City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
THE ROLE NextEnergy Group develops, builds, and operates large-scale solar Photovoltaic (PV) assets and battery storage projects across Europe. As our Security & InformationSecurity Architect, you will set the security vision and implement secure-by-design principles for every layer of the organization — from field-level Operational Technology networks and real-time trading engines right … through to corporate business systems. A critical dimension of the role will be tight collaboration with: Data Protection Officer (DPO): embedding privacy-by-design, supporting DPIAs and audits Network & Security Engineering team: turning architecture patterns into robust, monitored, and recoverable configurations in production External security advisors & key technology suppliers to align architectural controls with best practice guidance, managed … This is a strategic yet hands-on role that balances secure-by-design principles with practical delivery across cloud, on-prem, and SaaS estates. KEY RESPONSIBILITIES Set & evolve enterprise security architecture (reference models, standards, patterns) covering IT, OT and hybrid-cloud environments that collect, process and trade renewable-generation data Embed security & privacy requirements into solution designs, CI More ❯
FTSE 100 company that is building a people first culture and is based in one of the best cities to live in the UK? If so, read on. The InformationSecurity & Resilience Team at Unite Students are looking for an experienced, enthusiastic SecOps Engineer. We are supporting the business in all its objectives - from building new interfaces with … digital assets (and its people) but you ll get plenty of support and guidance, and your knowledge and experience will be invaluable to help shape the direction of our InfoSec capability. What You ll Be Doing Network Security: Design, implement, and manage secure network architectures. Monitor network traffic for suspicious activity and respond to security incidents. Conduct regular … network security assessments and audits to ensure compliance with security policies and standards. Vulnerability Analysis: Conduct regular vulnerability assessments and penetration testing to identify and mitigate security risks. Develop and implement strategies to address vulnerabilities. Track and report on the status of vulnerabilities and remediation efforts. Forensic Analysis: Perform forensic analysis of security incidents to determine More ❯
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
practices and the ability to conduct technical risk assessments. Work with the Global Technology Infrastructure team to integrate system cybersecurity assessments into their processes to ensure consistent implementation of security controls. Work with the Cybersecurity Architecture team and apply reference architectures for security solutions design and implementation. Work with the Cyber Defense group and the Security Operations … Center to evaluate the effectiveness of the security controls and architectures in relationship to actual intrusions seen on the Deloitte network, reported threats at peer organizations, and overall cybersecurity threats in the internet ecosystem and you will notify leadership of potential or existing threats and assist in the development of risk mitigating strategies of these items. Monitor security blogs, articles, and reports and remain current on related laws, regulations, and industry standards to keep up to date on the latest security risks, threats, and technology trends and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA More ❯
holder. Duties may be changed, after discussion, to suit the operational requirements of Olympus Tech. KNOWLEDGE, SKILLS AND EXPERIENCE Technical Educated to Degree Level, or equivalent, in Computer Science, Information Technology or related discipline. Proven experience in software support and technical/business/data analysis. Able to communicate effectively and clearly in writing and verbally, including drafting correspondence … PHP, etc). The ability to work with large datasets across multiple platforms with confidence. A systematic and analytical approach to problem solving with the ability to communicate technical information to both technical and non-technical audiences. Excellent skills with Microsoft Excel. Essential Self-motivated, with high energy and enthusiasm. Strict attention to detail. Highly intuitive and tech savvy. … data sets Experience with property management software MRI Qube, Yardi or similar. Experience with complex databases Experience in system support, monitoring & troubleshooting. Experience of working in environments with high informationsecurity standards to meet needs of ISO27001, SOC2 and GDPR etc Experience with AI and/or Machine Learning Project planning and management experience. Experience with finance systems More ❯
holder. Duties may be changed, after discussion, to suit the operational requirements of Olympus Tech. KNOWLEDGE, SKILLS AND EXPERIENCE Technical Educated to Degree Level, or equivalent, in Computer Science, Information Technology or related discipline. Proven experience in software support and technical/business/data analysis. Able to communicate effectively and clearly in writing and verbally, including drafting correspondence … PHP, etc). The ability to work with large datasets across multiple platforms with confidence. A systematic and analytical approach to problem solving with the ability to communicate technical information to both technical and non-technical audiences. Excellent skills with Microsoft Excel. Essential Self-motivated, with high energy and enthusiasm. Strict attention to detail. Highly intuitive and tech savvy. … data sets Experience with property management software MRI Qube, Yardi or similar. Experience with complex databases Experience in system support, monitoring & troubleshooting. Experience of working in environments with high informationsecurity standards to meet needs of ISO27001, SOC2 and GDPR etc Experience with AI and/or Machine Learning Project planning and management experience. Experience with finance systems More ❯
holder. Duties may be changed, after discussion, to suit the operational requirements of Olympus Tech. KNOWLEDGE, SKILLS AND EXPERIENCE Technical Educated to Degree Level, or equivalent, in Computer Science, Information Technology or related discipline. Proven experience in software support and technical/business/data analysis. Able to communicate effectively and clearly in writing and verbally, including drafting correspondence … PHP, etc). The ability to work with large datasets across multiple platforms with confidence. A systematic and analytical approach to problem solving with the ability to communicate technical information to both technical and non-technical audiences. Excellent skills with Microsoft Excel. Essential Self-motivated, with high energy and enthusiasm. Strict attention to detail. Highly intuitive and tech savvy. … data sets Experience with property management software MRI Qube, Yardi or similar. Experience with complex databases Experience in system support, monitoring & troubleshooting. Experience of working in environments with high informationsecurity standards to meet needs of ISO27001, SOC2 and GDPR etc Experience with AI and/or Machine Learning Project planning and management experience. Experience with finance systems More ❯
My client is hiring an InformationSecurity Lead to help shape and implement its cybersecurity operations, governance, and risk framework. Reporting to the IT Operations & Security Manager, this role is critical in maintaining the organisation's security posture, ensuring compliance, and supporting ongoing IT service resilience. Key Responsibilities Oversee third-party security tools and services … e.g. firewalls, IDS/IPS, endpoint protection) and monitor vendor SLA adherence. Conduct risk assessments, maintain the security risk register, and manage remediation activities. Lead incident response processes including detection, containment, investigation, and resolution. Develop, implement, and maintain informationsecurity policies, procedures, and standards. Ensure compliance with ISO 27001, NIS2, and other regulatory requirements; manage documentation and … audits. Coordinate change, risk, and incident management activities across IT security functions. Support secure design and delivery of IT projects and solutions. Manage internal security testing schedules and ensure timely execution and review. Deliver cybersecurity awareness initiatives, training sessions, and effectiveness reporting. Collaborate with vendors and contribute to security procurement and tendering processes. Monitor emerging threats and More ❯
Job Title: Cyber Security ManagerLocation:Wiltshire, United Kingdom (with some travel required)Salary:£62,000 - £73,000 (depending on experience) + Bonus + Excellent BenefitsClearance:Must be a British National and SC Cleared or EligibleAbout the Role:We are seeking a highly skilled and motivated Cyber Security Manager to lead and enhance our cyber security posture. This … security framework aligned with industry best practices.Key Responsibilities:* Lead and manage cyber security incidents, ensuring timely resolution and root cause analysis.* Oversee the implementation and maintenance of InfoSec and Cyber Security compliance and assurance programs.* Ensure alignment with ISO 27001, NIST, and other relevant security frameworks.* Collaborate with the Security Operations team to monitor, detect … CV will be treated in the strictest confidence and we would always speak to you before discussing your CV with any potential employer.Keywords:Cyber Security Manager, Incident Management, InfoSec, Cyber Assurance, ISO 27001, NIST, CISSP, CISM, GRC, Security Operations, SOC, Risk Management, Threat Landscape, Defence, Stakeholder Engagement, Security Frameworks, SC Clearance, British National, Cyber Compliance, SecurityMore ❯
Job Title: Cyber Security Manager Location: Wiltshire, United Kingdom (with some travel required) Salary: £62,000 - £73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible About the Role: We are seeking a highly skilled and motivated Cyber Security Manager to lead and enhance our cyber security … framework aligned with industry best practices. Key Responsibilities: * Lead and manage cyber security incidents, ensuring timely resolution and root cause analysis. * Oversee the implementation and maintenance of InfoSec and Cyber Security compliance and assurance programs. * Ensure alignment with ISO 27001, NIST, and other relevant security frameworks. * Collaborate with the Security Operations team to monitor, detect … will be treated in the strictest confidence and we would always speak to you before discussing your CV with any potential employer. Keywords: Cyber Security Manager, Incident Management, InfoSec, Cyber Assurance, ISO 27001, NIST, CISSP, CISM, GRC, Security Operations, SOC, Risk Management, Threat Landscape, Defence, Stakeholder Engagement, Security Frameworks, SC Clearance, British National, Cyber Compliance, SecurityMore ❯
LTS is seeking an experienced Senior Security Engineer to support the program with the Department of Commerce. This role involves identifying vulnerabilities, assessing risks, and ensuring the security and compliance of all technical assets across the department. The Senior Security Engineer will work closely with various stakeholders, both internal and external, to implement best practices for cybersecurity … serve a broad constituency of clients that range from cabinet-level departments of the U.S. Government to the largest Federal IT contractors in the world. LTS is a leading information technology (IT) provider for mission critical systems leveraging the latest technologies to deliver cutting edge solutions from small mobile applications to large, complex enterprise applications. Our professionals specialize in … governance across all applicable programs. Provide cybersecurity engineering subject matter expertise to client staff. Participate in technical review boards and program planning sessions, contributing to enterprise architecture decisions and security control implementation. Develop and deliver technical guidance via PowerPoint presentations, formal documentation, and written communications on cybersecurity capabilities, vulnerabilities, risks, and mitigation strategies. Engineer, configure, and sustain the Continuous More ❯
Information System Security Engineer Fairfax, VA or Greenwood Village, CO Job Description: Seeking an Information System Security Engineer (ISSE). The role of the ISSE is to bridge the gap between high level security policies/requirements and technical/operational implementation of those requirements. Candidates should have in-depth understanding of the cybersecurity policies … and procedures for Government (DoD, Intelligence Community) sectors information systems and sufficient technical knowledge and experience to implement them. The ISSE will work closely and effectively with the Information System Security Manager (ISSM) ISSM, and the Program Manger on all aspects of their development and implementation programs. Candidates should have in-depth understanding of the cybersecurity policies … positive attitude and good customer service skills in sometimes stressful situations, such as during outage troubleshooting and resolution. Required Skills: Information Assurance (IA) and InformationSecurity (InfoSec) experience working with Intelligence Community (IC) customers, which includes developing and reviewing security concept of operations, systems security plans, security control assessments, contingency plans, configuration management More ❯
Job Title: Cyber Security Lead Location: West Midlands, United Kingdom Salary: 62,000 - 73,000 (depending on experience) + Bonus + Excellent Benefits Clearance: Must be a British National and SC Cleared or Eligible About the Role: We are seeking a proactive and experienced Cyber Security Lead to drive and enhance our organisation's cyber security strategy. … This is a key leadership role responsible for managing security incidents, ensuring compliance with industry standards, and embedding cyber assurance across the business. You will work closely with the Security Operations Centre (SOC), senior stakeholders, and cross-functional teams to maintain a secure and resilient environment. Key Responsibilities: Lead the response to cyber security incidents, ensuring timely … resolution and root cause analysis. Oversee the development and implementation of informationsecurity compliance and assurance programmes. Ensure alignment with ISO 27001, NIST, and other relevant security frameworks. Collaborate with the SOC to monitor, detect, and respond to cyber threats. Manage governance, risk, and compliance (GRC) activities, including risk assessments and mitigation strategies. Promote a securityMore ❯
Freelancer Opportunity Description: Senior InformationSecurity Officer Are you passionate about AI or cybersecurity? You love working with high profile teams with a sure taste for challenge and variety? You dream to join a fast-growing company with start-up mentality? Eager to learn continuously? Join Proximus Ada! Within this Proximus' newly created centre of excellence for AI … and Cybersecurity, the mission of the Security Management and CSIRT teams is to protect Proximus, its customers, its business, its operations and reputation against external and internal threats. You will be fascinated by a highly dynamic environment, the strong collaboration and some deep technical aspects. Within the Security Management team, we are looking for a Senior InformationSecurity Officer to reinforce the team. Your Role: Provide CISO-as-a-Service (CISOaaS) to entities of the Proximus Group to assist with the overall reinforcement of their security posture. Help them in maintaining their ISO27001 certification or in preparing for an ISO 27001 certification and achieving NIS2 compliance. Perform cybersecurity assessments (NIS2, ISO27001, security maturity More ❯
Northampton, Northamptonshire, United Kingdom Hybrid / WFH Options
Schools Choice
Job Title: Cyber Security Manager Location: Flexible Hybrid Working - Around 2 days in the office at NNC Rate of Pay: £400 per day Umbrella OR £ PAYE £311.12 per day PAYE Working Hours: Full time - 37 hours per week Type: Temporary role - Inside IR35 - Up to 9 months Opus People Solutions are working with North Northamptonshire Council to recruit for … a Cyber Security Manager. Purpose of the job North Northamptonshire Council is going through a period of large-scale strategy and transformation to bring together our estates as well as create world leading services for our citizens. We have an ambition to create brilliant and modernised services; to use modern platforms and infrastructure; and to make the best out … of our investments in our technology and teams. This is a vital role in that journey, responsible for ensuring that we design and implement security right from the beginning of our journey, mitigating and managing technical risks to data and the organisation. This role is responsible to the Chief Information Officer of North Northants Council for: Providing expert More ❯
Data and Security Compliance Manager - Fixed Term Location: Bristol HR Director, Victoria James • 03 February 2025 We are looking for an experienced Data and Security Compliance Manager to lead and maintain our compliance with ISO 9001, IS0 14001, ISO 27001, Cyber Essentials Plus, MOD-level SAQs, FSQS and GDPR regulations. The role is crucial in ensuring our agency … adheres to best practices and legislation in data protection, informationsecurity, quality management, environmental compliance and industry-specific security standards. The ideal candidate will have experience in compliance management, risk assessment, audits, security frameworks and policy implementation. They will need to work across teams such as IT, Operations, Finance, Delivery and Engineering to ensure robust governance … the conduit between contracts and project teams to ensure we are meeting our commitments Supplier/vendor management including vendor specific assessments and flow down policy control and compliance Informationsecurity and Cyber Essentials Plus Oversee Cyber Essentials Plus compliance ensuring security controls are in place Work closely with the IT team to assess vulnerabilities, manage risk More ❯
are looking for: At Keurig Dr Pepper, we are committed to delivering safe, secure, and resilient technology solutions that support our business and protect our customers. As an Associate Security Analyst , you will be a key member of our Cybersecurity team, responsible for monitoring, analyzing, and responding to security threats across our enterprise. This role is ideal for … against cyber threats. You'll work alongside a collaborative team to ensure the confidentiality, integrity, and availability of our systems and data. What you will do: As the Associate Security Analyst, you will Monitor security alerts and events using SIEM and other security tools to detect and respond to potential threats. Help maintain and improve security documentation, including incident reports and standard operating procedures. Support vulnerability management efforts by reviewing scan results and tracking remediation. Assist in the development and maintenance of security policies, procedures, and documentation. Participate in threat research and stay informed about current cybersecurity trends and risks. Collaborate with IT and business teams to support the implementation of security best More ❯
We are seeking a dedicated and experienced professional with a strong foundation in cybersecurity, a comprehensive understanding of current threats and vulnerabilities, and the ability to implement cutting-edge security measures. In this role, you will contribute to the development, deployment, and maintenance of cybersecurity infrastructure while staying current with evolving trends in the field. Responsibilities Design, implement, and … manage advanced security solutions, including firewalls, intrusion detection/prevention systems, endpoint protection, and encryption mechanisms to safeguard networks and systems. Conduct routine security assessments to identify and address vulnerabilities and weaknesses across networks, applications, and systems. Develop and execute incident response plans to handle and mitigate security breaches effectively. Collaborate with teams across IT, development, and … compliance to establish and enforce robust security policies and procedures. Monitor network activity, system logs, and security alerts to detect and respond to potential threats promptly. Investigate and analyze security anomalies and breaches, taking appropriate steps to minimize risks. Integrate security best practices into all stages of the development lifecycle, ensuring comprehensive protection for organizational assets. More ❯
Job Title: Senior Cyber Security Architect Reporting to: Cyber & Technical Advisory Salary: £60,000-£80,000 Job Type: Permanent, full time Location: Home based (This role will require regular UK travel and at times need you to stay away from home) Since our establishment in 1990, Methods has partnered with a range of central government departments and agencies to … software houses - we have a customer-centric value system whereby we focus on delivering what is right for our clients. Methods are experts in delivering secure, resilient cyber and information services - keeping systems and data safe. We help reduce risk and vulnerabilities from cyber-attacks by developing a security road-map tailored to your unique needs. We help … such as threat management by building an identity management programme, and establishing prevention, detection and response capabilities to cyber-attacks. Responsibilities: Ability to research, articulate, pitch complex and innovative security advice, at both business and technical levels, for new or existing problems, with the objective to justify and communicate decisions directly to key customer stakeholders including senior management. Able More ❯
are offered a position that requires a background check you will be provided additional documentation to complete once an offer has been extended. Job Details: As the Lead Cyber Security Engineer - Privacy, you will spearhead the development, implementation, and maintenance of privacy policies and practices to ensure that our organization's data handling and processing activities comply with global … advice on privacy-related projects and initiatives. Stay updated on emerging trends, technologies, and regulatory changes concerning privacy and data protection. Basic Qualifications: Bachelor's degree in computer science, Information Technology, Cybersecurity, Privacy, Accounting, Law, or a related field. At least 5-7 years of experience in privacy engineering or data protection roles within an enterprise environment. Proven experience … ability to build and maintain relationships with senior stakeholders. Privacy certifications required (e.g., IAPP). Knowledge of ethical business practices and frameworks. Advanced or specialized certifications such as Certified Information Systems Security Professional (CISSP), Certified InformationSecurity Manager (CISM), or similar. Experience with automation and scripting for privacy management processes. Ability to design and implement comprehensive More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
AVEVA Denmark
Join to apply for the Lead Security Architect role at AVEVA 1 day ago Be among the first 25 applicants Join to apply for the Lead Security Architect role at AVEVA Get AI-powered advice on this job and more exclusive features. AVEVA is creating software trusted by over 90% of leading industrial companies. Job Title: Lead Security Architect Location: London - Hybrid (3 days per week) Employment Type: Full-time, permanent The job In the AVEVA Group's Security function, the Director of Security Architecture leads on second line technical assurance to support the function's Governance Risk and Compliance team in our three lines of defence model. The Lead Security Architect will be … responsible for managing a team of security architects within this technical assurance team. They will be also be responsible for driving continuous improvement in the technical security assessment of the lifecycles of product and projects. They will work with GRC to develop the technical assurance and risk management processes. Key Responsibilities Work with the Director of SecurityMore ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
build on this momentum, advancing the National Energy System Operator's (NESO) plan for zero carbon operability of the electricity system by 2025. We are seeking an experienced Senior Security Architect to work across all programme workstreams, reporting to the Enterprise Security Architect. This role involves designing secure solutions fit for the future, ensuring NESO's long-term … success. The Senior Security Architect will not only be hands-on when designing architectures, reviewing proposals, designs, and preparing documentation but will also support the Enterprise Security Architect by ensuring that the overall security strategy and policies are considered throughout the design and build process. The Senior Security Architect will play a crucial role in promoting … collaboration among various teams, eliminating siloed workflows, and integrating secure design principles along with other critical security protocols across different stages of the delivery lifecycle. In this role, you will regularly attend the Security Architecture Group meetings, contributing to the development of essential architecture strategies and patterns for NESO. Building and managing relationships with the business is key More ❯
underpin everything that we do at CLS and define and shape a supportive and inclusive working environment in which everyone is encouraged to be open and forward-thinking Job information: Functional title - Enterprise Security Architect Department - IT Security Corporate level - Director Report to - Enterprise Security Architecture Manager Location - London, onsite 2 days per week Job purpose … We are seeking a highly skilled and strategic Enterprise Security Architect reporting to the Enterprise Security Architecture Manager, to lead the design, implementation, and continuous improvement of Security Architecture across the enterprise. In this role, you will collaborate with senior leadership, key stakeholders, and cross-functional teams to define and align security strategies with business objectives … ensuring security alignment to business objectives, evolving threat landscapes, and industry standards across the enterprise to mitigate risks and address emerging threats. The Enterprise Security Architect will play a pivotal role in developing and enforcing the enterprise security architecture strategy and roadmap, developing patterns and conducting capability gap assessments whilst maintaining integration into the company's business More ❯