in the international offices. The Financial Information Resource Management team is responsible for updating and maintaining the 3E database including fee earners, fee earner budgets, input of time and special agreed billing rate arrangements. This is More ❯
and endpoint security. Develop scripts (e.g., PowerShell, Python) to automate repetitive tasks and streamline IT processes. Identify areas for improvement and implement IT solutions that enhance efficiency and productivity. Security & Compliance: Enforce IT security policies and ensure compliance with global standards (e.g., MFA, password policies, endpoint protection). Assist with local implementation of security audits, risk assessments … wireless LAN deployment and optimisation, with CCNA or CCNP certification. Proficient in managing Active Directory, Exchange Online, SharePoint, and Teams to maintain enterprise collaboration platforms effectively. Understanding of endpoint security technologies (e.g., antivirus software, patch management, MFA deployment), familiar with informationsecurity standards like ISO 27001, and capable of implementing account password policies, data backup, and other … process. First of all, we use Greenhouse, a web-based hiring platform, to assist in our recruiting process. As part of that process Greenhouse will be processing the personal information you've shared in accordance with Nothing instructions. When you apply for a job posted by us, the information we collect/you provide is used to determine More ❯
and future technology stacks, in the UK and internationally. • Write white papers, patents, and client facing data visualisations. • Consider the full impact of your work. This means considering privacy, security, and regulation, as well as the performance of your code and the accuracy of your models. Skills Required Your passion is focused on the design of algorithms to solve … especially social network analysis and graph diffusion analysis. Ability to build custom data visualisations, prototype browser based UX/UI, and the server side microservices to support them. Corporate Security Responsibility Every person working for, or on behalf of, Mastercard is responsible for information security. All activities involving access to Mastercard assets, information, and networks comes with … an inherent risk to the organization and therefore, it is expected that the successful candidate for this position must: • Abide by Mastercard's security policies and practices; • Ensure the confidentiality and integrity of the information being accessed; • Report any suspected informationsecurity violation or breach, and • Complete all periodic mandatory security trainings in accordance with More ❯
customer requirements can be planned accordingly. Collaborate with stakeholders to understand environment requirements and ensure they are met. Plan and execute environment refreshes, upgrades, and migrations as needed. Ensure security and compliance standards are met across all environments via regular review of the security standpoint with the SG InformationSecurity team. Ensure any critical or zero … day security patches are tested deployed with priority. Provide support and guidance to team members on environment-related issues and best practices. Stay up-to-date with industry trends and advancements in environment management technologies and practices. Requirements: You have Bachelor's degree in Computer Science, Information Technology, or a related field You have knowledge of infrastructure securityMore ❯
Senior Information Governance Officer Application Deadline: 10 August 2025 Department: IT & Digital Transformation Employment Type: Fixed Term - Full Time Location: London, UK Reporting To: Cyber Security Manager Compensation: £42,300/year Description Welcome to MAP About the Role Medical Aid for Palestinians (MAP) works for the health and dignity of Palestinians living under occupation and as refugees. … MAP is the leading UK charity delivering health and medical care to those worst affected by conflict, occupation, and displacement, in the occupied Palestinian territory and Lebanon The Information Management Specialist will focus on the classification of organisational data, ensuring appropriate confidentiality levels, and implementing robust data loss prevention strategies.The role includes analysing and optimising current SharePoint libraries and … leading the development and implementation of an intranet to enhance collaboration and information sharing across the organisation. About You The ideal candidate will have experience in data classification, data loss prevention, or information security. Expertise in SharePoint administration and optimisation. Strong understanding of data governance, privacy laws, and compliance standards. Experience with intranet platforms and content management systems More ❯
applications. We have a passion for using technology to solve business problems, working in partnership with our clients to help in achieving their goals. About the Role: As an Information Management Consultant , you'll play a key role in helping our clients take control of their data and documents - not just to stay compliant, but to work smarter, faster … with a client, the next you could be delivering workshops, reviewing tools, or developing best practice guidance. This is a fantastic opportunity to help shape and implement future-fit information management practices that make a measurable impact. As the Information Management Consultant, you will: Lead the design and delivery of Information Management services that align with client … goals and industry best practice Assess existing systems and processes, identifying quick wins and longer-term improvement opportunities Work closely with stakeholders to understand information needs and embed sustainable, digital-first solutions Ensure adoption of IM practices that support informationsecurity, data retention, and personal data protection Apply business analysis and project delivery skills to execute IM More ❯
Job Title: Security Architect Grade: 8 - Temp Reports to: Head of Architecture Division: IT Department: Architecture Location: London About Us We are a leading insurance provider with a strong reputation for delivering exceptional service, innovative products, and long-term value to our clients. Headquartered in London, we operate in key global markets, offering a collaborative and inclusive working environment … governance processes are applied from concept through to delivery, working closely with business change and IT delivery teams to enable effective, secure, and future-proof solutions. Job Purpose The Security Architect will play a key role in safeguarding the organisation's digital assets by ensuring that security is embedded into all technology solutions. Reporting to the Head of … Architecture (with a dotted line to the Head of IT Risk and Cybersecurity), the Security Architect will collaborate closely with application and infrastructure teams to design solutions that meet or exceed our security standards and align with best industry practices. Key Responsibilities Develop and maintain a security architecture framework that supports secure business and IT solutions aligned More ❯
Permanent, Hybrid (2-3 days in-office) Salary: Competitive (£60,000-£65,000) + Bonus + Benefits We're recruiting for a SecOps Engineer to join a high-performing InformationSecurity & Resilience team within a well-established FTSE 100 company. Based in Bristol, this hybrid role offers exciting variety-supporting projects from customer-facing platform builds to student … experience improvements-all while helping safeguard digital assets and security posture. You'll work collaboratively across technical and business teams to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetration testing , and remediation strategy delivery Lead and coordinate incident … IT teams to embed secure coding and operational practices Maintain clear documentation of risk, incidents, and security configurations Contribute to evolving internal controls and support continuous improvement in InfoSec Required Skills & Experience: Strong knowledge and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements More ❯
Permanent, Hybrid (2-3 days in-office) Salary: Competitive ( 60,000- 65,000) + Bonus + Benefits We're recruiting for a SecOps Engineer to join a high-performing InformationSecurity & Resilience team within a well-established FTSE 100 company. Based in Bristol, this hybrid role offers exciting variety-supporting projects from customer-facing platform builds to student … experience improvements-all while helping safeguard digital assets and security posture. You'll work collaboratively across technical and business teams to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetration testing , and remediation strategy delivery Lead and coordinate incident … IT teams to embed secure coding and operational practices Maintain clear documentation of risk, incidents, and security configurations Contribute to evolving internal controls and support continuous improvement in InfoSec Required Skills & Experience: Strong knowledge and hands-on experience with cloud security (AWS and/or Azure) Proven ability to perform detailed risk assessments and identify meaningful control improvements More ❯
Position : Senior Data Engineer Salary: £55,000 - £65,000 Location : Hybrid - Bristol, Manchester, or London Security Requirement : SC Clearance to start and be willing/able to obtain DV Clearance We are seeking Data Engineers, with a keen interest/experience in AI/ML and strong proficiency in Python Scripting. To join our Consultancy client working on meaningful … projects in the Defence and Security sector. Required Experience: End-to-End Data Development : Strong experience with data pipelines, ETL processes, and workflow orchestration, demonstrating best practices across tech stacks. Strong Python Skills Diverse Data Handling : Familiarity with batch, streaming, real-time, and unstructured data sources. Architectural Design & Systems Thinking : Ability to design and build scalable, high-performance data … Coding & Development Practices : Demonstrated coding expertise with modular, reusable, and efficient code in various languages. Development Lifecycle : Understanding of SDLC, CI/CD pipelines, and version control. Data Governance & Security : Knowledge of data security, governance, metadata management, and master data principles. Key Responsibilities: As a Senior Data Engineer, you'll bridge the gap between client needs and technical More ❯
achieve their strategic financial objectives by providing them with cutting-edge ideas, best-in-class products and solutions, and unparalleled access to capital and liquidity. The Team: The Chief InformationSecurity Office (CISO) is responsible for looking after the cyber security of all of Citi's technical assets. It has several new and exciting programmes utilising cutting … edge cloud and container technologies, with a view to ensuring that our cyber security is best in class and offers reassurance to our wider business lines and clients alike. The job: This role sits within the Container Security team, which is responsible for ensuring, maintaining, and improving the security of our container technologies within the firm. You … will be responsible for engineering automated security solutions that both secure and harden internal platforms as well as reduce friction for developers in their daily development lifecycle. You will be improving the container SDLC for internal developers from an image scanning perspective, engineering firm-wide solutions and partnering with centralised platform teams, DevOps teams and our developer community where More ❯
office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and Cyber Security and Risk posture. This role is key in building and improving Primark's Cyber Security posture. Duties & Responsibilities Actively progress and improve Primark's cyber security posture … and Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. InformationSecurity/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the … ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cyber security delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have More ❯
successfully meet milestones. Liaise with internal and external stakeholders. Able to work out of hours as and when required for urgent development work/project implementation. Ensure compliance with InformationSecurity Policies including data confidentiality and the operational security of the Information Systems used. What We Offer Competitive Salary: Up to £40,000 (depending on experience More ❯
each covering their own space: Infrastructure : They own the platform architecture and makes sure our tech ecosystem is running at its best. They work closely with Service Delivery and InfoSec to spot improvements, tackle risks, and ensure the TIG’s software infrastructure is solid. InformationSecurity : They ensure our security measures are up to date and effective … overseeing things like ISO audits and security policies. They work with all tech teams to make sure systems are well-protected. Service Delivery : Runs the Service Desk and leads the support engineers, handling all IT support issues. They’re the go-to team for tech support, working with all of tech to make sure everyone’s knowledgeable about the More ❯
each covering their own space: Infrastructure : They own the platform architecture and makes sure our tech ecosystem is running at its best. They work closely with Service Delivery and InfoSec to spot improvements, tackle risks, and ensure the TIG’s software infrastructure is solid. InformationSecurity : They ensure our security measures are up to date and effective … overseeing things like ISO audits and security policies. They work with all tech teams to make sure systems are well-protected. Service Delivery : Runs the Service Desk and leads the support engineers, handling all IT support issues. They’re the go-to team for tech support, working with all of tech to make sure everyone’s knowledgeable about the More ❯