Kendal, Cumbria, North West, United Kingdom Hybrid / WFH Options
Des Scanlan IT Recruitment Ltd
IT Infrastructure & Security Specialist - £40k plus benefits Hybrid working - Kendal Are you an IT Engineer who understands how to plan, develop and install great IT Infrastructure? Can you work in a structured way both on your own and as part of a larger team? Do you like getting involved with all areas of technical infrastructure as well as desktop … be an opportunity to join a forward thinking and creative company who are undertaking a modernisation of their systems. What will you be doing? Reporting to the IT Infrastructure & Security Manager, you will be part of a team of four who identify, plan, and deliver all aspects of IT Infrastructure and Security across a group of companies. You … business needs. This role is a hands-on position designing and provisioning new systems/platforms within a controlled project environment. Ensure that the IT strategy for infrastructure and security requirements is adhered to and continuously improved, supporting the business in its day-to-day operations and growth aspirations. The successful planning, implementation and operation of informationsecurityMore ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
Cyber Security Project Manager, SC Clearable We are seeking an experienced Cyber Security Project Manager to lead the delivery of high-impact security initiatives within a fast-paced enterprise environment. This is an exciting opportunity to play a key role in strengthening our client's security posture during a critical transformation phase. Rate - £650.00 per day … months with the liklihood of extension Key Responsibilities: Lead end-to-end delivery of cyber security projects, ensuring alignment with business goals and compliance requirements Work across InfoSec, IT, risk, and compliance teams to deliver initiatives such as vulnerability management, identity and access management (IAM), SIEM upgrades, and cloud security improvements Manage third-party vendors and internal stakeholders … execution Develop and maintain project documentation, risk logs, and reports for senior stakeholders Ensure projects adhere to regulatory and governance frameworks Skills and Experience Proven track record delivering cyber security or informationsecurity projects in large, complex organisations Strong understanding of cyber risk, threat management, and technical security controls Excellent stakeholder management and communication skills Experience More ❯
combines advanced design, planning, implementation, and troubleshooting of network systems with leadership responsibilities. The role aligns technical capabilities with business goals, facilitating cross-functional collaboration and ensuring compliance with security and performance standards. Working at Baker McKenzie: Baker McKenzie is the world's leading law firm with offices all over the world. Our Belfast Centre is home to over … infrastructure, ensuring compliance with service-level agreements (SLAs) Monitor network performance, perform periodic assessments, and implement enhancements to meet or exceed operational targets Collaborate with internal stakeholders to enforce informationsecurity policies and remediate non-compliance Define and participate in disaster recovery (DR) and business continuity planning (BCP) practices Monitor internal and external compliance with the Firm's … informationsecurity policies and procedures. Identify non-compliant practices and assist with remediation Vendor & Project Management: Establish and maintain relationships with network-related vendors, ensuring timely support and cost-effective solutions Manage network-related projects, including planning, implementation, and documentation Provide status updates and detailed reports to the IT leadership Documentation & Training: Maintain and enhance the Firm's More ❯
Roles & Responsibilities: You analyze complex enterprise informationsecurity programs and infrastructure in both the public and private sectors. You assist with assessments of clients' IT and security processes, risks, controls, and compliance against leading practices, industry standards, and/or client frameworks. You assess capability and maturity, identify gaps in design and execution, and communicate issues and … people models, to address key and evolving risks. You serve as the interface between client executives and hands-on technology practitioners, driving meaningful strategic change in the areas of information protection, data security and privacy, security operations, and business continuity. You articulate the business risks of technical vulnerabilities and communicate findings to client personnel. You assist clients … develop a remediation and improvement plan. Skills & Qualifications: You have a master's degree. You have a minimum of three years of experience in the field of cybersecurity and information risk management. You have working knowledge of leading frameworks such as ISO 27001, NIST Cybersecurity Framework (CSF), NIST 800-53, CIS, and the Cybersecurity Maturity Model. You have experience More ❯
Job Description As a Senior Engineer - Threat Modelling, you will be part of a cross-functional team delivering digital business transformation solutions to our clients. This role focuses on Security Architecture and Threat Modelling, including governance, evaluation of public cloud services, and conducting security reviews for Public Cloud Providers. Collaboration with Engineering, InformationSecurity, Program Management … and Development teams is essential. You will conduct technical architecture reviews to identify security opportunities, threats, and mitigation strategies. Your Impact Conduct threat modeling exercises using established methodologies. Identify potential threats and specify mitigation controls. Manage the lifecycle of threats and controls, ensuring updates. Deliver threat models within deadlines. Provide feedback to improve threat modeling processes. Present findings to … leadership and stakeholders. Qualifications Your Skills & Experience We seek candidates with experience in: Proficiency in GCP (essential) Security architecture principles, frameworks, and best practices Threat modeling methodologies like MITRE ATT&CK, STRIDE, PASTA Cybersecurity experience of 5+ years Security practices including authentication, authorization, logging, encryption, infrastructure security, network segmentation Knowledge of cloud security frameworks Rest API More ❯
Job Title : IT Security Specialist Contract Type: Permanent, Part Time, Full Time, Job Share option available Salary Range: £37,600 - £56,400 Location: Eastleigh - hybrid Closing Date for applications: Thursday 3rd July IT Security Specialist: We have an exciting opportunity for an IT Security Specialist to join our InformationSecurity team at Ageas, reporting directly … to the Counter Threat Unit Manager. As an IT Security Specialist, you will support the day-to-day operations of the Counter Threat Unit, applying your strong background in infrastructure engineering, cloud-based architectures, and solution delivery. You will contribute to maintaining our secure systems across hybrid environments, leveraging your expertise in both on-premises and cloud platforms such … as Azure, AWS, and GCP. Main Responsibilities as IT Security Specialist: Assist in gathering and analysing threat intelligence; monitor systems and networks to identify anomalies and support situational awareness. Follow established processes to help ensure compliance with legal, regulatory, and internal security requirements. Contribute to the investigation and resolution of security incidents, working in line with organisational More ❯
primary purpose of this role is to support Grant Thornton International Ltd.’s internal cybersecurity assessment programme, which monitors our global network of Member Firms for compliance against our informationsecurity framework. The ideal candidate will have experience evaluating IT Infrastructure Security technologies, IT general computer controls, industry frameworks (e.g. NIST) and will bring strong information technology audit or security consulting experience to the programme. Location United Kingdom/Europe Main responsibilities The Senior Associate will support with the implementation of the cybersecurity compliance programme, including: Collaboration with IT assurance engagement teams across the GT network Review of data and evidence obtained in the field, including reviews for completeness, consistency and clarity. Evaluate cybersecurity … assessment cycles. This role will also include broader support to the team such as: Respond to firm enquiries and mailbox management. Provide advice and guidance on a variety of security topics. Develop guides, templates and other material to support the implementation of security standards. Research security best practices and provide appropriate reporting. Person specification Education/qualifications More ❯
result of compliance reviews, internal audits, third party audits or otherwise escalated. Supporting the Compliance Team and other key stakeholders on initiatives as assigned. Supporting the Privacy, Cybersecurity and InformationSecurity teams with projects to include compliance readiness for new laws, regulations (e.g. GDPR and CCPA), frameworks (e.g. COSO and NIST cybersecurity frameworks) and standards (e.g, DORA, PCI … Supporting regulatory, internal or external audits or certifications. Provide knowledge and operational input on our Third-Party Risk Management framework, including: Performing third-party vendor risk assessments, evaluating privacy, informationsecurity, and AI compliance risks, among others, during onboarding and renewal processes. Reviewing, updating and maintaining third party risk questionnaires and registers collaborating with various departments, including Legal … InformationSecurity, IT and Procurement. Support the Privacy team on a number of Data Privacy enhancing initiatives, including: conducting and document end-to-end Privacy Impact Assessments (PIAs) for new and existing products and processes, supporting compliance with GDPR, CCPA, and other privacy regulations. Maintain and update the Record of Processing Activities (ROPA) in collaboration with cross-functional More ❯
MyData-TRUST - Data Protection & Privacy for Life Sciences
legal compliance, build patient trust, and propel innovation. Founded in 2017, MyData-TRUST is composed of a global multi-disciplinary team of data privacy, legal, life sciences IT, and informationsecurity experts. MyData-TRUST offers a full range of privacy and data protection services, including Data Protection Officer as a Service, customized consulting and privacy management solutions. Medior … we looking for ? Responsibilities Acts as legal support in the context of his/her client portofolio. Respond to operational team and client's requests for legal advice, provides information on legal and regulatory obligations in terms of data protection and recommends pragmatic & feasible solutions. Proactively keeping abreast of regulatory, case law and doctrinal developments in the field for … informed about the latest development, enhancing legal methodologies, tools and best practices. Support marketing and thought leadership efforts by contributing to industry publications, webinars and external engagements. Organizes internal information sessions on legal developments in the field of data protection in order to keep operational knowledge up-to-date. Qualifications 4 years of practical experience in GDPR & Data Protection More ❯
models, subscription-based services, SLAs, and regulatory compliance. Advise on data protection, privacy, and cybersecurity obligations in commercial agreements, ensuring compliance with GDPR and other regulations. Draft and negotiate informationsecurity addenda, Data Processing Addendums (DPAs), and related agreements. Apply a working knowledge of revenue recognition principles to structure transactions in alignment with ASC 606 and collaborate with … revenue outcomes. Previous SaaS, Cloud or related infrastructure experience, with a track record of negotiating complex agreements in enterprise IT or cloud computing environments preferred. Expertise in privacy and informationsecurity laws and regulations, with experience drafting and negotiating DPAs and security addenda, as well as familiarity with product and security addenda preferred. Previous experience with More ❯
models, subscription-based services, SLAs, and regulatory compliance. Advise on data protection, privacy, and cybersecurity obligations in commercial agreements, ensuring compliance with GDPR and other regulations. Draft and negotiate informationsecurity addenda, Data Processing Addendums (DPAs), and related agreements. Apply a working knowledge of revenue recognition principles to structure transactions in alignment with ASC 606 and collaborate with … revenue outcomes. Previous SaaS, Cloud or related infrastructure experience, with a track record of negotiating complex agreements in enterprise IT or cloud computing environments preferred. Expertise in privacy and informationsecurity laws and regulations, with experience drafting and negotiating DPAs and security addenda, as well as familiarity with product and security addenda preferred. Previous experience with More ❯
Hammersmith, England, United Kingdom Hybrid / WFH Options
Nutanix
models, subscription-based services, SLAs, and regulatory compliance. Advise on data protection, privacy, and cybersecurity obligations in commercial agreements, ensuring compliance with GDPR and other regulations. Draft and negotiate informationsecurity addenda, Data Processing Addendums (DPAs), and related agreements. Apply a working knowledge of revenue recognition principles to structure transactions in alignment with ASC 606 and collaborate with … revenue outcomes. Previous SaaS, Cloud or related infrastructure experience, with a track record of negotiating complex agreements in enterprise IT or cloud computing environments preferred. Expertise in privacy and informationsecurity laws and regulations, with experience drafting and negotiating DPAs and security addenda, as well as familiarity with product and security addenda preferred. Previous experience with More ❯
Staines-upon-Thames, Middlesex, England, United Kingdom Hybrid / WFH Options
Bupa UK
components of customers audits, including planning, scoping, preparation, documentation, delivery and follow-up; in direct partnership with customers and internal Commercial teams. Liaise with subject matter experts to ensure information is gathered in a timely manner to ensure customer requests are correctly responded to and protect Bupa. Reviewing and negotiating customer contractual IT agreements and clauses to ensure that … responsibilities in either a Big 8 external practice, Internal Audit, or supplier/customer assurance function for a financially regulated/FinTech entity. Certified in relevant audit, risk and security certifications preferably with one of the following: IIA, CISA, CISM, or CISSP. Strong informationsecurity/assurance, audit, compliance and risk knowledge, experience of IT risk and More ❯
Farringdon, England, United Kingdom Hybrid / WFH Options
ALTEN LTD - UK
Who we are: ALTEN, an engineering and technology consultancy, We are a leading Engineering and IT consultancy operating across 30 countries, making waves in all sectors: Aeronautics, Space, Defence, Security and Naval, Automotive, Rail and Mobility, Energy and environment, Life Sciences and Health, Industrial Equipment and electronics, Telecoms, Banking, Finance & Insurance, Retail, Services & Medias, Public Services & Government. With a … UK entities, working closely with the Group Legal Corporate Department. Manage delegations of authority, signatures, and contracts for key personnel, ensuring governance standards are upheld. Support the Quality and InformationSecurity teams with review of governing policies and procedures. Support Finance team with legal and compliance queries, including for audit purposes. Insurance & Compliance: Work with the Group Insurance … ALTEN’s insurance policies across the UK entities. Support the Group Compliance Department in the deployment of the anti-corruption program, data protection program, international trade sanctions, and national security programs. M&A Legal Support: Collaborate with the Group M&A team to provide legal support during mergers and acquisitions. Participate in legal due diligence for targets and manage More ❯
Thanks to continued growth we now have a brand new role for a Director to join our Digital Risks (Cyber Security) practice in London. We are seeking a senior leader to drive the growth of Digital Risks in the United Kingdom, with a primary focus on cyber assurance, third-party risk management, and large-scale regulatory compliance audits. In … and government sectors. In-depth understanding of penetration testing and vulnerability assessments and their integration into broader cyber assurance projects. Education & Certifications: Bachelor’s or master’s degree in informationsecurity, Computer Science, Engineering, or a related field. Relevant certifications such as CREST, OSCP, CISSP, CISM, CISA, ISO 27001 Lead Auditor, SANS, or other recognized credentials in cybersecurity More ❯
If you require any adjustments to assist you in applying, please contact We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our InformationSecurity team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing … collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Here’s a taste of what you will be doing as an Identity Governance Access Analyst at Nottingham Building Society: - Daily Operations: Collaborate with the IGA Manager to … compliance standards such as GDPR, FCA guidelines, and ISO 27001. Detail-Oriented: Strong attention to detail and a process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identity and access management, preferably in financial services or regulated environments, with beneficial qualifications like a More ❯
London, England, United Kingdom Hybrid / WFH Options
Nottingham Building Society
If you require any adjustments to assist you in applying, please contact We are seeking a proactive and detail-oriented IGA/IAM/PAM Analyst to join our InformationSecurity team. In this role, you will help protect the data of our members and employees by supporting the governance of user identities, managing access controls, and securing … collaborate across teams to ensure that all staff have the appropriate access, at the right time, with the correct level of privilege helping us fulfil our regulatory, privacy, and security commitments. Here’s a taste of what you will be doing as an Identity Governance Access Analyst at Nottingham Building Society: - Daily Operations: Collaborate with the IGA Manager to … compliance standards such as GDPR, FCA guidelines, and ISO 27001. Detail-Oriented: Strong attention to detail and a process-driven mindset. Collaborative Skills: Ability to work effectively across IT, Security, Audit, and HR teams. Experience and Qualifications: 2–4 years of experience in identity and access management, preferably in financial services or regulated environments, with beneficial qualifications like a More ❯
Ripponden, Yorkshire, United Kingdom Hybrid / WFH Options
JLA Limited
subject access requests and other requests from data subjects regarding their personal data Experience in delivering training and awareness programs to employees on data protection best practices Familiarity with informationsecurity management systems and data governance frameworks Experience in a legal, audit or risk management role Personal qualities (the way you think and act) An ability to work … effectively under pressure and to manage sensitive and confidential information Excellent verbal and written communication skills, with strong attention to detail Qualifications A nationally recognised data protection qualification More ❯
Role Description This is a full-time hybrid role for an InformationSecurity Manager with 2nd and 3rd Line IT support experience. The role involves day-to-day tasks associated with planning, implementing, and maintaining an InformationSecurity Management System (ISMS), including managing cybersecurity risks, implementing network security measures, and ensuring compliance with industry standards. … The InformationSecurity Manager will also provide IT support to the company and will be based in the London office, with flexibility for some remote work. Your past experience must include 2nd and 3rd line infrastructure support where you are able to advise and direct the technical team. Qualifications Experience in InformationSecurity Management and creating … and implementing an ISMS Experience in Cybersecurity and Network Security Expertise in Informationsecurity best practices and standards Excellent problem-solving skills and attention to detail Strong communication and collaboration skills Bachelor's or Master's degree in Computer Science, Information Technology, or related field Certifications such as CISSP, CISM, CCNA, or equivalent are a plus More ❯
Role: InformationSecurity Manager Location: Utrecht Type: Permanent Workplace Type: Hybrid/3 days on site Language: Dutch speaking role Job Description Develop, implement, and maintain the organization's informationsecurity strategy, policies, and procedures. Lead risk assessments, security audits, and vulnerability assessments to identify and mitigate threats. Oversee compliance with industry regulations (e.g., ISO … NIS2, GDPR). Coordinate with IT, legal, and business units to ensure security is integrated into all processes. Conduct security awareness training and promote a culture of cybersecurity. Monitor and report on security performance and risk to senior leadership. Manage relationships with external vendors and consultants for security services. Lead and mentor a team of security professionals, if applicable. Requirements Dutch speaking role A bachelor's or master's degree (Desirable) One informationsecurity-related certification such as CISM, ISO27001, CRISC, CISSP Minimum of 5+ years relevant experience Strong foundational knowledge and experience in information security. Benefits Base Salary: 6k - 8k depending on experience (excluding all of the below) Bonus Hybrid Working More ❯
An impressive multinational Telecoms business is looking for an accomplished Senior InformationSecurity Engineer to join its team based in London. Please note, this role is hybrid so you will be required to work in the office 3 days per week. In this role of significant responsibility, you will operate at the cutting edge of technology, protecting the … business from cyber threats. You will design, implement, and maintain security solutions that protect networks, systems, and data. You will identify vulnerabilities, harden systems, respond to threats, and ensure compliance with security best practices and industry standards, including ISO27001. In order to be suitable for this role you must have demonstrable hands-on expertise with monitoring and securing … enterprise class technology estates. You will have proven experience with Cyber Security best practice including the NIST Cloud Security guidelines. You will support ISO 27001 compliance and have strong documentation skills. Experience in the Telco sector and knowledge of the UK Telecom Security Act would be advantageous to your application, as would CISSP and/or CISM More ❯
care about healthcare, and we plan to be the largest digital primary healthcare platform for people across Europe. About the role We are seeking a motivated and detail-oriented InformationSecurity Engineer to join our team here at ZAVA. In this role, the successful candidate will support the organisation's cybersecurity efforts by assisting with the implementation, monitoring … and maintenance of security systems and processes. They will work closely with senior security team members to identify vulnerabilities, respond to incidents, and ensure compliance with security policies and frameworks. The role involves hands-on tasks such as configuring security tools, analysing alerts, and supporting investigations into potential threats, as well as contributing to the development … ofa secure IT environment. Additionally, the successful candidate will participate in security awareness initiatives, help document processes, and stay updated on emerging threats and technologies to enhance the organisation's security posture. Key Accountabilities You will be working from home, but you do have the opportunity to come to the office, if you wish. You will use our More ❯
is developing a network of connected organisations, all working together to defend against cybersecurity attacks in the supply chain. Organisations rely on us to establish trust, through sharing their security maturity and visualising the risks posed by their supply chain ecosystem. And we're already trusted by customers like ASOS, Snyk, BAE Systems and the NHS. We are putting … we're humble and honest. At Risk Ledger, we aim high to find the best solutions we can and always put our users first. This role: The Head of InformationSecurity has a bucket load of responsibility to protect the business, inform key risk-based decisions, and operate confidently and expertly with the clear understanding that their actions … underpin every operational function and, ultimately, the organisation's commercial success. Security is at the heart of what we do, so every member of our team is passionate about making life as difficult as possible for attackers across the globe, and that extends to our own internal systems and work environment. You will be leading the way, evolving and More ❯
is developing a network of connected organisations, all working together to defend against cybersecurity attacks in the supply chain. Organisations rely on us to establish trust, through sharing their security maturity and visualising the risks posed by their supply chain ecosystem. And we're already trusted by customers like ASOS, Snyk, BAE Systems and the NHS. We are putting … we're humble and honest. At Risk Ledger, we aim high to find the best solutions we can and always put our users first. This role: The Head of InformationSecurity has a bucket load of responsibility to protect the business, inform key risk-based decisions, and operate confidently and expertly with the clear understanding that their actions … underpin every operational function and, ultimately, the organisation's commercial success. Security is at the heart of what we do, so every member of our team is passionate about making life as difficult as possible for attackers across the globe, and that extends to our own internal systems and work environment. You will be leading the way, evolving and More ❯
Security Control Tester/Security Control Assessor Our client is a global information services company and is seeking 3 seasoned security experts to lead the assessment and evaluation of security controls across systems and processes. As a Lead Security Control Assessor, you will oversee and conduct security control testing, verifying the design, implementation … and operational effectiveness of controls in both on-premise and cloud environments. Your expertise will be instrumental in driving quality security assessments through thorough testing, automation, and collaboration with cross-functional teams and stakeholders. These roles can be based remotely within the UK and will be for an initial 8 month contract. The contract will require to be via … umbrella company and have a banding of £398-£486 depending on experience. Required Skills Experience with conducting security control testing in cloud environments such as AWS and Azure Experience performing IT Audit or InformationSecurity control assessments, with specific experience in testing cloud security controls Professional certification such as CISA, CISM, CISSP, ISO 27001 Lead Auditor More ❯