who they are, what they do, how they work, with the resources they have. The result is a government workforce that is exponentially more creative and productive. For more information, visit . Empower AI is proud to be recognized as a 2024 Military Friendly Employer by Viqtory, the publisher of G.I. Jobs. This designation reflects the company's commitment … to hiring and supporting active-duty and veteran employees. Responsibilities Empower AI: As a CAC/PKI Local Registration Authority (LRA) InformationSecurity Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As … PKI daily operations equipment by location at all RA/LRA sites. Provide support for annual and semi-annual DoD Compliance Audits. Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS. Develop and maintain More ❯
POSITION: Information Systems Security Engineer LOCATION: Colorado Springs, CO REQUIRED SECURITY CLEARANCE: Active TS with SCI; willing to take CI polygraph POSITION TYPE/STANDARD WORK HOURS: Full time, 40 hours THE OPPORTUNITY: Upon award, BTAS will be filling potential openings for the Space Systems Command (SSC). SSC plays a critical role in advancing the United … and manage program Authority to Operate, Authority to Test, Authority to Connect, and Interim Authorities. Support cyber testing and assessment activities, documenting findings and corrective actions per the Federal InformationSecurity Management Act. Develop draft intelligence requirements and staffing packages. Advise on intelligence reports and translate program requirements into intelligence needs. Recommend courses of action to support mission … acquisition and intelligence community standards. MINIMUM QUALIFICATIONS: Experience analyzing and evaluating current events, and providing recommendations to the Unit leadership to help assure continuity of activities and processing of security requirements are effectively integrated through security architecture, design, development, and configuration Knowledgeable on organization and execution of contingency planning, testing, and validation for all aspects of informationMore ❯
who they are, what they do, how they work, with the resources they have. The result is a government workforce that is exponentially more creative and productive. For more information, visit . Empower AI is proud to be recognized as a 2024 Military Friendly Employer by Viqtory, the publisher of G.I. Jobs. This designation reflects the company's commitment … to hiring and supporting active-duty and veteran employees. Responsibilities Empower AI: As a CAC/PKI Registration Authority (RA) InformationSecurity Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a … PKI daily operations equipment by location at all RA/LRA sites. Provide support for annual and semi-annual DoD Compliance Audits. Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS. Develop and maintain More ❯
who they are, what they do, how they work, with the resources they have. The result is a government workforce that is exponentially more creative and productive. For more information, visit . Empower AI is proud to be recognized as a 2024 Military Friendly Employer by Viqtory, the publisher of G.I. Jobs. This designation reflects the company's commitment … to hiring and supporting active-duty and veteran employees. Responsibilities Empower AI: As a CAC/PKI Registration Authority (RA) InformationSecurity Specialist, you will provide services in support of the Army Network Enterprise Technology Command (NETCOM) on the Army Department of Defense Information Network (DoDIN-A) Cybersecurity and Network Operations Mission Support (ADCNOMS) contract. As a … PKI daily operations equipment by location at all RA/LRA sites. Provide support for annual and semi-annual DoD Compliance Audits. Support the Army CIO/G6 Cyber Security Directorate and the NETCOM G3/5 in addressing audit findings to include mitigation and correction of findings in accordance with DoD PKI CPS and RPS. Develop and maintain More ❯
ensuring the reliability, security, and scalability of IT systems supporting business applications, and implementing advanced technologies to enhance productivity and client service. They also work closely with the InfoSec team to protect sensitive legal information, provide technical support, and ensure compliance with industry regulations and standards. By maintaining robust and efficient IT infrastructure, the team enable the firm … inventory records and perform audit functions Provide technical support to localised IT Teams and assist with network-related inquiries Perform routine maintenance and upgrades on network equipment Respond to security incidents to ensure the integrity of the network Deploy and maintain virtual network infrastructure in cloud environments Administration of the server environment including DHCP, DNS, and virtualisation About you … world's digital future. We’re interested in the world, current issues, and emerging trends. We’re an outward looking, sector-focused firm, specialising in Automotive, Aviation & Aerospace, Defence & Security, Energy & Utilities, Financial Services, Life Sciences & Healthcare, Media, Entertainment & Sport, Retail & Consumer, and Technology & Communications. More ❯
Milton Keynes, Buckinghamshire, England, United Kingdom
1st Choice Rec
training and guidance to client teams Help clients improve their DDoS and WAAP readiness Stay up to date on the latest cyber threats and technologies Requirements: Essential: Experience in informationsecurity or networking Understanding of network protocols (e.g. TCP/IP, DNS) Strong communication and client-facing skills A proactive, problem-solving mindset Fluent in written and spoken … evenings/weekends for planned exercises (not a 24/7 role) Desirable: Degree or equivalent experience Previous consulting or technical client-facing experience Background in SOC, Pen Testing, InfoSec, or Systems Admin Knowledge of BGP, WAF, CDN, or cloud platforms (AWS, Azure, GCP) Basic scripting (e.g. Python, Bash) for automation or analysis Please note that at times due to More ❯
data and privacy, your expertise and guidance will be crucial to our global operation and help drive our global data and privacy strategy. Responsibilities: Collaborate with Engineering, Product, and InformationSecurity teams to implement data and AI regulations for EMEA Develop and execute a comprehensive compliance programs for the applicable regimes Work closely with the Product Legal, Regulatory … privacy issues related to technical platforms and products Extensive experience with GDPR, with a solid understanding of other relevant regimes in EMEA Experience collaborating with technical teams (Product, Engineering, InfoSec) on developing technical implementations of data and privacy regulations Familiarity with emerging AI regulations Experience providing data and privacy advice and support during responses to security incidents The ability More ❯
million passengers this year, we employ over 10,000 people. Its big-scale stuff and we're still growing. Team The role situated in a team of cyber security professionals and working closely with the wider business to ensure that the principles of Digital Safety are as engrained as Aircraft Safety. This means close alignment to Operational, Commercial along … with Regulatory and Audit functions. The role requires working closely with the Senior Digital Safety Risk Manager, the Head of Digital Safety Assurance and the Technical Security and Business Partner functions to support the Digital Safety vision . The Cyber Risk Assurance Analyst role involves using data and analytical skills to identify, measure, and track cyber security risks … within easyJet. This role requires collaboration with various business areas to gather the necessary information that enables the creation of informative risk reports, aiding decision making in the relevant forums supporting the Digital Safety Assurance team's objectives and assists in shedding light on key areas pertaining to our regulatory compliance and control maturity. Job Accountabilities Effectively leverage the More ❯
lead a high-performing and diverse team, ability to lead cross-functionally • Ability to manage through a crisis, leading a team to make tough decisions with imperfect/incomplete information • Excellent written and verbal English communication skills Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes with an inherent risk to the … organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or breach, and Complete all periodic mandatory … security trainings in accordance with Mastercard's guidelines. More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Morson Talent
are met and communications are handled effectively. Use Microsoft Excel extensively to analyse data, track KPIs, and support the production of performance reports. Ensure the safe handling of sensitive information in line with company policies. Support the review of Third-Party Security Assessments, where required. Skills and Experience - Essential: Advanced proficiency in Microsoft Excel - including pivot tables, formulas … written and verbal communication skills. Ability to multitask and prioritise in a fast-paced environment. Desirable: Experience using Power BI to visualise and communicate data insights. Awareness of international informationsecurity standards and frameworks (e.g. ISO27001, ISO27017, GDPR, Cyber Essentials Plus). Understanding of common security risks, threats, and mitigation approaches. Tenacity, attention to detail, and a More ❯
skills are essential to clearly explain technical concepts to non-technical staff. At the Senior grade, candidates should have a strong background working with sensitive data, understanding data governance, informationsecurity, and risk management, and be familiar with issues related to handling and disseminating sensitive data. We are especially interested in applicants with experience in areas such as … ISO27001 certification, InformationSecurity Management Systems (ISMS), Trusted Research Environments (TRE), Secure Data Environments (SDE), Data Safe Havens (DSH), the Five Safes model, healthcare data processing, NHS Data Security and Protection Toolkit, anonymising personal data, data protection, and ethics. More ❯
East London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
are invested into technological innovation and the adoption of new cutting edge practices. Our client is looking for a Cyber Defence Assistant Manager to play a vital role in information security. As a Cyber Defence Assistant Manager you will be in the frontier of unique and specialised government and commercial contracts that will allow you develop and grow your … will be contributing to proposals and pitches and will have an active role in client presentations As a Cyber Defence Assistant Manager you should; Possess a Bachelor degree in InformationSecurity, Computer Science, Engineering or any other similar degree Have at least 3 years' experience within the field Have SC clearance or the ability to go through SC … clearance Any SecOps related certification (including security vendor certificates) A understanding and demonstration of penetration testing and red-tanning (NCSC and CREST accredited schemes) Strong technical background in computing, networks and programming Excellent communication skills A genuine interest to work for multi-national clients in the security field. Further desirables, but not essentials for this role; A CISSP More ❯
UK CISO on company vulnerability management KPIs/KRIs Preparation of vulnerability management process and procedure documentation Provide consulting services to the vulnerability management team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients and business groups to … Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant experience Possess strong understanding of vulnerability management processes, procedures and principles Exposure to application security best practices such as secure coding, security testing techniques Expert knowledge of Security Policies and Standards Expert knowledge of InformationSecurity practices Knowledge of compliance … audit and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
UK CISO on company vulnerability management KPIs/KRIs Preparation of vulnerability management process and procedure documentation Provide consulting services to the vulnerability management team to assist in their security design to identify potential risks Review the security issues and recommend the appropriate controls to mitigate these risks Provide security awareness to clients and business groups to … Palo Alto Xpanse. Jira to manage project work, timelines and operational tickets. 5+years of relevant experience Possess strong understanding of vulnerability management processes, procedures and principles Exposure to application security best practices such as secure coding, security testing techniques Expert knowledge of Security Policies and Standards Expert knowledge of InformationSecurity practices Knowledge of compliance … audit and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting More ❯
Title and Summary Manager, Product Management The Services team and solutions fuel growth for partners globally by providing cutting edge services in the areas of Customer Acquisition and Engagement, Security Solutions, Business and Market Insights, and Open Banking. Focused on thinking big and scaling fast, our agile sales team is responsible for end-to-end solutions for a diverse … the online application process or during the recruitment process, please contact and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes … with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or More ❯
our Infrastructure team. The Senior Network Engineer is responsible for the IT infrastructure and networks within EMEA region and regional datacenters. The professional in this role ensure stability, integrity, security, continuity and efficient operation of the company corporate networks. This is achieved by designing, implementing, monitoring, maintaining, supporting, improving and optimizing related services. The Senior Network Engineer will apply … and global network and firewall and load balance solutions; Assess the effectiveness and efficiency of existing systems; develop and implement strategies for improving or further leveraging these systems; Implement security measures and follow relevant policies to protect the company from cyber threats. Conduct security assessments and vulnerability remediation; Participate in network automation with a goal to manage network … services and software for fulfilling business objectives and processes; Implement processes, policies, best practices and tools to provide stable, predictable and high-performance environment; Develop and maintain networking and security standards and documentation to ensure effective knowledge transfer and team collaboration; Give solicited and unsolicited advice within own area of responsibility; Work with executive team members, decision makers, and More ❯
support the ongoing operations and improvement of our DLP capabilities and be the first line of investigation and escalation for potential data policy violations. Reporting to the Head of InformationSecurity, you will work directly with IT, HR, compliance, and business stakeholders to investigate, document, and help resolve data protection issues. About the role Within this role, you … investigation. Conducting in-depth investigations of potential DLP policy breaches using available tools and logs. You will document findings and write clear, structured investigation reports for the Head of InformationSecurity Escalating high-risk incidents to the Group CISO or repeat offenses for further action or disciplinary review with HR. Supporting the management, tuning, and improvement of DLP … awareness efforts by identifying areas where training or guidance can help reduce accidental data breaches. About you The ideal candidate for this role will have prior experience in a security operations, DLP, or compliance-focused roles. Within this role, they would have gained: Experience using DLP technologies (e.g., Microsoft Purview, Symantec, Forcepoint, or similar). Familiarity with data classification More ❯
Simple, Do The Right Thing, Own It, and Aim For Greatness. About the Role To support our growth, we are looking for SOC Analysts to join our growing cyber security function. This role will be supporting our 24/7 operational capabilities (On-call rota, not shift based). As a member of the Starling SOC team, you will … Incident Triage, Response, and Investigations based on Alerts received from multiple sources which include: Cloud Infrastructure/Security. Endpoint Detection and Response. Perimeter detection tooling. Investigating and responding to security alerts raised by Users. Enhancing and creating analytic triggers to enhance alert efficacy. Continuous development of incident handling and readiness processes. Proactive threat hunting based on threat intelligence. Documentation … care more about aptitude and attitude than specific experience or qualifications. Below is an overview: 3+ years experience in an in-house SOC role and team Understanding of AWS Security Solutions (or other Public Cloud Solutions) Analysis and Incident Response experience with Cloud systems such as AWS or GCP Experience working and supporting analytics/SIEM platforms. Experience working More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
effectively communicate updates, challenges, and solutions to team members, stakeholders, and management, along with preparing insightful management reports? If so, we'd love to hear from you! At Livestock Information Ltd, our mission is to be an outstanding service provider of livestock data, empowering government, industry, and farmers to effectively manage disease and infection control, whilst enhancing productivity and … identity and integration services. The successful candidate will lead a team that designs, implements, and manages DevOps practices and pipelines in Azure cloud environments with a strong focus on Security by Design principles and ensuring adherence to both the good industry and government security standards. In addition, you will guide Azure B2C identity management, API Management (APIM) of … platforms, and SQL systems. The team play a key role in designing and managing continuous integration/continuous deployment. By working with cross-functional teams including development, operations, security and third parties, you will enable efficient, automated, secure, and scalable software delivery, alongside providing both proactive and reactive maintenance, and out-of-hours support with the aim to optimise More ❯
and endpoint security. Develop scripts (e.g., PowerShell, Python) to automate repetitive tasks and streamline IT processes. Identify areas for improvement and implement IT solutions that enhance efficiency and productivity. Security & Compliance: Enforce IT security policies and ensure compliance with global standards (e.g., MFA, password policies, endpoint protection). Assist with local implementation of security audits, risk assessments … wireless LAN deployment and optimisation, with CCNA or CCNP certification. Proficient in managing Active Directory, Exchange Online, SharePoint, and Teams to maintain enterprise collaboration platforms effectively. Understanding of endpoint security technologies (e.g., antivirus software, patch management, MFA deployment), familiar with informationsecurity standards like ISO 27001, and capable of implementing account password policies, data backup, and other … process. First of all, we use Greenhouse, a web-based hiring platform, to assist in our recruiting process. As part of that process Greenhouse will be processing the personal information you've shared in accordance with Nothing instructions. When you apply for a job posted by us, the information we collect/you provide is used to determine More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Via Umbrella Engagement Location: Gloucestershire (Hybrid 1-2 Days P/W - Can be flexible) We are seeking a highly motivated IAM SailPoint Analyst to join our InformationSecurity team. This role is crucial for administering, maintaining, and supporting our Identity and Access Management (IAM) systems and processes, ensuring users have the right access to the right resources … at the right time, thereby enhancing our security and compliance. Responsibilities: Hands-on experience with SailPoint IdentityIQ or IdentityNow is highly preferred, along with other enterprise IAM solutions (e.g., Okta, Microsoft Azure AD). Administer and manage IAM systems, including user provisioning, de-provisioning, access reviews, and RBAC. Perform daily operational tasks like processing access requests and troubleshooting issues. … Assist in developing and enforcing IAM policies and standards. Collaborate with IT and business units on IAM solutions. Participate in IAM projects (upgrades, integrations). Monitor IAM systems for security events and anomalies. Maintain comprehensive documentation of IAM configurations. Strong understanding of IAM concepts (authentication, authorization, provisioning, SSO, MFA, PAM). Familiarity with directories (Active Directory, LDAP). Knowledge More ❯
Jam Management Consultancy Limited T/A JAM RECRUITMENT
procedures, and processes are clear, performance-oriented, and fully documented. Lead the coordination and documentation of internal audits on key processes. Support training and awareness activities in line with InformationSecurity and Data Privacy standards. Collaborate with the People Team to ensure ongoing colleague training across quality, security, environmental and privacy standards. Continuous Improvement Support the CISO … communicator with strong written and verbal skills. A collaborative, organised and proactive approach with the ability to meet multiple deadlines. Creative problem solver with a genuine interest in data security and regulatory affairs. More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Ohio Society of CPAs
Job Description: Job Title Information Technology (IT) Auditor - Investment Banking Location Birmingham Corporate Title Assistant Vice President The Group Audit (GA) function takes a proactive, risk-based and independent approach to assist the Bank's business and infrastructure functions to identify key control weaknesses. You will be joining the global GA Investment Banking Application & Innovation Technology team reporting into … the Principal Audit Manager responsible for covering the Bank's Technology and InformationSecurity risks and controls across Investment Banking and the Bank's Innovation activities covering emerging technologies such as artificial intelligence, robotic process automation and cloud computing. What we'll offer you A healthy, engaged and well-supported workforce are better equipped to do their best … respective support areas. Contribute to departmental projects and initiatives Your skills and experience Experience in auditing or practical working experience in software development, application lifecycle, vendor management and cyber security including IT general and automated application controls Ability to multi-task assignments, prioritize workloads with minimal supervision and work well within teams, building strong relationships Strong analytical and communication More ❯
corporate_fare Google place London, UK Apply Bachelor's degree in Computer Science or a related technical field such as computer networking, informationsecurity or equivalent practical experience. 5 years of experience in security engineering, DevSecOps, or platform engineering roles. Experience with deployment and orchestration technologies (such as Docker, Kubernetes, Mesos, OpenStack, Puppet, Chef, Salt, Ansible, Jenkins … . Experience with Unix/Linux operating systems internals and administration, or networking and debugging/troubleshooting. United Kingdom Security Vetting Developed Vetting (DV) clearance. Preferred qualifications: Experience designing, building, and deploying cloud-based solution architectures. Ability to execute in a customer-focused environment and advocate for partners and customers in a cross-functional organization. Ability to work on … creating a culture of belonging, and providing an equal employment opportunity regardless of race, creed, color, religion, gender, sexual orientation, gender identity/expression, national origin, disability, age, genetic information, veteran status, marital status, pregnancy or related condition (including breastfeeding), expecting or parents-to-be, criminal histories consistent with legal requirements, or any other basis protected by law. See More ❯