aspects of the standard internal audit process, which includes the three phases of planning, execution and reporting out to business management. Performs thorough inquiry and data analysis to understand security and technology operations and assist in developing project scope. Contributes to overall planning efforts for engagement timeline and approach. Examines records, documents, methods, policies, costs and other factors to … determine if areas are conducting operations in accordance with established policies/procedures, best practices, informationsecurity frameworks, Control Objectives for Information and Related Technology controls and governmental and legal requirements. Applies appropriate audit procedures to the areas reviewed to ensure that controls are tested and all significant risks are addressed. Prepares clear and well-organized audit … do better for our customers. Drive results and growth. Respect and promote inclusion & diversity. Do what's right for each other, our customers, investors and our communities. Disclaimer: This information has been designed to indicate the general nature and level of work performed by employees in this role. It is not designed to contain or be interpreted as a More ❯
service solutions to ensure a consistent pipeline. Leadership and motivation of sales team to develop, coach and performance manage to drive behaviour and performance Act in accordance with Computacenter InformationSecurity Policies and report any potential or actual Security events or other Security risks to the organisation What you'll need A successful and proven track More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Oxford or Glasgow, if preferred. Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading informationsecurity company. Specializing in penetration testing and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow … professionally. Dionach by Nomios holds impressive certifications, including CREST, CHECK, PCI QSA, and ISO 27001. With our focus on enhancing customers' security and fostering team development,be joining a company that prioritizes both your growth and the safety of our clients. We're in an exciting phase of expansion and are looking for self-motivated individuals ready to thrive … Tester - Application (CCT APP), Cyber Scheme Team Leader (CSTL) infrastructure (CSTL-INF) or Web Application (CSTL-Web App). Eligibility : Right to work in the UK and eligibility for security clearance. Key Attributes Analytical thinker with a proactive, detail-oriented approach. Excellent verbal and written communication skills Ability to work effectively under pressure Commitment to maintaining the highest ethical More ❯
Oversee the sunsetting and retirement of outdated products. Ensure technical, sales, and commercial readiness across the portfolio. Operational Excellence Define service architecture including APIs, SLAs, and technical documentation. Ensure security, sustainability, and compliance standards are met. Support training, onboarding, and enablement across teams. Performance & Optimisation Monitor KPIs including revenue, margin, pipeline growth, and roadmap delivery. Use data-driven insights … business goals. What Were Looking For: Essential Experience & Skills 4+ years in a product management role, ideally in mobile or telecoms. Deep understanding of UK business mobile, cloud, and security markets. Proven success in vendor management and go-to-market execution. Strong commercial acumen and strategic thinking. Excellent communication and cross-functional collaboration skills. Desirable Experience Experience with public … and welcome all applications. As a specialist in secure technology solutions, all successful candidates will be subject to pre-employment checks, so we can ensure compliance with our ISO27001 (InformationSecurity) and Cyber Essentials Plus certifications. We are committed to using any personal information you may give us in a secure and proper manner, for more informationMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oliver James
industry best practices and regulatory requirements (e.g. ISO, SOC, GDPR) Prepare audit reports and present findings to relevant stakeholders What We're Looking For: Previous experience in IT audit, informationsecurity, or risk management (in-house or external) Knowledge of audit tools, frameworks (e.g. COBIT, NIST), and security standards Strong understanding of IT general controls (ITGCs), infrastructure More ❯
high impact, value returning products to impact on key business metrics. - Create sustainable cost optimised solutions (FinOps) & working with our data quality/governance teams & ensuring compliance to data security, GDPR & ethical AI best practice. - Leveraging advances in AI technology to work on data science innovation products to create a series of prototype products in emerging fields (Agentic AI … end-to-end ownership of business use cases related problems. - Early experience of new tech - such as NLP & generative AI (familiarity with potential use cases, value & concerns - ethical AI, informationsecurity). - Front end development (GUI) experience with the ability to leverage the Azure Databricks platform (Databricks Apps) to create positive user experience generating tools off the back More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
La Fosse
looking to add a Junior GRC Analyst to their well-established team. This is a fantastic opportunity for someone new to the compliance space to get into a dedicated InfoSec GRC role This position offers broad exposure across the full spectrum of Governance, Risk, and Compliance, making it ideal for someone with a genuine passion for learning and a desire … to grow within a supportive culture. What They're Looking For: Demonstrable experience of information governance, data protection, or informationsecurity and compliance. Experience in audits or working with compliance frameworks like ISO27001 or Cyber Essentials Plus. Familiarity with policy documentation and data protection principles. A curious mindset with a keen desire to learn and grow Key More ❯
Computer Science and Cyber Security Tutor We are seeking a compassionate and dedicated Computer Science and Cyber Security tutor to join one of our Universities based in Leeds, to support their Engineering and Computing team. As a tutor, you will contribute to the design, development and production of teaching and learning materials, and delivery across a range of … week teaching, with potential for development work Location: Leeds Salary: up to 33.57 per hour Start Date: 1st September 2025 Essential Criteria: A Master's degree in Computer Science, InformationSecurity or a related field (current Master's students with appropriate experience also considered) OR substantial relevant industry experience Relevant teaching qualification or significant experience with students Experience More ❯
Computer Science and Cyber Security Tutor We are seeking a compassionate and dedicated Computer Science and Cyber Security tutor to join one of our Universities based in Leeds, to support their Engineering and Computing team. As a tutor, you will contribute to the design, development and production of teaching and learning materials, and delivery across a range of … week teaching, with potential for development work Location: Leeds Salary: up to £33.57 per hour Start Date: 1st September 2025 Essential Criteria: A Master's degree in Computer Science, InformationSecurity or a related field (current Master's students with appropriate experience also considered) OR substantial relevant industry experience Relevant teaching qualification or significant experience with students Experience More ❯
following ITIL processes: Business Relationship Management Demand Management Design coordination Change Evaluation Change Management Release and Deployment Management Service Validation and Testing Plus actively support the IT team in InformationSecurity Management KNOWLEDGE, EXPERIENCE, QUALIFICATIONS Bachelor's degree in computer science, business administration, or a related field. Proven industry experience working as an IT Business Analyst Solid track More ❯
related to Data Privacy as needed. Track and escalate as necessary Data Privacy audit support - support the IMPaCT team on request responses Qualifications: Demonstrates Data Privacy, Data Privacy Operations, InformationSecurity or Cyber related risk management or minimum two years in an Internal Audit, Risk Management, or Control Management related role Working knowledge of Data Privacy Compliance laws More ❯
following ITIL processes: Business Relationship Management Demand Management Design coordination Change Evaluation Change Management Release and Deployment Management Service Validation and Testing Plus actively support the IT team in InformationSecurity Management KNOWLEDGE, EXPERIENCE, QUALIFICATIONS Bachelor's degree in computer science, business administration, or a related field. Proven industry experience working as an IT Business Analyst Solid track More ❯
following ITIL processes: Business Relationship Management Demand Management Design coordination Change Evaluation Change Management Release and Deployment Management Service Validation and Testing Plus actively support the IT team in InformationSecurity Management KNOWLEDGE, EXPERIENCE, QUALIFICATIONS Bachelor's degree in computer science, business administration, or a related field. Proven industry experience working as an IT Business Analyst Solid track More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
BNY
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
related partnership and collaboration agreements at a law firm or in-house legal department (law firm or financial services company experience preferred). Basic knowledge of cybersecurity, technology controls, informationsecurity, data privacy and protection, and data management. Knowledge of financial services regulations and regulatory guidance on outsourcing and other third-party relationships (e.g., EBA, ESMA, FCA/ More ❯
bolton, greater manchester, north west england, united kingdom
BNY
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
warrington, cheshire, north west england, united kingdom
BNY
transformation of the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, were seeking the following: Bachelors degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
the OPS Governance Framework, ensuring it is scalable, adaptive, and future-ready. To be successful in this role, we’re seeking the following: Bachelor’s degree in Computer Science, InformationSecurity, Engineering, or a related field. Financial Services or Banking background is essential. Experience in developing and implementing governance frameworks and best practices - AI governance, Risk Management, or More ❯
provides unforgettable digital experiences to their customers in a variety of different formats. Prioritising a user-friendly experience, they are doing tremendously well and are looking for an IT Security Manager to join them. Would you like to shape your own role, creating and implementing processes as you see fit, enjoying a flexible contract and a flat hierarchy in … a company with global reach? Apply today! Responsibilities Align closely with the CTO to improve and shape the security posture of the company Create and manage IT security processes Ensure compliance with ISO27001 and other relevant frameworks Work with auditors and support audits Take responsibility for risk management & analyses Required Very strong B2/C1+ German and English … hierarchy in an established company Flexible contracts If you have the required skills and would like to work for a huge name in the media industry, apply today! IT Security Manager - €95k - Hamburg (Hybrid More ❯
its smooth operation, and driving continuous improvement. You'll collaborate with 2 mid-level infrastructure engineers, a global Service Desk and Support team of 17, and a 20-member InformationSecurity team. Your work will span a diverse technology stack, from end-user devices to cloud environments, with a focus on automation, security, and scalability. This is … for all internal technology platforms.Support the wider team's Implementation of mass deployment and management strategies for Windows and macOS end-user devices. ensure industry-standard compliance and enhance security within our SaaS and PaaS cloud infrastructure. identify areas for automation and continuous improvement, pragmatically advocating for their prioritisation. We're looking for someone who is: experienced in Infrastructure … or Python. experienced working in a full cloud environment, with a strong preference for SaaS. able to have a solid understanding of APIs and experience using them to pull information or update configurations and drive automation. able to demonstrate IaC experience with working knowledge of Terraform or Ansible and a good understanding of CI/CD pipelines. experienced in More ❯
role, we’ll help you to develop the core skills required for internal auditing, risk management, and compliance, contributing to key projects in Risk Management, Compliance, Data Protection, and Information Security. This is an excellent opportunity for someone who is ambitious, highly organised, and eager to gain experience in audit and risk. We would love to welcome you to … requirements. international standards and business policies. Maintain and update audit and risk documentation, ensuring accuracy and completeness. Compliance & Risk Support Support the Risk & Compliance team with data protection and informationsecurity activities. Assist in reviewing compliance policies and procedures to ensure they align with industry standards. Work on compliance monitoring tasks, helping to identify potential issues and recommending … providing a broad and varied learning experience. Opportunity for international travel, supporting reviews in different regions. Potential for full-time progression into a permanent role within Audit, Compliance, or Information Security. A recognised qualification that can provide valuable long-term career opportunities. Qualifications We are looking for a motivated and curious individual with: An interest in technology, audit, risk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
auricoe
personal data, especially regarding assessment of risk and associated control implementation. Advise business stakeholders within context of third party management where personal data is in scope, in collaboration with InformationSecurity and Procurement teams. Assist in investigation, resolution and remedial action of data protection related incidents. Report outcomes to the Group Data Protection Manager and where appropriate Data … to ensure customer outcomes and data protection are considered for all new projects and products. Support product risk reviews and report accordingly to the relevant committees. Maintain the business information asset register and review on a regular basis. Ensure business systems and procedures comply with all relevant data privacy and protections law, regulation and policy (including in relation to … requirements. Proven record of successfully selecting and implementing appropriate privacy controls. In-depth knowledge of completing Privacy Impact Assessments. Experience of responding to Subject Access Requests. Understand technical data security measures available to the business. Excellent communication skills with all levels of the business. Strong attention to detail and analytical skills. If you want to progress your data protection More ❯
Jam Management Consultancy Limited T/A JAM RECRUITMENT
procedures, and processes are clear, performance-oriented, and fully documented. Lead the coordination and documentation of internal audits on key processes. Support training and awareness activities in line with InformationSecurity and Data Privacy standards. Collaborate with the People Team to ensure ongoing colleague training across quality, security, environmental and privacy standards. Continuous Improvement Support the CISO … communicator with strong written and verbal skills. A collaborative, organised and proactive approach with the ability to meet multiple deadlines. Creative problem solver with a genuine interest in data security and regulatory affairs. More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Michael Page
infrastructure including both software and hardware, databases, and other technology platforms; leading the support and maintenance of applications; development and testing of new applications and platforms and cyber and informationsecurity for the Agency. Description This role will either be work on discreet small projects to proactively maintain the applications that are in production or work on operational … of the sift and the interviews completed to inform them of the outcome. Candidates will be subject to UK immigration requirements as well as Civil Service nationality rules. Further information on whether you are able to apply is available here. Successful candidates must pass a disclosure and barring security check as well as animal rights and pro-life … activism checks. People working with government assets must complete basic personnel security standard checks. Certain roles within the MHRA will require post holders to have vaccinations, and in some circumstances, routine health surveillance. These roles include: Laboratory-based roles working directly with known pathogens Maintenance roles, particularly those required to work in laboratory settings Roles that involve visiting other More ❯
Artificial Intelligence Cloud Information Technology Sales Security Software CybersecurityAs a Software Engineer II, you will develop and maintain secure software solutions, mentor junior engineers, and collaborate with teams to meet customer … Intelligence Cloud Information Technology Sales Security Software CybersecurityAs a Software Engineer II on the Platform Delivery Automation team, you'll improve security through automation, collaboration with InfoSec teams, and maintaining platform reliability. Top Skills: AnsibleAWSDockerGitJenkinsKubernetesPythonTerraformLocation: Belfast, United Kingdom Thales people architect solutions that are relied upon to deliver operational advantage at every decisive moment throughout the mission. … and services that impact the lives of millions of people each day to make life better, and keep us safer. We innovate across the major industries of Aerospace, Defence, Security and Space. Your health and well-being matters to us and thats why we offer you the flexibility to do whats important to you; whether thats part time hours More ❯