Role: 5 x Security engineer Rate: Inside IR35 Location: 3 days a week onsite in London Duration: 6-months initially Role description: Cyber Security Designs, Strategies, and Security Patterns, datasecurity and compliance by implementing GCP, Azure security best practices, managing IAM roles and permissions, GCP, Azure environments by implementing robust security controls … encryption, and access management policies Key responsibilities: Each team that owns a security control has been responsible for creating the format they use to guide the consumers of that control 1.Engineering Guardrails that help security control users identify the strategic solution to meet their use case and map to the appropriate engineering pattern a. Depending on the type … of security control, the security control users would know the use case they need to meet, the technology they are using, and the environment it's needed it. 2.Engineering Patterns tell the security control users how to use the required control on the technology/platform they are using and for each environment/datacentre. Many of More ❯
Azure DevOps and GitHub Actions. Ensure version control, configuration management, and continuous delivery practices are adhered to. Collaboration & Leadership: Work closely with cross-functional teams, including development, infrastructure, and security, to ensure alignment on migration goals. Provide technical leadership and mentorship to teams involved in database architecture and deployment. Conduct training sessions and document processes to ensure knowledge transfer … Qualifications: Certifications in cloud technologies (e.g., Microsoft Azure Database Administrator, Cloud Solutions Architect). Experience with large-scale migration projects in regulated industries like insurance or finance. Familiarity with datasecurity standards and compliance regulations. More ❯
Azure DevOps and GitHub Actions. Ensure version control, configuration management, and continuous delivery practices are adhered to. Collaboration & Leadership: Work closely with cross-functional teams, including development, infrastructure, and security, to ensure alignment on migration goals. Provide technical leadership and mentorship to teams involved in database architecture and deployment. Conduct training sessions and document processes to ensure knowledge transfer … Qualifications: Certifications in cloud technologies (e.g., Microsoft Azure Database Administrator, Cloud Solutions Architect). Experience with large-scale migration projects in regulated industries like insurance or finance. Familiarity with datasecurity standards and compliance regulations. More ❯
across the organisation to ensure systems are aligned with business goals and drive process improvement. Identifying areas for automation , efficiency gains, and improved user engagement. Upholding high standards for data protection, governance, and compliance . Managing and mentoring a specialist team-encouraging performance, learning, and innovation. Maintaining system documentation, operational procedures, and training resources. What You'll Bring: Solid … and technical support. A track record of successfully managing complex enterprise systems within large organisations. Excellent stakeholder engagement and a strategic mindset around enterprise systems. A strong grasp of datasecurity , compliance, and service management frameworks like ITIL . Proven leadership in both managing internal teams and working with third-party vendors. A forward-thinking approach to automation More ❯
Role: 5 x Security engineer Rate: Inside IR35 Location: 3 days a week onsite in London Duration: 6-months initially Role description: Cyber Security Designs, Strategies, and Security Patterns, datasecurity and compliance by implementing GCP, Azure security best practices, managing IAM roles and permissions, GCP, Azure environments by implementing robust security controls … encryption, and access management policies Key responsibilities: Each team that owns a security control has been responsible for creating the format they use to guide the consumers of that control 1.Engineering Guardrails that help security control users identify the strategic solution to meet their use case and map to the appropriate engineering pattern a. Depending on the type … of security control, the security control users would know the use case they need to meet, the technology they are using, and the environment it's needed it. 2.Engineering Patterns tell the security control users how to use the required control on the technology/platform they are using and for each environment/datacentre. Many of More ❯
implementation support and troubleshooting for Workday configurations and AI agents. Participate in Workday releases and updates, testing new features and ensuring compatibility. Execute EIBs (Enterprise Interface Builders) and mass data loads as needed. Ensure compliance with datasecurity and privacy standards within Workday. Required Skills/Experience Hands-on Workday configuration experience. Proven experience with Workday CoPilot … and/or AI Agent configuration. Strong understanding of Workday security, business processes, and reporting. Experience with Workday Studio, EIBs, and calculated fields. Ability to work independently and manage multiple priorities in a fast-paced environment. Excellent problem-solving and communication skills. If you are interested in this opportunity, please apply now with your updated CV in Microsoft Word More ❯
technical designs- Promote standardisation, automation, and efficiency in budgeting, forecasting, and performance management processes- Provide architectural assurance and design leadership on EPM implementations, upgrades, and enhancements- Ensure compliance with datasecurity, privacy, and audit requirements within the EPM environment- Liaise with Oracle PS, system integrators, and internal teams to optimise platform performance and usability- Stay current with the More ❯
Our client is looking for a number of Security Engineers to join their team on a six month initial contract, working three days onsite in London and two days remotely. This role is Inside IR35. This role will involve Cyber Security Designs, Strategies, and Security Patterns, datasecurity and compliance by implementing GCP, Azure security best practices. Managing IAM roles and permissions, GCP, Azure environments by implementing robust security controls, encryption, and access management policies Key Skills/Experince: Developing Engineering Guardrail Template Developing Engineering Pattern Template User acceptance testing templates Test and learn of templates Upload finished templates to GSRA SharePoint LA International is a HMG approved ICT Recruitment and Project Solutions … operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner More ❯
roll-out Collaborate with cross-functional teams to align systems with organisational strategy and improve business processes Identify opportunities for automation, efficiency, and improved user experience Ensure compliance with security policies and data protection standards Mentor and manage a specialist team, driving performance and continuous improvement Maintain system documentation, knowledge base and training materials Essential Skills & Experience: Strong … HCM) , including configuration and support Proven track record managing complex enterprise applications in a large-scale environment Skilled in stakeholder engagement, system strategy, and service delivery Sound knowledge of datasecurity, compliance, and IT service management (ITIL, etc.) Strong leadership capabilities - managing both internal teams and external suppliers Proficient in process automation and leveraging new technologies (e.g., AI More ❯
roll-out Collaborate with cross-functional teams to align systems with organisational strategy and improve business processes Identify opportunities for automation, efficiency, and improved user experience Ensure compliance with security policies and data protection standards Mentor and manage a specialist team, driving performance and continuous improvement Maintain system documentation, knowledge base and training materials Essential Skills & Experience: Strong … HCM) , including configuration and support Proven track record managing complex enterprise applications in a large-scale environment Skilled in stakeholder engagement, system strategy, and service delivery Sound knowledge of datasecurity, compliance, and IT service management (ITIL, etc.) Strong leadership capabilities - managing both internal teams and external suppliers Proficient in process automation and leveraging new technologies (e.g., AI More ❯
as well as excellent attention to detail and foresight Ability to determine implications and make recommendations based on a range of factors e.g. commercial, risk, customer experience - justified by data A flexible and adaptive approach to selecting and using the best tool(s) for different tasks and goals Desirable skills: Knowledge of programming languages like SQL and system integration … solutions Ability to design and maintain efficient customer support and feedback channels Ensuring optimal system functionality via integrated diagnostics and analytics Knowledge of datasecurity and encryption Knowledge of relevant licensing and industry compliance regulations inc GDP User Centred design and problem solving approach and methodologies (user journey experience desirable) Experience identifying Minimal Viable Product requirement for prioritisation More ❯
Data Pipeline Development: Design and implement end-to-end data pipelines in Azure Databricks, handling ingestion from various data sources, performing complex transformations, and publishing data to Azure Data Lake or other storage services. Write efficient and standardized Spark SQL and PySpark code for data transformations, ensuring data integrity and accuracy across the … pipeline. Automate pipeline orchestration using Databricks Workflows or integration with external tools (e.g., Apache Airflow, Azure Data Factory). Data Ingestion & Transformation: Build scalable data ingestion processes to handle structured, semi-structured, and unstructured data from various sources (APIs, databases, file systems). Implement data transformation logic using Spark, ensuring data is cleaned, transformed … and enriched according to business requirements. Leverage Databricks features such as Delta Lake to manage and track changes to data, enabling better versioning and performance for incremental data loads. Data Publishing & Integration: Publish clean, transformed data to Azure Data Lake or other cloud storage solutions for consumption by analytics and reporting tools. Define and document More ❯
Data Pipeline Development: Design and implement end-to-end data pipelines in Azure Databricks, handling ingestion from various data sources, performing complex transformations, and publishing data to Azure Data Lake or other storage services. Write efficient and standardized Spark SQL and PySpark code for data transformations, ensuring data integrity and accuracy across the … pipeline. Automate pipeline orchestration using Databricks Workflows or integration with external tools (e.g., Apache Airflow, Azure Data Factory). Data Ingestion & Transformation: Build scalable data ingestion processes to handle structured, semi-structured, and unstructured data from various sources (APIs, databases, file systems). Implement data transformation logic using Spark, ensuring data is cleaned, transformed … and enriched according to business requirements. Leverage Databricks features such as Delta Lake to manage and track changes to data, enabling better versioning and performance for incremental data loads. Data Publishing & Integration: Publish clean, transformed data to Azure Data Lake or other cloud storage solutions for consumption by analytics and reporting tools. Define and document More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Pontoon
A proven track record of delivering technical solutions in Agile environments with expertise in JIRA and Confluence. Proven Solution Architect Experience: Deep technical expertise in various solution architectures, especially data platforms and complex data pipelines on public cloud platforms, with a focus on GCP. Robust Application Design Skills: Experience in designing scalable, low-latency solutions that meet diverse … functional and non-functional requirements. Data Architecture Expertise: Proven experience in designing and delivering complex batch and streaming data pipelines, understanding orchestration, and database capabilities across multiple solutions. Problem-Solving Ability: A strategic and creative thinker who can tackle complex challenges and develop innovative, robust solutions. Collaboration & Communication Skills: Strong interpersonal skills that can influence and engage others … Jenkins, Spinnaker, or Harness. Desirable Skills: Trade Surveillance Knowledge: Familiarity with Market Abuse Regulation and associated monitoring/reporting mechanisms. Industry Standards: Experience with TOGAF or equivalent, and GCP Data Engineer/Cloud Architect certifications. Cyber & DataSecurity Understanding: An appreciation for the architectural implications of application design and implementation. Modern Data Capabilities: Knowledge of DataMore ❯
A proven track record of delivering technical solutions in Agile environments with expertise in JIRA and Confluence. Proven Solution Architect Experience: Deep technical expertise in various solution architectures, especially data platforms and complex data pipelines on public cloud platforms, with a focus on GCP. Robust Application Design Skills: Experience in designing scalable, low-latency solutions that meet diverse … functional and non-functional requirements. Data Architecture Expertise: Proven experience in designing and delivering complex batch and streaming data pipelines, understanding orchestration, and database capabilities across multiple solutions. Problem-Solving Ability: A strategic and creative thinker who can tackle complex challenges and develop innovative, robust solutions. Collaboration & Communication Skills: Strong interpersonal skills that can influence and engage others … Jenkins, Spinnaker, or Harness. Desirable Skills: Trade Surveillance Knowledge: Familiarity with Market Abuse Regulation and associated monitoring/reporting mechanisms. Industry Standards: Experience with TOGAF or equivalent, and GCP Data Engineer/Cloud Architect certifications. Cyber & DataSecurity Understanding: An appreciation for the architectural implications of application design and implementation. Modern Data Capabilities: Knowledge of DataMore ❯
agencies, ensuring their interests are effectively represented, especially considering value for money with third party IT providers. General IT Department Management Responsibility for systems development, maintenance network, infrastructure, cyber security, cloud, IT projects, IT support. To lead and manage the infrastructure and software development teams, supporting them in building and maintaining robust and innovative software solutions that are fit … Development or related discipline or equivalent. Experience of managing, directing and motivating staff to deliver projects with stretching scope and objectives. Desirable to have qualifications in ISO27001 or equivalent datasecurity certification. Reliable, flexible and cooperative. Diplomatic and tactful. Credible, confident and articulate, with excellent communication and presentation skills. Strategic thinker - able to see the big picture and … is best for the business. Strong understanding of multiple programming languages. Strong knowledge of the SDLC, code reviews and best practices. Strong knowledge of database management and design and data structures including PostgreSQL. Experience of managing and negotiating third party contracts. More ❯
agencies, ensuring their interests are effectively represented, especially considering value for money with third party IT providers. General IT Department Management Responsibility for systems development, maintenance network, infrastructure, cyber security, cloud, IT projects, IT support. To lead and manage the infrastructure and software development teams, supporting them in building and maintaining robust and innovative software solutions that are fit … Development or related discipline or equivalent. Experience of managing, directing and motivating staff to deliver projects with stretching scope and objectives. Desirable to have qualifications in ISO27001 or equivalent datasecurity certification. Reliable, flexible and cooperative. Diplomatic and tactful. Credible, confident and articulate, with excellent communication and presentation skills. Strategic thinker - able to see the big picture and … is best for the business. Strong understanding of multiple programming languages. Strong knowledge of the SDLC, code reviews and best practices. Strong knowledge of database management and design and data structures including PostgreSQL. Experience of managing and negotiating third party contracts. More ❯
Application Security Consultant - Cryptography, SC clearance £Market Rate - Inside IR35 London/Remote 6 months My client is an instantly recognisable consultancy who require an Application Security Consultant for a business-critical programme with a high-profile end client. Key Requirements: Proven commercial experience working as an Application Security Consultant within a large, complex organisation. Strong working … knowledge of Cryptography, Encryption and Data Security. Certificate and Key Management skills, including overseeing the entire lifecycle of Digital Certificates and Cryptographic Keys. Familiarity with Data Loss Prevention (DLP) and Cloud Access Security Broker (CASB). Previous experience using Hardware Security Module (HSM). Excellent communication skills. Eligibility for SC Clearance (5 years UK residency). More ❯
are seeking an experienced and proactive Information Governance (IG) Manager to join our team at Croydon Healthcare Services. This is a pivotal role, reporting directly to the Chief Information Security Officer (CISO), and leading on key areas of the Trust's Information Governance portfolio. You will be the Trust's subject matter expert on IG, providing strategic and operational … leadership, and ensuring compliance with relevant legislation and best practices. This includes managing requests under the Freedom of Information Act 2000, Environmental Information Regulations 2004, and advising on the Data Protection Act 2018. Key Responsibilities Act as the Trust's lead for Information Governance, offering expert advice and guidance across the organisation. Manage and respond to Freedom of Information … FOI) and Environmental Information Regulation (EIR) requests. Provide specialist support on data protection matters, including compliance with the Data Protection Act 2018. Serve as the primary point of contact for IG-related queries and complaints, ensuring timely and compliant responses. Oversee the day-to-day operations of the IG function, including direct line management of the Information Governance More ❯
are seeking an experienced and proactive Information Governance (IG) Manager to join our team at Croydon Healthcare Services. This is a pivotal role, reporting directly to the Chief Information Security Officer (CISO), and leading on key areas of the Trust's Information Governance portfolio.You will be the Trust's subject matter expert on IG, providing strategic and operational leadership … and ensuring compliance with relevant legislation and best practices. This includes managing requests under the Freedom of Information Act 2000, Environmental Information Regulations 2004, and advising on the Data Protection Act 2018. Key Responsibilities* Act as the Trust's lead for Information Governance, offering expert advice and guidance across the organisation.* Manage and respond to Freedom of Information (FOI … and Environmental Information Regulation (EIR) requests.* Provide specialist support on data protection matters, including compliance with the Data Protection Act 2018.* Serve as the primary point of contact for IG-related queries and complaints, ensuring timely and compliant responses.* Oversee the day-to-day operations of the IG function, including direct line management of the Information Governance Officer. More ❯
are seeking an experienced and proactive Information Governance (IG) Manager to join our team at Croydon Healthcare Services. This is a pivotal role, reporting directly to the Chief Information Security Officer (CISO), and leading on key areas of the Trust's Information Governance portfolio. You will be the Trust's subject matter expert on IG, providing strategic and operational … leadership, and ensuring compliance with relevant legislation and best practices. This includes managing requests under the Freedom of Information Act 2000, Environmental Information Regulations 2004, and advising on the Data Protection Act 2018. Key Responsibilities * Act as the Trust's lead for Information Governance, offering expert advice and guidance across the organisation. * Manage and respond to Freedom of Information … FOI) and Environmental Information Regulation (EIR) requests. * Provide specialist support on data protection matters, including compliance with the Data Protection Act 2018. * Serve as the primary point of contact for IG-related queries and complaints, ensuring timely and compliant responses. * Oversee the day-to-day operations of the IG function, including direct line management of the Information Governance More ❯
Exciting Opportunity ****** Our client is recruiting for an experienced Security First Line Manager to assess candidates coming to the end of their apprenticeships. Your experience would be needed to assess trainees who are at the end of their apprenticeshipto ensure their knowledge meets the requirements of the assessment. Your knowledge and experience will play a vital role in evaluating … trainees and reporting on their competencies. Standard specific essential criteria Competent in supervising people and activities in line with regulatory requirements Experience in security risk assessments and providing security advice to others Experience of business communications and datasecurity management within roles such as Ministry of Defence, Transport and Border Security and Private SecurityMore ❯