London, South East, England, United Kingdom Hybrid / WFH Options
Context Recruitment Limited
Information Security Manager Location: London, Hybrid Salary: Up to 75,000 Reports to: Head of CyberSecurity A well regarded Managed Service Provider is seeking an experienced Information Security Manager to join its team on a permanent basis. This role offers the opportunity to lead and deliver strategic security initiatives across a varied client base, with a strong focus on More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Experis
Role Title: Cybersecurity IT Audit Consultant Duration: contract to run until 30/11/2025 Location: Sheffield, Hybrid 3 days in the office is mandatory Rate: up to £460 p/d Umbrella inside IR35 Role purpose/summary Conduct audits of cybersecurity controls across various domains (e.g., identity & access management, data protection, incident response). Evaluate the effectiveness … senior management. Support regulatory and compliance initiatives related to cybersecurity. Key Skills/requirements IT Audit Experience: Proven track record in conducting IT audits, especially within large financial institutions. Cybersecurity Expertise: Deep understanding of cybersecurity frameworks (e.g., NIST, ISO 27001), controls, and risk management. Audit Methodologies: Familiarity with internal audit processes, risk assessments, control testing, and reporting. Prior experience working … within the client's cybersecurity or audit functions, understanding internal systems, governance structures, and compliance expectations. Contractor Profile: Ideally someone who has worked in similar roles on a contract basis and can quickly integrate into the team. All profiles will be reviewed against the required skills and experience. Due to the high number of applications we will only be able More ❯
Project Manager – Network Security | Up to £100,000 + Package | UK Remote Stealthwatch are proud to be partnered with a global leader in network security solutions , currently seeking an experienced Project Manager to join their growing team. This is a More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
their strategic priorities, across all sectors, including: Digital Acceleration and Transformation Enterprise Enablement Big Data and Analytics Applications Rationalization Cloud Modernization Sourcing and Ecosystem Optimization Contract and Cost Optimization Cybersecurity and Resilience Due to its current success, Gartner is in the process of expanding its high-performance EMEA Cybersecurity Resilience Consulting practice and is seeking a Director for UKI. We … help leading organizations and their executives, CIOs, and CISOs collaborate and optimize their cybersecurity resilience defensibility in an evolving digital and uncertain world. Gartner's trusted data-driven insights give executives confidence to prioritize and make informed decisions about cybersecurity resilience. In today's world, a consulting firm that incorporates security as part of its "DNA", (with the ability to … technology initiatives) has relevance to the most important strategic decisions any business will make. We work with clients to: Prioritize what to accelerate and where to invest to improve cybersecurity resilient while enabling the business Enable culture hacks to accelerate change and embed security throughout the organization Support digital momentum and value realization in a secure manner What you'll More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
ensuring alignment with program requirements and timelines. Coordinate defect tracking, triage, and resolution in collaboration with development and operations teams. Ensure compliance with Section 508 accessibility standards and DoD cybersecurity testing requirements. Implement quality gates within CI/CD pipelines and promote test automation for scalable releases. Conduct regression, performance, integration, and user acceptance testing (UAT) as part of the … such as Selenium, JIRA, TestRail, Postman, or equivalent Strong knowledge of Agile development, DevSecOps practices, and automated testing frameworks Familiarity with Section 508/WCAG accessibility standards and DoD cybersecurity compliance Excellent analytical, communication, and documentation skills More ❯
Evaluate authorization documentation and provide written recommendations for authorization to government PMs Develop and maintain a formal Information Systems Security Program Ensure that all IAOs, network administrators, and other cybersecurity personnel receive the necessary technical and security training to carry out their duties Develop, review, endorse, and recommend action by the AO or DAO of system assessment documentation Ensure … to include accountability, access rights, and special handling requirements Ensure development and implementation of an information security education, training, and awareness program, to include attending, monitoring, and presenting local cybersecurity training. Evaluate threats and vulnerabilities to ascertain whether additional safeguards are needed Assess changes in the system, its environment, and operational needs that could affect the authorization Ensure that More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
DSO) responsibilities for Bear River in coordination with DoD stakeholders. Maintain proactive client communication, end user training, resolve issues, and foster strong long-term relationships. Ensure full compliance with cybersecurity requirements, including NIST SP 800-171, DFARS, and DISA STIGs. This includes ensuring the security of all SQL database systems and data as well as the security configuration of the … stability and security of the ITS/DMM application. Participate in the planning and execution of application upgrades and enhancements. Required Qualifications: Bachelor's degree in IT, Computer Science, Cybersecurity, or a related discipline. IAT Level III certification (e.g., CISSP, CASP+) per DoD 8570 guidelines. At least 5 years of experience in IT engineering, administration, or secure program support, with More ❯
consumers. You'll Bring These Qualifications Education: Degree in Network Engineering, Systems Engineering, Information Technology, or related field (e.g., General Engineering, Computer Engineering, Electrical Engineering, Computer Science, Computer Forensics, CyberSecurity, Software Engineering, Information Assurance, or Computer Security). Up to 18 semester hours of military training/coursework in networking, computer science, or cyber topics is equivalent to an More ❯
/III level, or equivalent. Strong capability in risk assessment, vulnerability management, and data informed decision -making. Solid understanding of incident response procedures, including containment, eradication, and recovery from cybersecurity events. Advanced proficiency in AWS, with experience in multi-region and hybrid cloud architectures Strong grasp of networking protocols, including TCP/IP, and core network security principles. Proficiency in More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
Als Business Information Security Officer (BISO) bij Schiphol Group vertaal je het informatiebeveiligingsbeleid naar de praktijk en begeleid je het risicomanagementproces. Je bent het aanspreekpunt voor cybersecurity binnen de afdeling Group & Employee Technology (GET), met focus op IT4HR & CIOO. Jouw rol en verantwoordelijkheden Vertalen van het Schiphol Group informatiebeveiligingsbeleid naar praktische verbeteracties binnen GET Adviseren van business owners, service managers … en product owners over cybersecurity en IT-risico's Bewaken van de uitvoering van het informatiebeveiligingsbeleid Monitoren van organisatieactiviteiten en adviseren over tactisch en operationeel beheer Opstellen van roadmaps en rapporteren aan het lijnmanagement Zorgen voor inzichtelijke compliance aan het cybersecurity beleid Adviseren bij IT-inkooptrajecten vanuit cybersecurity perspectief Wat we je bieden Salaris tussen € 4981 en € 6911 bruto per More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
london (city of london), south east england, united kingdom
Slaughter and May
below and there may be others which are not listed. You may be required on occasion to work outside our normal working hours of 9:30am to 5:30pm. CyberSecurity & Engineering Constantly review and improve the firm’s security posture and external security rating. Identify vulnerabilities in hardware and software to be remediated by Engineering\Operations teams. Understand current … stakeholders. Delivery-focused: equally comfortable running a failover test as updating\reviewing runbooks. Structured and organised with strong attention to detail. Able to work independently while interfacing effectively with CyberSecurity, BCP, and Infrastructure teams. Excellent communicator who can translate technical findings into clear business impact. CANDIDATE PROFILE//Candidates for this position must have: Hands-on experience with More ❯
for managing and optimizing cloud-native platforms, automating infrastructure deployments, and ensuring secure and reliable operations across multiple environments. You'll work closely with software developers, system administrators, and cybersecurity teams to streamline delivery of secure, scalable applications within classified environments. Key Responsibilities: Design, implement, and manage secure, scalable AWS infrastructure in support of mission systems Automate deployment, monitoring, and More ❯
Job Title: CyberSecurity Analyst (Contract) Contract Rate: Negotiable (Inside IR35) Shift Pattern (Day/Night) Location: Andover, Hampshire Security Clearance: ** Current valid SC clearance required ** Eligibility: ** UK eyes only ** About the Role: This is a brilliant opportunity to join our growing team at CND. We are looking for an experienced Security Analyst. This role offers a great shift pattern More ❯