Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
HEAD OF INFORMATIONSECURITY OPERATIONS - CONTRACT - HYBRID -READING Contract Hybrid working - 2/3 days in office/week Location: Reading Duration: 6 -9 months We are recruiting for a Head of InformationSecurity Operations to ensure that the Confidentiality, integrity and availability of information … Anti-Virus/Identity Awareness/URL Filtering SIEM/Splunk Enterprise Desktop and Server Anti-Virus/Malware and endpoint protection technologies Vulnerability Security Scanning e.g. Nessus Microsoft Windows Server family of products. Operational experience of PCI DSS Citrix XenApp, remote access products LAN & WAN networking using Cisco … Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into a SOC in order to identify and alert on security incidents Understanding of security issues and ability to allocate work to appropriate resources and manage escalations effectively Understanding of vulnerability management and defence more »
month contract. The role will be fully on site in Reading so a local candidate will be most ideal. Responsibilities in the role; Identify informationsecurity and Threat Intelligence requirements and oversight of delivery by: Identifying business unit Priority Intelligence Requirements that enable the business unit to conduct … its business continuously in a secure manner. Analysis of information across Strategic, Operational and Tactical arenas into actionable intelligence that allows stakeholders to make informed decisions. Ensuring delivery of the Threat Intelligence programme within the business unit, delivery of services and products provided by Group Security. Where services are … of business unit. Engage with the business unit to: Develop an understanding of business goals in order to constructively engage senior business leaders on informationsecurity, identifying key threats and areas for improvement, driving appropriate risk management decisions and collaborating with partners to achieve positive outcomes and business more »
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
Tria Recruitment
InformationSecurity Consultant IAM/PAM £600 - £700 per day Inside IR35 6 month contract Remote with occasional travel to Portsmouth We have a brilliant opportunity to join an industry-leading utility company based in the Southeast. They are going through a period of growth, undergoing multiple digital … and tech transformations. They are investing heavily in Security and have embarked on a 5-year cyber security programme. As a UK Critical National Infrastructure provider, InformationSecurity is an integral part of their business operation, so this role is critical to the business. You will …/engineer role within a regulated organisation on a large scale Cyber Transformation. Worked with different business units - technical & non-technical stakeholders Broad Cyber Security experience across SOC, IAM, PAM and Network Security Specialist experience with IAM & PAM security Interviews will be expected to be on week more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
LEAD CYBER SECURITY CONSULTANT - READING - CONTRACT- HYBRID Lead Cyber Security Consultant Contract - 6 Months rolling- Inside IR35 Location: Reading - 2 days onsite/week must The role of Cyber Security Consultant sits within the Cyber Security team which is responsible for providing subject matter expertise and … in a reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common informationsecurity management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP … and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/design more »
AWS Security Engineer - Remote (Outside IR35) Day Rate : £275-295 Contract Length : 6+ months Location : Remote About the role: As a Cloud Security Engineer you will be responsible for designing, implementing, and managing security measures to safeguard computer systems, networks, and data. Conducts regular system tests and … monitors network security continuously. Develops and implements security standards and procedures aligned with industry best practices. Collaborates with IT and development teams to integrate security practices into AWS-hosted and .NET or any other application security life cycles. Also performs vulnerability testing, investigates security breaches … installs security measures, documents breaches, and works to maintain a high-security standard by fixing detected vulnerabilities and staying updated on security technologies. Required Skills: Must be AWS security certified or relevant certifications (e.g., CISSP, CISM, CISA) Bachelor's degree in Computer Science, InformationSecuritymore »
IAM Security & PAM InformationSecurity & Assurnace Consultant c£650- £700/day Inside IR35 6 month + contract Remote with occasional travel to Portsmouth We have a brilliant opportunity to join an industry-leading utility company based in the Southeast. They are going through a period of … growth, undergoing multiple digital and tech transformations. They are investing heavily in Security and have embarked on a 5-year cyber security programme. As a UK Critical National Infrastructure provider, InformationSecurity is an integral part of their business operation, so this role is critical to … specialist skills and experience in Privilege Access Management (PAM) and Identity & Access Management (IAM) to work on a Microsoft & Identity Programme of work. This Security Consultant will have the following previous experience: Worked in an advisory/consultant/engineer role within a regulated organisation on a large scale more »
DV Cleared Onsite in Hereford Duration: 6 Months initially Market Rates via Umbrella Role Description: Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will … big data technologies and ecosystems (e.g., NiFi). * Knowledge of current market and emerging leaders in data analytical and SIEM platforms. * Knowledge of network security implementations (e.g., host-based IDS, IPS), including their function and placement in a network. * Knowledge of intrusion detection systems and signature development. * Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. * Knowledge of cyber defence and informationsecurity policies, procedures and regulations. * Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: * Previous experience more »
Job Title: Application Security Architect Day Rate: Excellent Day Rate (Inside IR35) Contract Length: 6 months Initial (expected to extend multiple times) Hybrid Model: 3 days per week in office, 2 days remote Office Location: Central London Industry/Sector: Financial Services About the Role: My client, a highly … prestigious, globally renowned name in financial services is seeking a vastly experienced Application Security Architect to join the in-house security team on an initial 6-month basis. The Application Security Architect will be responsible for translating the group-wide information and cyber security strategy … and requirement into secure-by-design Application architecture throughout the organisation. Key Responsibilities: Develop reference patterns for security architecture Design effective application security solutions aligned to the InformationSecurity and business strategy. Act as Subject Matter Expert for Application threat modelling, secure coding practices in Java more »
experience with cloud services and their WAF controls, ideally including one or more of the following: AWS, Azure, and GCP understanding of Web Application security attack methods and mitigations in WAF tuning and configuration, coupled with a strong foundation in web security principles and practices. custom WAF rules … and features, addressing gaps and enhancing overall security measures to design and implement bespoke WAF processes and documentation, underpinned by a thorough understanding of web application security. skills to review and align platforms with MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities and limitations. DevSecOps pipeline … maintenance support for the automation works with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. of HTTPS inspection, including Termination and Certificate management, grounded in robust web security practices. in rate limiting techniques and their integration into security configurations of more »
Sheffield, South Yorkshire, United Kingdom Hybrid / WFH Options
Experis
with cloud services and their WAF controls, ideally including one or more of the following: AWS, Azure, and GCP * Strong understanding of Web Application security attack methods and mitigations * Proficiency in WAF tuning and configuration, coupled with a strong foundation in web security principles and practices. * Develop custom … WAF rules and features, addressing gaps and enhancing overall security measures * Capability to design and implement bespoke WAF processes and documentation, underpinned by a thorough understanding of web application security. * Analytical skills to review and align platforms with MVP and Baseline Configurations, leveraging a deep knowledge of WAF functionalities … Providing DevSecOps pipeline maintenance support for the automation works * Familiarity with IDAM protocols and access control measures for WAF management, informed by strong web security knowledge. * Understanding of HTTPS inspection, including Termination and Certificate management, grounded in robust web security practices. * Experience in rate limiting techniques and their more »
Job Title: Security Architect (Cryptography Specialist) - 6-Month Contract, Inside IR35 Location: Remote, occasional travel to London Company Overview: Join a leading financial services company that prides itself on its commitment to secure and innovative financial solutions. Our clients dynamic team is looking for a skilled Security Architect … with specialized expertise in Cryptography to help us enhance our security measures and protect our systems and data against sophisticated threats. Contract Duration: 6 months Role Summary: As a Security Architect focused on Cryptography, you will play a crucial role in designing and implementing security architectures that … protect our company's assets. You will have a deep understanding of cryptographic solutions, specifically Thales Hardware Security Modules (HSMs) and Enterprise Detection and Response (EDR) systems like Darktrace and Stealthwatch. Your expertise will ensure the confidentiality, integrity, and availability of our financial data and services. Key Responsibilities: Design more »
in SOC environments, SIEM & Incident Management, Vulnerability Management, and Endpoints or Threat Analysis. Key Responsibilities: - Conduct thorough Cyber Analysis to identify and respond to security incidents. - Monitor and manage Security Operations Center (SOC) environments to ensure the integrity and security of our systems. - Utilize SIEM tools for … real-time event correlation and incident detection. - Effectively handle Incident Management, responding promptly to security alerts and breaches. - Implement and oversee Vulnerability Management processes to identify and mitigate potential security risks. - Conduct analysis of endpoints and threats to enhance overall security posture. Qualifications: - Proven experience in Cyber … Analysis and Security Operations. - Proficiency in working with SOC environments and utilizing SIEM tools. - Strong knowledge of Incident Management processes and procedures. - Experience in Vulnerability Management to address potential security vulnerabilities. - Expertise in Endpoints or Threat Analysis to enhance threat detection and response. Requirements: - Bachelor's degree in more »
Job Title: Cyber Security Programme Manager Location : London (Hybrid) Contract: End of year (Possibility of extension) Start Date: ASAP Client Description: Our client has chosen to do something incredible. There are totally transforming their business and building our future on smoke-free products with the power to improve the … lives of a billion smokers worldwide. Job Description: We are seeking a highly skilled Cyber Security Programme Manager to join our team. The ideal candidate will be responsible for overseeing and managing various aspects of our cybersecurity initiatives, with a focus on program management, stakeholder engagement, and ensuring alignment … identified during UAT, ensuring timely resolution. Business Requirements Documentation: Collaborate with stakeholders to document business requirements. Work closely with metric owners, data owners, and informationsecurity domain Subject Matter Experts (SMEs) to define and validate required metrics for cybersecurity initiatives. Data Integration Support: Support the delivery of data more »
Lead Security Engineer - £600 (Outside Ir35) - 2 days a week in London We are currently recruiting on behalf of an IT Change and Transformation Consultancy who are looking for a lead Network Security Engineer. They're currently supporting a client who are going through a transformation standardising on … week. We are looking for someone to provide technical leadership and at times be hands on as required. Key Skills: A good understanding of informationsecurity vulnerabilities, risks and threats. Experience with Fortinet networking equipment especially firewalls Previous experience working with auditors (internal and external) to obtain key more »
Powershell. Microsoft Office Applications and Office 365. Familiar with Microsoft Active Directory user account management. An understanding of NTFS Permissions. Both local and GPO Security Policies. User Hardware Board level support and configuration including desktops and laptops. PC Peripherals such as Printer configuration and support. Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLANs. A working understanding of DHCP and DNS. Awareness of InformationSecurity best practices. Conceptual understanding of AntiVirus, URL Filtering and spam identification. Business Audio and Visual Solutions such as projectors and conference systems. Backup Methodologies and practices. Understanding of more »
Powershell. •Microsoft Office Applications and Office 365. •Familiar with Microsoft Active Directory user account management. •An understanding of NTFS Permissions. •Both local and GPO Security Policies. •User Hardware – Board level support and configuration including desktops and laptops. •PC Peripherals such as Printer configuration and support. •Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLAN’s. •A working understanding of DHCP and DNS. •Awareness of InformationSecurity best practices. •Conceptual understanding of AntiVirus, URL Filtering and spam identification. •Business Audio and Visual Solutions such as projectors and conference systems. •Backup Methodologies and practices. •Understanding more »
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
Local Pensions Partnership
of data - Respond to member queries promptly both written and oral ensuring that service level targets and deadlines are met in this area - Treat informationsecurity with the upmost respect, dealing appropriately with sensitive and confidential information within Service protocol/guidelines - Communicate positively and participate in more »
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Handepay
manner, ensuring all necessary tasks are completed for each process eg starters, leavers, reward/benefits, payroll input, absence, holidays etc. Submission of personal information and payment uploads within agreed timescales. Complete monthly third party payment requests via Finance as required Provide a HR Administration service that manages the … management hierarchy within the Sage HR system ensuring all processes are executed within a timely manner, allowing for the production of monthly MI to informationsecurity, IT and Finance. Support the wider HR team with producing accurate and timely data inputs for all processes including performance management, pay … and compensation Maintain employee payroll records so that information is accurate and secure. Data managed may include personal information; job history; retirement and insurance documentation; leave accrual records; and details of illness, absences, transfers, and salary progression Assist with annual gender pay gap report. About you: You have more »
Milton Keynes, Buckinghamshire, South East, United Kingdom
Compliance Group Limited
to employees on data protection best practices and ensure ongoing compliance with regulatory requirements Experience required: Prior experience in data protection, privacy law, or informationsecurity is essential for this role Demonstrated expertise in conducting DPIAs, developing DPAs, and maintaining a risk register is highly desirable Strong analytical … providing unparalleled safety and regulatory compliance services. With a focus on data protection, we partner with clients across industries to mitigate risks, safeguard sensitive information, and ensure compliance with data protection regulations. Join us in our mission to protect data and uphold privacy rights for individuals and organisations alike. more »
RM17, Grays, Borough of Thurrock, Essex, United Kingdom Hybrid / WFH Options
Kane Recruitment
Corporate accountabilities: To work with colleagues to achieve service plan objectives and targets To comply with data protection legislation and the council's InformationSecurity Policy, including supporting policies To be willing and able to work in a flexible and agile way with regard both to hours of more »