Manchester, North West, United Kingdom Hybrid / WFH Options
BNY
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
bolton, greater manchester, north west england, united kingdom
BNY
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
warrington, cheshire, north west england, united kingdom
BNY
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
related partnership and collaboration agreements at a law firm or in-house legal department (law firm or financial services company experience preferred). Basic knowledge of cybersecurity, technology controls, informationsecurity, data privacy and protection, and data management. Knowledge of financial services regulations and regulatory guidance on outsourcing and other third-party relationships (e.g., EBA, ESMA, FCA/ More ❯
of tasks. Ability to deliver results with minimal supervision. Strong communication and relationship management skills. High attention to detail and solution-oriented mindset. Passion for learning and development. Corporate Security Responsibility All Mastercard employees are responsible for informationsecurity, adhering to policies, ensuring confidentiality, reporting breaches, and completing mandatory security trainings. More ❯
employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law. Rivian is committed to … Disabilities Act, that requires accommodations to assist you in the search and application process, please email us . Candidate Data Privacy Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes ("Candidate Personal Data"). … This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your More ❯
Security Consultant – London, United Kingdom 🚀 Be the Defender of Tomorrow’s Digital World with Kyndryl Are you ready to step into a role where your decisions protect organizations, empower innovation, and define the future of cybersecurity? At Kyndryl , our Security Consultants aren’t just experts—they’re strategic advisors, problem-solvers, and the first line of defense in … a fast-evolving threat landscape. Here’s what the role looks like: 🔍 What You’ll Do Analyze, assess, and implement end-to-end security controls and policies Lead risk assessments , security audits, and design secure architectures Collaborate with clients to develop and enforce robust, real-world security frameworks Get hands-on with firewalls, IDS/IPS, encryption … and access control tech Stay ahead of threats and apply cutting-edge security practices —Zero Trust, Cloud Security, IoT, AI, and more Influence system design to be secure by default , not by patch. 🧠 You Should Have: ✔️ 8+ years in security consulting or implementation ✔️ Expertise in frameworks like NIST, RMF, Common Criteria ✔️ Strong grasp of risk management , compliance More ❯
Security Consultant – London, United Kingdom 🚀 Be the Defender of Tomorrow’s Digital World with Kyndryl Are you ready to step into a role where your decisions protect organizations, empower innovation, and define the future of cybersecurity? At Kyndryl , our Security Consultants aren’t just experts—they’re strategic advisors, problem-solvers, and the first line of defense in … a fast-evolving threat landscape. Here’s what the role looks like: 🔍 What You’ll Do Analyze, assess, and implement end-to-end security controls and policies Lead risk assessments , security audits, and design secure architectures Collaborate with clients to develop and enforce robust, real-world security frameworks Get hands-on with firewalls, IDS/IPS, encryption … and access control tech Stay ahead of threats and apply cutting-edge security practices —Zero Trust, Cloud Security, IoT, AI, and more Influence system design to be secure by default , not by patch. 🧠 You Should Have: ✔️ 8+ years in security consulting or implementation ✔️ Expertise in frameworks like NIST, RMF, Common Criteria ✔️ Strong grasp of risk management , compliance More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Claranet Limited
renowned for being the best and brightest, having lasting impact with our customers and delivering exceptional returns to our stakeholders. Position Summary The penetration testing team at Claranet Cyber Security is composed of highly skilled, professional ethical hackers with a real passion for improving our clients’ security posture by demonstrating how systems can be compromised and what steps … out of normal office hours on occasion Willing to travel to deliver onsite work as required Appetite to shadow, train and develop to improve capabilities into all areas of security testing Desirable Experience: Delivering chargeable web app testing engagements Providing remediation advice Producing accurate technical reports Working under pressure of deadlines and structuring workload accordingly Problem-solving, helping others … to understand complex ideas In addition, the following are highly desirable: A related Batchelor’s degree. CISSP, CISA, CEH, OSCP or equivalent reputable informationsecurity certifications Experience with Bug Bounties Public speaking experience Full UK driving license More ❯
Minimum qualifications: Bachelor's degree in Computer Science or a related technical field such as computer networking, informationsecurity or equivalent practical experience. 5 years of experience in security engineering, DevSecOps, or platform engineering roles. Experience with deployment and orchestration technologies (such as Docker, Kubernetes, Mesos, OpenStack, Puppet, Chef, Salt, Ansible, Jenkins). Experience with Unix/… Linux operating systems internals and administration, or networking and debugging/troubleshooting. United Kingdom Security Vetting Developed Vetting (DV) clearance. Preferred qualifications: Experience designing, building, and deploying cloud-based solution architectures. Ability to execute in a customer-focused environment and advocate for partners and customers in a cross-functional organization. Ability to work on a team to design processes More ❯
improve the agility, productivity and global reach of businesses. We lead. Others follow. No-one can match our capability to design, build and operate integrated global networks, cutting-edge information systems and mobile technologies. Are you ready to improve a best in class enterprise sales team that thrives on teamwork and collaboration? Can you see yourself delivering technology and …/WAN or large infrastructure and network solutions for enterprise customers. Experience with networking concepts including: software defined networking, routing, VPNs, load balancers, and firewalls. Knowledge of data and informationsecurity - especially as it relates to issues within businesses. Experience in two or more of the following areas: Software Defined Networking (SDN), IT infrastructure and systems security … to quickly learn, understand, and work with new emerging technologies, methodologies and solutions in the cloud/IT technology space. Experience running multiple projects or deals under tight timelines. Security, architecture, and industry certifications such as AWS Solution Architect, Certificate of Cloud Security Knowledge (CCSK), CompTIA Security+, Cisco Certified Design or Network Associate, ITIL Foundations, or similar. Experience More ❯
role, we’ll help you to develop the core skills required for internal auditing, risk management, and compliance, contributing to key projects in Risk Management, Compliance, Data Protection, and Information Security. This is an excellent opportunity for someone who is ambitious, highly organised, and eager to gain experience in audit and risk. We would love to welcome you to … requirements. international standards and business policies. Maintain and update audit and risk documentation, ensuring accuracy and completeness. Compliance & Risk Support Support the Risk & Compliance team with data protection and informationsecurity activities. Assist in reviewing compliance policies and procedures to ensure they align with industry standards. Work on compliance monitoring tasks, helping to identify potential issues and recommending … providing a broad and varied learning experience. Opportunity for international travel, supporting reviews in different regions. Potential for full-time progression into a permanent role within Audit, Compliance, or Information Security. A recognised qualification that can provide valuable long-term career opportunities. Qualifications We are looking for a motivated and curious individual with: An interest in technology, audit, risk More ❯
and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
auricoe
personal data, especially regarding assessment of risk and associated control implementation. Advise business stakeholders within context of third party management where personal data is in scope, in collaboration with InformationSecurity and Procurement teams. Assist in investigation, resolution and remedial action of data protection related incidents. Report outcomes to the Group Data Protection Manager and where appropriate Data … to ensure customer outcomes and data protection are considered for all new projects and products. Support product risk reviews and report accordingly to the relevant committees. Maintain the business information asset register and review on a regular basis. Ensure business systems and procedures comply with all relevant data privacy and protections law, regulation and policy (including in relation to … requirements. Proven record of successfully selecting and implementing appropriate privacy controls. In-depth knowledge of completing Privacy Impact Assessments. Experience of responding to Subject Access Requests. Understand technical data security measures available to the business. Excellent communication skills with all levels of the business. Strong attention to detail and analytical skills. If you want to progress your data protection More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
auricoe
personal data, especially regarding assessment of risk and associated control implementation. Advise business stakeholders within context of third party management where personal data is in scope, in collaboration with InformationSecurity and Procurement teams. Assist in investigation, resolution and remedial action of data protection related incidents. Report outcomes to the Group Data Protection Manager and where appropriate Data … to ensure customer outcomes and data protection are considered for all new projects and products. Support product risk reviews and report accordingly to the relevant committees. Maintain the business information asset register and review on a regular basis. Ensure business systems and procedures comply with all relevant data privacy and protections law, regulation and policy (including in relation to … requirements. Proven record of successfully selecting and implementing appropriate privacy controls. In-depth knowledge of completing Privacy Impact Assessments. Experience of responding to Subject Access Requests. Understand technical data security measures available to the business. Excellent communication skills with all levels of the business. Strong attention to detail and analytical skills. If you want to progress your data protection More ❯
Working with a scaling business in Oxford to recruit a permanent Software Security Engineer to join the InformationSecurity team. This is a newly created role working across software engineering, modelling and data science teams. This is a role to enable the business to improve their SDLC processes through creating robust and resilient security operations click More ❯
our vantage point as one of the largest international professional services networks to provide global threat intelligence services, tailored and delivered locally to our clients. Our research underpins our security services and is used by public and private sector organisations around the world to protect networks, provide situational awareness and inform strategy. What your day will look like: As …/Field of Study required:Degrees/Field of Study preferred: Certifications (if blank, certifications not specified) Required SkillsOptional Skills Accepting Feedback, Accepting Feedback, Active Listening, Analytical Thinking, Cloud Security, Communication, Conducting Research, Creativity, Cyber Defense, Cyber Threat Intelligence, Embracing Change, Emotional Regulation, Empathy, Encryption, Inclusion, InformationSecurity, Intellectual Curiosity, Intelligence Analysis, Intelligence Report, Intrusion Detection, Intrusion More ❯
business seeking a technically strong IT Compliance & Service Manager to lead their ISO27001 compliance programme and oversee IT service delivery. You'll manage outsourced IT service providers, execute our informationsecurity management system (ISMS), and ensure effective Microsoft 365 governance. This is a senior, high-impact role requiring initiative, technical depth, and strong vendor relationship management skills. You … governance best practices across the organisation. Key Responsibilities ISO 27001 & IT Governance Execute ISMS rollout and maintain policies, processes, and controls aligned with ISO 27001 Develop and maintain IT security policies, procedures, and standards Support internal audits, risk assessments, and compliance reporting Help steer the overall ISMS programme and ensure audit readiness Third-Party Service Management & ITSM Manage strategic … Governance Work with service providers to ensure M365 is configured, secured, and optimised Develop governance policies and promote best practices across the business Monitor compliance with licensing and security requirements Stakeholder Engagement Serve as IT representative on the Risk Committee and contribute to the Change Board Partner with internal teams on facilities-related IT requirements Act as trusted advisor More ❯
develop Alteryx workflows. Monitor and optimize solution performance and contribute to process improvements. Deploy new solutions or update existing ones in line with Change Management Framework. Ensure compliance with InformationSecurity and Data Governance standards. Promote best practices, provide training, share knowledge, and offer first-line support to users. Translate business requirements into prototypes. Manage the UAT environment … Strong ability to interpret business requirements and produce technical documentation. Excellent analytical, problem-solving, interpersonal, and communication skills. Experience in Financial Services or financial reporting is a plus. Additional information: We provide training and professional qualifications to support your growth. You should be quick to learn new systems and processes and excel in building relationships with colleagues and clients. More ❯
be able to demonstrable experience in writing and implementing data protection policies from scratch. Excellent communication skills, with the ability to engage and train colleagues at all levels. Cyber security experience or a strong understanding of informationsecurity principles and their relationship to data protection. Why join CR Smith: A competitive salary - £50,000 - £60,000 Pension More ❯
the project(s) Prioritise, manage and report on the project, working with key stakeholders Identify resources and assign responsibilities Ensure that you uphold, and work in accordance with Radius InformationSecurity policies and procedures What do we expect of you? Strong attention to detail and the ability to manage multiple clients at any one time Excellent knowledge of … working environment that values inclusivity, innovation, agility, and drive. And of course, you will be compensated competitively along with bonus potential and a good range of core benefits. Additional Information Still Curious? If you feel we are a good match for each other, you can apply online now! If you’d like to understand more about the role or More ❯
believe your experience aligns with the responsibilities above, wed love to hear from you. Please send a CV or brief summary of your relevant experience to Harhl.recruitment@nhs.net Additional Information: Appraisal Harrow Health operates a system of individual performance review/appraisal for the purpose of agreeing performance objectives and discussing development needs in line with requirements of service … It is a requirement of this position that a Criminal Records Bureau disclosure at the enhanced level is undertaken. Confidentiality The post holder is required not to disclose such information, particularly that relating to patients and staff. All employees are subject to the Data Protection Act 1998 and must not only maintain strict confidentiality in respect of patient and … staff records, but the accuracy and integrity of the information contained within. The post holder must not at any time use personal data held by Harrow Health for any unauthorised purpose or disclosure such as data to a third party. You must not make any disclosure to any unauthorised person or use any confidential information relating to the More ❯
employment practices laws. All qualified applicants will receive consideration for employment without regard to race, color, religion, national origin, ancestry, sex, sexual orientation, gender, gender expression, gender identity, genetic information or characteristics, physical or mental disability, marital/domestic partner status, age, military/veteran status, medical condition, or any other characteristic protected by law. Rivian is committed to … Disabilities Act, that requires accommodations to assist you in the search and application process, please email us . Candidate Data Privacy Rivian may collect, use and disclose your personal information or personal data (within the meaning of the applicable data protection laws) when you apply for employment and/or participate in our recruitment processes ("Candidate Personal Data"). … This data includes contact, demographic, communications, educational, professional, employment, social media/website, network/device, recruiting system usage/interaction, security and preference information. Rivian may use your Candidate Personal Data for the purposes of (i) tracking interactions with our recruiting system; (ii) carrying out, analyzing and improving our application and recruitment process, including assessing you and your More ❯