Royal Devon University Healthcare NHS Foundation Trust
a more exciting time to join the Royal Devon, as youll help to shape our services as we continue along our integration journey. Job description Job responsibilities For more information on the Job Description and Responsibilities please click the link below. More detail about the role Under the operational management of the Head of Digital Infrastructure, the role provides … specialist support and analysis of the Trusts Digital security systems, network technical security requirements and security incident events; to maintain and develop the highest level of IT security, ensuring that the Trusts digital infrastructure and applications comply with best practice, along with technical, health records, cyber, and physical security standards. The role is accountable to … the Trusts Cyber Security Lead providing assurance that they are operating to industry standards, meeting cyber ethics and codes of conducts and NHS national frameworks. This role will be key in supporting the Digital Transformation at the Trust by contributing to both the Security strategy as well as the wider Digital programmes over the coming years. The Cyber More ❯
resolving conflicts to accomplish goals. Problem solving: Identifies root causes of problems thanks to data analysis, thinks creatively to find and implement solutions, rather than just raising issues. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
resolving conflicts to accomplish goals. Problem solving: Identifies root causes of problems thanks to data analysis, thinks creatively to find and implement solutions, rather than just raising issues. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
resolving conflicts to accomplish goals. Problem solving: Identifies root causes of problems thanks to data analysis, thinks creatively to find and implement solutions, rather than just raising issues. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
resolving conflicts to accomplish goals. Problem solving: Identifies root causes of problems thanks to data analysis, thinks creatively to find and implement solutions, rather than just raising issues. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
aberdeenshire, north east scotland, united kingdom
Mastercard
resolving conflicts to accomplish goals. Problem solving: Identifies root causes of problems thanks to data analysis, thinks creatively to find and implement solutions, rather than just raising issues. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the organization and, therefore, it is expected that every person working … for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory security trainings in accordance with Mastercard's guidelines. More ❯
Teqniq is searching for a Senior ISP IT Security to work in the public sector. 37 hours per week. 3 months contract. 09:00-17:00 Job Description: Strategic Planning and Governance Develop, review, and maintain the IT Security Strategy in line with organisational goals and regulatory obligations. Lead the creation and enforcement of cybersecurity governance frameworks. Align … security objectives with enterprise architecture and digital strategy. Participate in board-level or senior management discussions around cyber risk. Identify and manage strategic security risks (technical, legal, reputational, financial). Evaluate and advise on emerging technologies (e.g. AI, RPA, cloud, hybrid infrastructure) from a security perspective. Policy, Procedure, and Guidance Oversight Review and update security policies … remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO 27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for informationsecurity across departments. Support Information Governance and Data Protection with policy harmonisation and compliance efforts. Technical Review and Oversight Undertake technical reviews of: New and existing systems More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Last Mile Infrastructure Limited
Cyber Security Lead Hamilton, Glasgow or Stonehouse, Gloucester Join a leading utilities company that champions innovation and service excellence. At Last Mile, were proud to deliver high-quality solutions across the multi-utility sector, and our IT team is expanding. Were now looking for a talented Cyber Security Lead to play a pivotal role in strengthening our digital … resilience. As a Cyber Security Lead, reporting into the Director, Technology and Data, youll lead and develop a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills, a … deep knowledge of the cyber security landscape, and a real passion for safeguarding digital assets. Whats in it for you as a Cyber Security Lead? Here at Last Mile, we pride ourselves in providing a great range of benefits including a fantastic amount of annual leave, including a Christmas shut down. 25 days holiday, increasing after 2 years More ❯
quality incident closure, aiming for first-time fixes where possible and escalation to next level where required Ensure client satisfaction with timely communications and updates Ensure full and correct information is collected and entered into incident record Ensure that IT solutions are relevant to the business need and developed to meet end user requirements Improve own skills and knowledge … for new incidents and requests, ensuring all calls are kept up to date Understand the responsibilities associated with working in a regulated environment, and adhering to SRA obligations Understand informationsecurity and data protection initiatives and regulations Understand and demonstrate a full understanding of informationsecurity and data security policies, best practices, and implications Training … use Microsoft Azure, Microsoft 365, Windows 10, AWS, Linux, PowerShell. 90% of QA apprentices secure permanent employment after completing: this is 20% higher than the national average. Apprenticeship Standard Information communications technician (level 3) Training Provider QA LIMITED Working Week Your working pattern will be on a rota basis covering Monday to Friday 7am – 7pm based in our Bristol More ❯
quality incident closure, aiming for first-time fixes where possible and escalation to next level where required Ensure client satisfaction with timely communications and updates Ensure full and correct information is collected and entered into incident record Ensure that IT solutions are relevant to the business need and developed to meet end user requirements Improve own skills and knowledge … for new incidents and requests, ensuring all calls are kept up to date Understand the responsibilities associated with working in a regulated environment, and adhering to SRA obligations Understand informationsecurity and data protection initiatives and regulations Understand and demonstrate a full understanding of informationsecurity and data security policies, best practices, and implications Desirable … qualifications, at the time of your application you must be able to provide an official document that states how your international qualifications compare to the UK qualifications. For more information please visit the UK ENIC website. Working hours: Your working pattern will be on a rota basis covering Monday to Friday 7am – 7pm based in our Bristol office, with More ❯
Newcastle Upon Tyne, Tyne and Wear, England, United Kingdom
Reed Talent Solutions
Do you have strong communication skills? Are you confident providing clear, precise advice to stakeholders? Then consider the role of Security & Incident Management Executive at Reed in Partnership! You must be based in the NorthEast for this position. This role requires you to travel, therefore you must have a valid UK driving license and access to your own vehicle … What is the role about? The Security & Incident Management Executive, reporting to the Deputy Head of IT & Security, support with all aspects of IT and security across the contract, comprising physical & informationsecurity, including: Act as a Security & Incident Management Executive (SIME) supporting the day-to-day SIM Team operations including Helpdesk duties, fraud … packs and supporting the audit and visit schedule. Act as helpdesk support to frontline test centre staff to resolve and monitor security & operational incidents. Assisting with administrating the fraud management process, assisting with managing fraud trackers, and reporting, remedial training and actions. Creating fraud incident packs & work with frontline staff to gather evidence to support fraud pack assembly, processing More ❯
Information Cyber Security Engineer (ISO 27001, NIST, Cyber Essentials Plus) Cyber Security Engineer to join a growing team, a leading global organisation. In this hands-on role, you’ll be at the heart of the company’s security operations driving innovation, leading key initiatives, and shaping the future of their cybersecurity landscape. Working closely with infrastructure … application, and operations teams, you’ll embed security best practices into every layer of IT. From managing cutting-edge security tools to strengthening defences across on-premises, cloud, and SaaS environments, you’ll play a vital role in safeguarding critical systems and data. The environment is - Mimecast, Antivirus/EDR, CrowdStrike, Security Awareness Platform, KnowBe4, O365, Web … Proxy/proxies, Phishing, Policies, AD/Active Directory. However the client is happy to welcome candidates with other tech backgrounds. You’ll lead and support major IT security projects, ensuring secure, efficient, and timely delivery. You’ll take ownership of incident response activities, continuously refining processes to stay ahead of emerging threats. As a trusted advisor, you’ll More ❯
Information Governance Officer 4 Month Contract InsideI R35 Up-to £250 per day Edinburgh Hybrid Are you a skilled professional with a passion for information governance? If so, this could be the perfect opportunity for you! The company is seeking an exceptional Information Governance Officer to join their team and play a crucial role in ensuring the … organisation's compliance with relevant legislation and regulations. About the Role As the Information Governance Officer , you will be responsible for providing expert advice and guidance to the company's National Team, Board Members, volunteer community, and Clerks on a wide range of information governance issues. This will include supporting the Information Governance and Data Protection Officer … in managing informationsecurity incidents, ensuring appropriate safeguards are in place for data sharing, and contributing to major projects by integrating information governance considerations. You will also be involved in delivering responses to statutory requests for information, such as Freedom of Information Requests and Subject Access Requests, as well as assisting with the identification, assessment More ❯
Overview The Interim CISO will provide immediate, strategic and operational security leadership on a fixed-term basis. The primary mandate is to conduct a rapid, high-impact review and uplift of critical security governance functions, focusing specifically on asset management, third-party assurance, and incident preparedness. Key Responsibilities and Deliverables: The successful candidate will be a hands-on … leader responsible for the following key reviews: 1. Group Information Asset Register (IAR) Review Audit and Validate the current IAR structure, completeness, and accuracy of Confidentiality, Integrity, and Availability (CIA) classifications. Establish a repeatable, documented process for the continuous identification, registration, and risk-linkage of all high-value information assets. 2. 3rd Party Assurance Process Uplift Assess and … Refine the entire Third-Party Risk Management (TPRM) lifecycle, identifying gaps in vendor security due diligence and ongoing monitoring. Define a tiered, risk-based methodology for assurance reviews, ensuring the rigor of the review matches the vendor's inherent risk to the organization. 3. Incident Response and Recovery Plan (IRRP) Validation Critically Review the current IRRP for clarity, compliance More ❯
Overview The Interim CISO will provide immediate, strategic and operational security leadership on a fixed-term basis. The primary mandate is to conduct a rapid, high-impact review and uplift of critical security governance functions, focusing specifically on asset management, third-party assurance, and incident preparedness. Key Responsibilities and Deliverables: The successful candidate will be a hands-on … leader responsible for the following key reviews: 1. Group Information Asset Register (IAR) Review Audit and Validate the current IAR structure, completeness, and accuracy of Confidentiality, Integrity, and Availability (CIA) classifications. Establish a repeatable, documented process for the continuous identification, registration, and risk-linkage of all high-value information assets. 2. 3rd Party Assurance Process Uplift Assess and … Refine the entire Third-Party Risk Management (TPRM) lifecycle, identifying gaps in vendor security due diligence and ongoing monitoring. Define a tiered, risk-based methodology for assurance reviews, ensuring the rigor of the review matches the vendor's inherent risk to the organization. 3. Incident Response and Recovery Plan (IRRP) Validation Critically Review the current IRRP for clarity, compliance More ❯
application support. Process-Driven Leader: Champions continuous improvement and operational excellence across global sites. Collaborative Influencer: Partner with executive leadership and global teams to align technology with business strategy. Security-Focused: Drives local cybersecurity efforts and ensures compliance with corporate standards. What you will need to succeed: Development & Leadership Experience of building and leading a new IT function from … and deployment of a new SAP ERP systems across a business, ideally within the engineering or manufacturing sector. Have experience defining cloud or on-prem solutions across global businesses. InformationSecurity Drive local security initiatives and support global directives and ensure compliance with Crane's IT policies and industry standards. Experience of dealing with government contracts and … informationsecurity processes on these contracts. Industry Background Ideally, you will have worked in the engineering or manufacturing sectors, but any heavily regulated industry will be considered. Extensive IT Leadership You will need to demonstrate a proven track record in leading enterprise IT functions and possess strong budget management and strategic planning capabilities. What you will get in More ❯
Groby, Leicester, Leicestershire, England, United Kingdom
Druck
application support. Process-Driven Leader: Champions continuous improvement and operational excellence across global sites. Collaborative Influencer: Partner with executive leadership and global teams to align technology with business strategy. Security-Focused: Drives local cybersecurity efforts and ensures compliance with corporate standards. What you will need to succeed: Development & Leadership Experience of building and leading a new IT function from … and deployment of a new SAP ERP systems across a business, ideally within the engineering or manufacturing sector. Have experience defining cloud or on-prem solutions across global businesses. InformationSecurity Drive local security initiatives and support global directives and ensure compliance with Crane’s IT policies and industry standards. Experience of dealing with government contracts and … informationsecurity processes on these contracts. Industry Background Ideally, you will have worked in the engineering or manufacturing sectors, but any heavily regulated industry will be considered. Extensive IT Leadership You will need to demonstrate a proven track record in leading enterprise IT functions and possess strong budget management and strategic planning capabilities. What you will get in More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Lorien
IT Category Manager - InformationSecurity We are currently recruiting for an experienced IT Category professional to lead strategic sourcing and category management across cybersecurity/information security. This role is to join one of our Insurance Clients based on a 6 month contract Inside IR35. Hybrid working with 2 days in London. Key Experience Required: 5+ years More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Netteam tX Ltd
updates and reporting. Ensure that all project milestones, tasks, and issues are documented and actioned promptly to maintain clear visibility for all team members Uphold the highest standards of informationsecurity by strictly following the company's policies and procedures, ensuring compliance with industry regulation and data protection guidelines to protect client and company data Prepare and deliver … comprehensive client documentation, ensuring that all necessary technical details, configurations and system information are included, and shared with the Service Desk to ensure smooth ongoing support Take ownership of the client onboarding and offboarding process, ensuring a smooth and efficient transition for new and departing clients. For onboarding, manage the integration of client systems, provide training, and ensure all … necessary resources are available for successful engagement. For offboarding, ensure all client data, systems, and access are appropriately handled and transferred, maintaining compliance with company policies and security protocols. A solid understanding of InformationSecurity Management Systems (ISMS) About you: Experience: Previous experience within a similar field-based or Professional Services role. Have a versatile approach to More ❯
join their Data Risk Team within Risk & Compliance, based in London, Edinburgh, Chelmsford or Manchester. This is a fantastic opportunity to support the global management of data, privacy, and information risk - particularly across areas like informationsecurity, emerging technologies (including AI), and regulatory compliance. You’ll collaborate with stakeholders across the firm, including General Counsel, InformationSecurity, and Emerging Tech Risk teams, helping to shape best practices and ensure compliance with regulations such as UK/EU GDPR, DORA, HIPAA, and EU AI Act. The role offers a dynamic mix of hands-on risk management, internal auditing, and strategic input into global processes. It’s ideal for someone with a solid foundation in data More ❯
london (city of london), south east england, united kingdom
Taylor Root
join their Data Risk Team within Risk & Compliance, based in London, Edinburgh, Chelmsford or Manchester. This is a fantastic opportunity to support the global management of data, privacy, and information risk - particularly across areas like informationsecurity, emerging technologies (including AI), and regulatory compliance. You’ll collaborate with stakeholders across the firm, including General Counsel, InformationSecurity, and Emerging Tech Risk teams, helping to shape best practices and ensure compliance with regulations such as UK/EU GDPR, DORA, HIPAA, and EU AI Act. The role offers a dynamic mix of hands-on risk management, internal auditing, and strategic input into global processes. It’s ideal for someone with a solid foundation in data More ❯
join their Data Risk Team within Risk & Compliance, based in London, Edinburgh, Chelmsford or Manchester. This is a fantastic opportunity to support the global management of data, privacy, and information risk - particularly across areas like informationsecurity, emerging technologies (including AI), and regulatory compliance. You’ll collaborate with stakeholders across the firm, including General Counsel, InformationSecurity, and Emerging Tech Risk teams, helping to shape best practices and ensure compliance with regulations such as UK/EU GDPR, DORA, HIPAA, and EU AI Act. The role offers a dynamic mix of hands-on risk management, internal auditing, and strategic input into global processes. It’s ideal for someone with a solid foundation in data More ❯
Director in Unit 42 is a senior-level consulting position. The individual will be responsible for the day to day delivery of our threat-led and technology driven cyber security consulting services through leading and directly overseeing a team of Consultants. This person will have experience in developing teams and working with sales and domain leaders. The Consulting Director … and Customer Success Manager (CSM) to deliver pitches and prepare proposals to win new business and manage client relationships. We are seeking an individual who is passionate about cyber security and making a difference. You will be a continuous learner and have a sound knowledge of emerging cybersecurity trends and technologies. The individual serves as a trusted advisor to … cross-sector clients. Your Impact Oversee the delivery of our proactive consulting services, ensuring their consistency, quality and highest level of customer service Provide hands-on, expert-level proactive Security Operations Center (SOC) assessment and transformation services to clients and deliver findings to CxO and/or Board of Directors Work with the BDM and CSM to perform pipeline More ❯
Director in Unit 42 is a senior-level consulting position. The individual will be responsible for the day to day delivery of our threat-led and technology driven cyber security consulting services through leading and directly overseeing a team of Consultants. This person will have experience in developing teams and working with sales and domain leaders. The Consulting Director … and Customer Success Manager (CSM) to deliver pitches and prepare proposals to win new business and manage client relationships. We are seeking an individual who is passionate about cyber security and making a difference. You will be a continuous learner and have a sound knowledge of emerging cybersecurity trends and technologies. The individual serves as a trusted advisor to … cross-sector clients. Your Impact Oversee the delivery of our proactive consulting services, ensuring their consistency, quality and highest level of customer service Provide hands-on, expert-level proactive Security Operations Center (SOC) assessment and transformation services to clients and deliver findings to CxO and/or Board of Directors Work with the BDM and CSM to perform pipeline More ❯
explain the impact of technical issues to non-technical stakeholders Providing supervision and guidance to development teams to ensure project success. Compliance and Security: Working closely with the InfosecSecurity manager to ensure compliance to the required standards and supporting improvement initiatives and protecting the business from risks arising from data loss. To support and contribute actively to … health and safety, environmental, business continuity and informationsecurity arrangements that meets our obligations to our customers Technical Skill Proven Experience working within Azure API Management Integration API REST API Power Platforms Our commitment to Equity, Diversity, and Inclusion (EDI) is fundamental to our success. We strive to cultivate an inclusive environment where every employee feels valued, respected More ❯