effectiveness of this security training program for the different audiences. Ensure effective measures are put in place to protect the businesses internal/customer data in line with current legislations. Developing and embedding mature processes that focus on Risk Management and incident response. Carry out risk assessments and conducting … guidelines. Oversee the approval and publication of said documents. Create a framework for roles and responsibilities with regard to information ownership, classification, accountability and protection of information assets. Monitor advancements in educational technologies and threat horizons. Education and experience requirements: Hold at least one of the following Security Management … technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists. Proven experience of Least Privileged/Zero Trust adoption, Data Leakage Protection strategies in enterprise businesses. Strong experience having developed and managed business continuity and disaster recovery plans for large-scale SaaS businesses. more »
of the Information Security Specialists role is to ensure that the Trusts technology, infrastructure, systems and supporting processes, collectively provide adequate and cost-effective protection against cyber threats and identified Cyber Security risks. Availability of the Trusts digital services is a critical dependency essential to support patient care , as … Head of Information Governance and DPO and ensures that the technology, infrastructure, systems and supporting processes and organization, collectively provide adequate and cost-effective protection against cyber threats and all identified Cyber Security risks. The role will involve taking ownership and accountability for a number of security focused technical … improvements in healthcare delivery; Good working knowledge of information risk management techniques and analysis Thorough working knowledge of relevant legislation/guidelines e.g. GDPR, DataProtectionAct, Freedom of Information Act 2000, information confidentiality security and guidance, Data Security and Protection Toolkit Standard Desirable more »
holder will liaise with the manufacturer and users of the system to implement changes and upgrades in a timely manner. The post holder will act as the single point of contact for enquiries from end users and co-ordinate with all planned upgrades to the system and act … technical knowledge and skills to meet new requirements of the organisation. An understanding of the modern PC environment and operating systems Knowledge of the Dataprotectionact 1998. Knowledge of Windows Server Environment and Networking Knowledge of HL7 Experience Essential Proven involvement in implementing change and projects … Experience of database management Working knowledge of cancer surveillance systems Skills Essential Advanced IT Skills Ability to produce complex reports using a current data information system Ability to understand and interpret user requirements and develop and communicate appropriate responses Able to effectively train and coach staff in the use more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
CIIH Ltd T/A Headway Recruitment
hands-on experience in security/infrastructure within an enterprise environment. Requirements: Proficiency in enterprise information security standards, including Cyber Essentials, ISO 27001, 27002, DataProtectionAct, and GDPR. In-depth knowledge of the Microsoft O365 environment, threat intelligence analysis, Security Incident Response processes, disaster recovery, and more »