Information Security Jobs in the UK

576 to 600 of 3,100 Information Security Jobs in the UK

Cyber Project Manager, Project Manager, SC

London, South East, England, United Kingdom
Hybrid / WFH Options
Sanderson
Cyber Security Project Manager, SC Clearable We are seeking an experienced Cyber Security Project Manager to lead the delivery of high-impact security initiatives within a fast-paced enterprise environment. This is an exciting opportunity to play a key role in strengthening our client's security posture during a critical transformation phase. Rate - £650.00 per day … months with the liklihood of extension Key Responsibilities: Lead end-to-end delivery of cyber security projects, ensuring alignment with business goals and compliance requirements Work across InfoSec, IT, risk, and compliance teams to deliver initiatives such as vulnerability management, identity and access management (IAM), SIEM upgrades, and cloud security improvements Manage third-party vendors and internal stakeholders … execution Develop and maintain project documentation, risk logs, and reports for senior stakeholders Ensure projects adhere to regulatory and governance frameworks Skills and Experience Proven track record delivering cyber security or information security projects in large, complex organisations Strong understanding of cyber risk, threat management, and technical security controls Excellent stakeholder management and communication skills Experience More ❯
Employment Type: Contractor
Rate: £600 - £650 per day
Posted:

Director IT Infrastructure Services

Oxford, England, United Kingdom
PSI CRO
design of company-wide IT infrastructure and oversees compliance, follow up and support thereof Oversees the development of PSI IT technology roadmap for automation, network monitoring, cloud, infrastructure and security Supervises and manages IT projects Develops IT infrastructure disaster recovery and business continuity plans Plans the IT infrastructure budget and communicates its priorities to company management and to direct … PSI Supervises IT managers and provides them with strategic guidance and vision Prepares for and attends quality assurance systems audits, both internal and external pertinent to IT Infrastructure Services Information Security Defines and leads the implementation of security controls (Security Operations Center, Identity Access Management, Endpoint Security, etc.) Leads operational engagement and manages metrics for … measuring Information Security maturity Tracks and coordinates Information Security involvement in business-driven technology projects Keeps abreast of Information Security trends, articulates security-related topics and principles in business terms Drives the delivery of Information Security plans and implementation of leading practice controls, based on proactive defense principles and strategies Leads More ❯
Posted:

Global Privacy and Data Protection Specialist

London, England, United Kingdom
Dentons
guidelines, manage access permissions, add vendors, processing activities, entities, etc., and train users on OT functionality and best practices, including assessments, RoPAs, vendor risk, and incident tracking. Collaborate with InfoSec/IT teams to align privacy tech workflows with security controls within OT. Support the coordination, investigation, and documentation of privacy incidents and breaches. Conduct root cause analyses, facilitate … other emerging technologies. Contribute to risk assessments for AI and other innovative tech use cases, data sharing, and automation tools. Analytics, KPIs & Reporting Define and maintain key privacy management information (PMI) dashboards and reporting tools, tracking key metrics such as number of DSARs, incident volumes and trends, DPIAs initiated and completed, vendor reviews, etc. Generate and maintain regular privacy … with an ability to explain complex privacy and data protection issues to lay audiences, to negotiate, and to influence others. Comfortable working with cross-functional teams across legal, tech, security, fee earners, and operations, able to interact positively at all levels and a good team player. High attention to detail, methodical approach to work with a strong focus on More ❯
Posted:

Cybersecurity Analyst

Ripon, England, United Kingdom
Alliance Laundry Systems LLC
Overview Reporting to the Director - Cybersecurity, the Cybersecurity Analyst is responsible for the day-to-day administration of the Information Security Management System (ISMS). This role will also involve performing key Security Operations duties, including system and application audits and reporting. Responsibilities Monitor and support all internal and external systems infrastructure (Incident & Problem Management), collaborating with … colleagues across all Alliance Laundry Systems locations as needed. Compile comprehensive audit reports that identify potential risks and threats. Report on KPIs related to compliance and the effectiveness of information security controls. Support the Director of Cybersecurity in defining and testing specific information security controls and policies. Contribute to the global information security awareness … program and ensure company-wide compliance. Conduct security assessments for projects and change management initiatives. Maintain the threat and information risk register and recommend appropriate remediation measures. Develop comprehensive documentation detailing system specifications and operating instructions. Ensure infrastructure, applications, and data security/privacy controls comply with corporate and regulatory policies. Work as part of the Service More ❯
Posted:

Senior Risk Analyst (AI, Artificial Intelligence, Machine Learning, ML, LLM, Python, SQL, London)

City of London, London, United Kingdom
Strategic Staffing Solutions
Machine Learning, IS Services, Data, LLM, Python, SQL, London, Insurance, Financial Services. We are seeking a highly skilled Risk expert in Artificial Intelligence and Machine Learning to join a Security Risk Management team. This role will focus on performing enhanced risk assessments of new projects and proof of concepts where artificial intelligence (AI) is being utilised and deemed to … risks effectively and propose appropriate compensatory controls. Responsibilities: The Senior Risk Analyst will work under the responsibility of the Head of IS Services and Risk Management reporting to the Information Security Specialist. The responsibilities of the role will be to conduct enhanced risk assessments on new AI solutions being implemented. You must have a strong IT background and … deep understanding of Artificial Intelligence (LLM and Deep learning model development and deployment), IT and potentially Information Security. Improve the current Security risk assessment methodology for complex AI systems Translating technical jargon and complex IT risks into business language is a must Support the business and IT stakeholders in completing risk assessments for their AI use case. Conduct More ❯
Posted:

Senior Risk Analyst (AI, Artificial Intelligence, Machine Learning, ML, LLM, Python, SQL, London)

London Area, United Kingdom
Strategic Staffing Solutions
Machine Learning, IS Services, Data, LLM, Python, SQL, London, Insurance, Financial Services. We are seeking a highly skilled Risk expert in Artificial Intelligence and Machine Learning to join a Security Risk Management team. This role will focus on performing enhanced risk assessments of new projects and proof of concepts where artificial intelligence (AI) is being utilised and deemed to … risks effectively and propose appropriate compensatory controls. Responsibilities: The Senior Risk Analyst will work under the responsibility of the Head of IS Services and Risk Management reporting to the Information Security Specialist. The responsibilities of the role will be to conduct enhanced risk assessments on new AI solutions being implemented. You must have a strong IT background and … deep understanding of Artificial Intelligence (LLM and Deep learning model development and deployment), IT and potentially Information Security. Improve the current Security risk assessment methodology for complex AI systems Translating technical jargon and complex IT risks into business language is a must Support the business and IT stakeholders in completing risk assessments for their AI use case. Conduct More ❯
Posted:

Mandarin Speaking IT Network Manager

City of London, London, England, United Kingdom
People First
To see more Chinese jobs please follow us on WeChat: teamchinapf AND pfteamchina Ref: 22974 The Skills You'll Need: Fluent in Mandarin, IT Network system administration/Security working experience. Your New Salary: Depending on experience Office based Start: ASAP Working hours : 35 hours Mandarin Speaking IT Network Manager - What You'll be Doing: Responsible for the daily … establishment and renewal of IT specifications related to network systems Propose implementation procedures to Management according to Head Office’s policies and IT Centre’s requirements Assess network systems security risk and propose security risk control solutions and execute them. Responsible for the design and maintenance of network systems contingency plans and leading of contingency plans testing Monitor … analyse and manage network security risk Carry out research on new technologies and products, carrying out technical solution design for the continuing development of IT Centre Provide training to staff members in IT Centre when required Mandarin Speaking IT Network Manager - The Skills You'll Need to Succeed: Degree educated in Information Technology, Computer Science, Software Engineering or More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Senior Risk Analyst (AI, Machine Learning, ML, LLM, Python, SQL, London)

London, England, United Kingdom
Strategic Staffing Solutions
Machine Learning, IS Services, Data, LLM, Python, SQL, London, Insurance, Financial Services. We are seeking a highly skilled Risk expert in Artificial Intelligence and Machine Learning to join a Security Risk Management team. This role will focus on performing enhanced risk assessments of new projects and proof of concepts where artificial intelligence (AI) is being utilised and deemed to … risks effectively and propose appropriate compensatory controls. Responsibilities: The Senior Risk Analyst will work under the responsibility of the Head of IS Services and Risk Management reporting to the Information Security Specialist. The responsibilities of the role will be to conduct enhanced risk assessments on new AI solutions being implemented. You must have a strong IT background and … deep understanding of Artificial Intelligence (LLM and Deep learning model development and deployment), IT and potentially Information Security. Improve the current Security risk assessment methodology for complex AI systems Translating technical jargon and complex IT risks into business language is a must Support the business and IT stakeholders in completing risk assessments for their AI use case. Conduct More ❯
Posted:

Senior Cyber Threat Hunter VP

London, England, United Kingdom
Robert Walters
will proactively identify, investigate, and mitigate advanced cyber threats across our organization's network and systems. Leveraging a deep understanding of the latest attack techniques, threat actor tactics, and security tools, you will help safeguard our infrastructure and ensure the resilience of our networks. The ideal candidate will be aware of industry trends and frameworks and how they could … to identify and mitigate sophisticated cyber threats, leveraging a variety of tools, techniques, and data sources Research, document, and develop Use Cases and Hypotheses for proactive hunting in cyber security tools including SIEM, EDR, and IDS/IPS (extract TTPs and behaviors from research to apply to logging and tool queries/hunts and detections) Research, document and develop … attributes of actors, malware operators, and general threats Identify and execute tuning/configuration changes to improve detection or reporting capabilities Perform deep analysis of alerts, network traffic, and security data to detect anomalous activity, indicators of compromise, and advanced persistent threats (APTs) Collaborate with the Security Operations team to investigate and respond to active incidents as needed More ❯
Posted:

Senior Network Architect Manager

Belfast, UK
Hybrid / WFH Options
Baker McKenzie
combines advanced design, planning, implementation, and troubleshooting of network systems with leadership responsibilities. The role aligns technical capabilities with business goals, facilitating cross-functional collaboration and ensuring compliance with security and performance standards. Working at Baker McKenzie: Baker McKenzie is the world's leading law firm with offices all over the world. Our Belfast Centre is home to over … infrastructure, ensuring compliance with service-level agreements (SLAs) Monitor network performance, perform periodic assessments, and implement enhancements to meet or exceed operational targets Collaborate with internal stakeholders to enforce information security policies and remediate non-compliance Define and participate in disaster recovery (DR) and business continuity planning (BCP) practices Monitor internal and external compliance with the Firm's … information security policies and procedures. Identify non-compliant practices and assist with remediation Vendor & Project Management: Establish and maintain relationships with network-related vendors, ensuring timely support and cost-effective solutions Manage network-related projects, including planning, implementation, and documentation Provide status updates and detailed reports to the IT leadership Documentation & Training: Maintain and enhance the Firm's More ❯
Posted:

Senior IT GRC Analyst

City of London, London, England, United Kingdom
Arc IT Recruitment
second-line permanent control checks. Coordinate IT control attestations across Group IT and with third-party service providers. Key Skills and Experience: 3-5+ years of experience in Information Security Governance, Risk, and Compliance (GRC), with a focus on IT risk and control management. Strong analytical skills with the ability to perform technical IT security and … operational risk assessments. High attention to detail, ensuring accuracy in documentation, assessments, and compliance activities. Strong understanding of information security risk management principles, frameworks (e.g., ISO 27001, NIST), and compliance practices. Exposure and understanding of IT infrastructure, business applications, and their associated risks and controls. Experience collaborating with internal and external audit teams, including supporting audit readiness and … evidence gathering. Proven ability to work effectively across multi-disciplinary, multi-cultural, and geographically dispersed teams. Excellent written and verbal communication skills, with the ability to convey complex information clearly to both technical and non-technical audiences. Strong interpersonal and presentation skills, with confidence engaging stakeholders at all levels. Industry-recognised technical certifications such as ITIL, CISSP, CRISC, or More ❯
Employment Type: Full-Time
Salary: Competitive salary
Posted:

Threat Modelling Engineer - GCP

London, United Kingdom
Hybrid / WFH Options
Publicis Groupe
Job Description As a Senior Engineer - Threat Modelling, you will be part of a cross-functional team delivering digital business transformation solutions to our clients. This role focuses on Security Architecture and Threat Modelling, including governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration with Engineering, Information Security, Program Management … and Development teams is essential. You will conduct technical architecture reviews to identify security opportunities, threats, and mitigation strategies. Your Impact Conduct threat modeling exercises using established methodologies. Identify potential threats and specify mitigation controls. Manage the lifecycle of threats and controls, ensuring updates. Deliver threat models within deadlines. Provide feedback to improve threat modeling processes. Present findings to … leadership and stakeholders. Qualifications Your Skills & Experience We seek candidates with experience in: Proficiency in GCP (essential) Security architecture principles, frameworks, and best practices Threat modeling methodologies like MITRE ATT&CK, STRIDE, PASTA Cybersecurity experience of 5+ years Security practices including authentication, authorization, logging, encryption, infrastructure security, network segmentation Knowledge of cloud security frameworks Rest API More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Senior IT GRC Analyst

London, England, United Kingdom
Arc IT Recruitment
second-line permanent control checks. Coordinate IT control attestations across Group IT and with third-party service providers. Key Skills and Experience: 3-5+ years of experience in Information Security Governance, Risk, and Compliance (GRC), with a focus on IT risk and control management. Strong analytical skills with the ability to perform technical IT security and … operational risk assessments. High attention to detail, ensuring accuracy in documentation, assessments, and compliance activities. Strong understanding of information security risk management principles, frameworks (e.g., ISO 27001, NIST), and compliance practices. Exposure and understanding of IT infrastructure, business applications, and their associated risks and controls. Experience collaborating with internal and external audit teams, including supporting audit readiness and … evidence gathering. Proven ability to work effectively across multi-disciplinary, multi-cultural, and geographically dispersed teams. Excellent written and verbal communication skills, with the ability to convey complex information clearly to both technical and non-technical audiences. Strong interpersonal and presentation skills, with confidence engaging stakeholders at all levels. Industry-recognised technical certifications such as ITIL, CISSP, CRISC, or More ❯
Posted:

Identity Management Consultant

Northampton, England, United Kingdom
Avance Consulting
onsite a week) Job Type: Contract Role Overview: We are seeking an experienced Identity and Access Management (IAM) Engineer to help design, implement, and optimise IAM solutions using IBM Security Identity Manager (ISIM). In this role, you will apply your Java development expertise to integrate and customise IAM tools, ensuring secure access controls, identity provisioning, and compliance across … a range of enterprise systems and applications. Responsibilities: • ISIM Solution Design & Implementation: Design and implement IAM solutions using IBM Security Identity Manager (ISIM) to handle user provisioning, de-provisioning, and role-based access control (RBAC). • Java Development: Develop and maintain Java-based applications for IAM integrations, including custom connectors, workflows, and business logic. • System Integration: Integrate ISIM with … third-party identity providers, enterprise applications, databases, and LDAP directories. • Security Best Practices: Enforce IAM security best practices, ensuring that solutions comply with relevant industry standards and regulations (e.g., GDPR, HIPAA). • Troubleshooting & Optimisation: Identify and resolve IAM-related issues, optimising workflows and system performance to improve efficiency. • Collaboration: Work closely with cross-functional teams including security More ❯
Posted:

Deskside Support Engineer - 12 Month FTC

London, England, United Kingdom
Octavia
A hybrid role that provides an efficient and cost-effective delivery of first and second-line support for information systems and related technology services within Octavia. To support the smooth operational running of Octavia's DT Infrastructure and Applications. Key Responsibilities Infrastructure Support Provide first and second-line support of issues regarding the DT and communications infrastructure, in accordance … team as and when required Business Continuity Ensuring backup regimes are effective and tested regularly Be aware of technical aspects of business continuity testing and implementing solution where necessary Security & Governance To uphold data protection and information security good practice, advising staff on good practice and escalating these and related issues when necessary Maintain security against … hacking, viruses, spyware etc In conjunction with suitably accredited suppliers, develop and maintain appropriate security measures against internal and external threats Ensure IT infrastructure and where applicable applications are documented to a high standard and that appropriate change management protocols are complied with Implement agreed actions recommended by audit and/or relevant regulatory and legal requirements as and More ❯
Posted:

Counter Threat Unit Specialist

Chandler's Ford, Eastleigh, Hampshire, England, United Kingdom
Hybrid / WFH Options
Ageas Insurance Limited
Job Title : IT Security Specialist Contract Type: Permanent, Part Time, Full Time, Job Share option available Salary Range: £37,600 - £56,400 Location: Eastleigh - hybrid Closing Date for applications: Thursday 3rd July IT Security Specialist: We have an exciting opportunity for an IT Security Specialist to join our Information Security team at Ageas, reporting directly … to the Counter Threat Unit Manager. As an IT Security Specialist, you will support the day-to-day operations of the Counter Threat Unit, applying your strong background in infrastructure engineering, cloud-based architectures, and solution delivery. You will contribute to maintaining our secure systems across hybrid environments, leveraging your expertise in both on-premises and cloud platforms such … as Azure, AWS, and GCP. Main Responsibilities as IT Security Specialist: Assist in gathering and analysing threat intelligence; monitor systems and networks to identify anomalies and support situational awareness. Follow established processes to help ensure compliance with legal, regulatory, and internal security requirements. Contribute to the investigation and resolution of security incidents, working in line with organisational More ❯
Employment Type: Full-Time
Salary: £37,600 - £56,400 per annum
Posted:

Data Scientist (Battery Storage)

London, England, United Kingdom
Masdar (Abu Dhabi Future Energy Company)
optimise battery availability and state of health. Creation and continued refinement of key dashboard tools used for portfolio management. Automate Battery scheduling and technical reporting Work with our cyber security partners to enhance protection of both our assets and data platform. Support on work to implement our BESS Cyber Security Policy, and Cyber Security in OFSW as … Collect, clean, and process large datasets from various sources, including SCADA systems, IoT devices, and historical records. Ensure data integrity, consistency, and availability for analysis and reporting. Comply with information security policies, procedures and requirements at all times: Adhere to any applicable Masdar information security policies and procedures and identify and report security incidents and … suspected weaknesses to the appropriate point(s) of contact. Protect assets under care (e.g. laptops and other devices) and information/credentials against unauthorized access, sharing, and/or damage/loss, in accordance with the Information Classification and Handling Procedure. Clear desks of all sensitive material and log off/lock workstations at the end of the More ❯
Posted:

Senior Network Architect Manager

Belfast, Northern Ireland, United Kingdom
Hybrid / WFH Options
Baker McKenzie Belfast Centre
combines advanced design, planning, implementation, and troubleshooting of network systems with leadership responsibilities. The role aligns technical capabilities with business goals, facilitating cross-functional collaboration and ensuring compliance with security and performance standards. Baker McKenzie is the world’s leading law firm with offices all over the world. Our Belfast Centre is home to over 400 colleagues in both … infrastructure, ensuring compliance with service-level agreements (SLAs) Monitor network performance, perform periodic assessments, and implement enhancements to meet or exceed operational targets Collaborate with internal stakeholders to enforce information security policies and remediate non-compliance Define and participate in disaster recovery (DR) and business continuity planning (BCP) practices Monitor internal and external compliance with the Firm’s … information security policies and procedures. Identify non-compliant practices and assist with remediation Establish and maintain relationships with network-related vendors, ensuring timely support and cost-effective solutions Manage network-related projects, including planning, implementation, and documentation Provide status updates and detailed reports to the IT leadership Documentation & Training: Maintain and enhance the Firm’s network information More ❯
Posted:

Lead Penetration Tester

Reading, England, United Kingdom
Hybrid / WFH Options
SITA
something big? Are you ready to love your job? The adventure begins right here, with you, at SITA. PURPOSE As a Lead Penetration Tester , part of the SITA Enterprise Information Security Office, you will assess SITA infrastructure and products to identify information security weaknesses and provide remediation strategies. You will also contribute to the automation of … security testing as part of the product development lifecycle. Key Responsibilities Conduct authorized assessment of infrastructure and applications to proactively identify security weaknesses. Verify weaknesses by leveraging attacker techniques to evaluate the difficulty and effectiveness of potential attack from various threat actors. Provide comprehensive and actionable recommendations to counter the threat posed by identified security weaknesses, given … the applicable threat landscape. Bring an offensive mindset to the design of internal solutions and provide input to the selection of countermeasures and security controls through technical risk assessment. Report findings to technical audiences (e.g.: product development teams, IT, operations), and to business management and leadership, indicating the impact to the business of verified weaknesses found. Research and develop More ❯
Posted:

Senior Associate, Cybersecurity compliance (global role in a virtual working environment)

United Kingdom
Hybrid / WFH Options
Grant Thornton International Ltd
primary purpose of this role is to support Grant Thornton International Ltd.’s internal cybersecurity assessment programme, which monitors our global network of Member Firms for compliance against our information security framework. The ideal candidate will have experience evaluating IT Infrastructure Security technologies, IT general computer controls, industry frameworks (e.g. NIST) and will bring strong information technology audit or security consulting experience to the programme. Location United Kingdom/Europe Main responsibilities The Senior Associate will support with the implementation of the cybersecurity compliance programme, including: Collaboration with IT assurance engagement teams across the GT network Review of data and evidence obtained in the field, including reviews for completeness, consistency and clarity. Evaluate cybersecurity … assessment cycles. This role will also include broader support to the team such as: Respond to firm enquiries and mailbox management. Provide advice and guidance on a variety of security topics. Develop guides, templates and other material to support the implementation of security standards. Research security best practices and provide appropriate reporting. Person specification Education/qualifications More ❯
Posted:

Director of Cyber Operations

Cambridge, England, United Kingdom
SoCode Recruitment
UK – Cambridge – 2 Days a week Salary - £140,000 to £160,000 + Package About the Role: We are seeking a seasoned and visionary cybersecurity leader to head global security operations at an innovative, fast-paced technology organisation. This role will drive the strategic and operational excellence of our threat detection, incident response, and vulnerability management functions across a … globally distributed digital estate. Reporting directly to the Chief Information Security Officer (CISO), this high-impact position is responsible for setting and executing the direction of our detection and response capabilities—ensuring our resilience against ever-evolving cyber threats. You’ll also play a central role in executive-level crisis planning, team growth, and cybersecurity thought leadership across … and response aligned with business strategy and threat landscape. Lead a highly skilled global team in building scalable, responsive, and intelligence-driven capabilities. Evolve functions such as Threat Intelligence, Security Testing, and Analytics to deliver maximum situational awareness and actionable insights to operations. Embed advanced automation and detection-as-code practices to enhance operational agility and data-driven decision More ❯
Posted:

Cyber Resilience & Metrics Manager

Wirral, England, United Kingdom
Unilever
Cyber resilience posture and provide assurance on our preparedness to minimize the impact of any disruptive cyber event. The role entails working with key stakeholders in partnership with our Security Engagement team to ensure that control measures including business continuity and disaster recovery processes and plans are in place to address key cyber risk scenarios to enable digital resilience … cyber resilience activities including scenario planning, business continuity planning, disaster recovery and testing recovery of operations across Unilever. They will also be responsible for working in partnership with our Security Engagement Team, Platform teams and other stakeholders to ensure cyber resilience measures are effectively implemented across the company. This role is responsible for implementing a risk-based approach to … risk scenarios. Additionally, the role oversees the effective application of Cyber Resilient BCP (Business Continuity Plan) and DR (Disaster Recovery) standards, training, scenario simulations and best practices by our Security Engagement team and other stakeholders across different business groups/markets. This role also crucial to Unilever's overall cyber risk management efforts, as it enables “holding up a More ❯
Posted:

Senior Counsel, Corporate Governance and Compliance

London, England, United Kingdom
Cohere
governance matters associated with complex contractual arrangements in the public sector and regulated industries. Work collaboratively with customer support and sales teams to scale and automate customer compliance and security requests, including by developing and maintaining up-to-date compliance documentation reflecting Cohere’s practices. Partner closely with information security to manage third-party audits and certification … attainment (e.g. SOC 2 Type 2, ISO 27001, HIPAA). Work collaboratively with Cohere’s information security, product, engineering, and AI risk management teams to design and implement robust and cross-functional regulatory compliance strategies. Advise and provide insights on emerging legal and regulatory trends to key teams, including the Public Sector and Government Affairs and Public Policy … identifying and mitigating legal risks. Proven ability and experience managing compliance programs. Proven ability and experience working effectively with business and technical teams, including go-to-market, customer support, information security, and product teams. Experience navigating corporate governance matters for global expansion and export control compliance will be considered an asset. Experience advising on and managing contracting and More ❯
Posted:

Risk & Compliance Analyst

London, United Kingdom
Hybrid / WFH Options
TripAdvisor LLC
result of compliance reviews, internal audits, third party audits or otherwise escalated. Supporting the Compliance Team and other key stakeholders on initiatives as assigned. Supporting the Privacy, Cybersecurity and Information Security teams with projects to include compliance readiness for new laws, regulations (e.g. GDPR and CCPA), frameworks (e.g. COSO and NIST cybersecurity frameworks) and standards (e.g, DORA, PCI … Supporting regulatory, internal or external audits or certifications. Provide knowledge and operational input on our Third-Party Risk Management framework, including: Performing third-party vendor risk assessments, evaluating privacy, information security, and AI compliance risks, among others, during onboarding and renewal processes. Reviewing, updating and maintaining third party risk questionnaires and registers collaborating with various departments, including Legal … Information Security, IT and Procurement. Support the Privacy team on a number of Data Privacy enhancing initiatives, including: conducting and document end-to-end Privacy Impact Assessments (PIAs) for new and existing products and processes, supporting compliance with GDPR, CCPA, and other privacy regulations. Maintain and update the Record of Processing Activities (ROPA) in collaboration with cross-functional More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Governance, Risk and Compliance Lead - Customer Assurance

London, England, United Kingdom
Wiz, Inc
Come join the company that is reinventing cloud security and empowering businesses to thrive in the cloud. As the fastest-growing startup ever, Wiz is on a mission to help organizations secure cloud environments that will accelerate their businesses. Trusted by security teams all over the world, we have a proven track record of success and a culture … cloud environments that allow the best companies to move faster. SUMMARY We are seeking an experienced Customer Assurance Lead to lead Wiz's Internal Customer Assurance program for our Information Security Organization, with a focus on securing a modern, cloud-first enterprise. The ideal candidate will be responsible for building and managing a comprehensive customer assurance program, ensuring … that customer security and compliance needs are met with precision and excellence. Additionally, they will lead customer-facing discussions, translate technical security controls into clear, business-relevant language, and continuously evolve the assurance strategy to align with customer expectations and industry trends. Furthermore, they will play a pivotal role in developing metrics to measure success and guide program More ❯
Posted:
Information Security
10th Percentile
£36,250
25th Percentile
£48,583
Median
£65,000
75th Percentile
£78,750
90th Percentile
£100,000