of a component handling team across a variety of platforms across core geographic locations globally. Management of Cryptographic infrastructure to include out-of-hours support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record … and customer experience/turnaround. Assist in the management of any control issues identified via audits or other control issues. Essential Skills/Basic Qualifications: Experience in Cryptography/InformationSecurity ITIL Foundation Batchelor Degree in Computer Science Strong stakeholder management, able to influence and negotiate at all levels Attention to detail and accuracy of work Experienced at … making informed decisions, against tight timescales Able to prioritise and manage multiple tasks concurrently Proficient in MS Office applications Desirable skills/Preferred Qualifications: Experience in IT Security roles Knowledge of cryptography Industry relevant Security qualifications. Industry relevant Project Management qualifications. Experience in an Operational environment Operational documentation creation and maintenance. Deep understanding of change disciplines including change More ❯
lifecycle. Ensure compliance of Audit Requirements by proactively educating team on Compliance Requirements and Integrating Compliance Requirements in SDLC. Represent team during Compliance Audits. All About You Degree in Information Systems, Information Technology, Computer Science or Engineering or equivalent experience preferred Proven experience delivering secure solutions across enterprise platforms required, preferably in the Financial Services sector Extensive understanding … the online application process or during the recruitment process, please contact and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes … with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or More ❯
lifecycle. Ensure compliance of Audit Requirements by proactively educating team on Compliance Requirements and Integrating Compliance Requirements in SDLC. Represent team during Compliance Audits. All About You Degree in Information Systems, Information Technology, Computer Science or Engineering or equivalent experience preferred Proven experience delivering secure solutions across enterprise platforms required, preferably in the Financial Services sector Extensive understanding … the online application process or during the recruitment process, please contact and identify the type of accommodation or assistance you are requesting. Do not include any medical or health information in this email. The Reasonable Accommodations team will respond to your email promptly. Corporate Security Responsibility All activities involving access to Mastercard assets, information, and networks comes … with an inherent risk to the organization and, therefore, it is expected that every person working for, or on behalf of, Mastercard is responsible for informationsecurity and must: Abide by Mastercard's security policies and practices; Ensure the confidentiality and integrity of the information being accessed; Report any suspected informationsecurity violation or More ❯
business and E.ON Digital Technology controlling functions, and supporting the MTP process of the Energy Markets (Digital Technology) function Acting as single point of contact for group wide architecture, informationsecurity and technology initiatives (e.g. CERT, EAM) Enabling the informationsecurity and data protection processes in E.ON Energy Markets Profile: Academic degree in Information Technology More ❯
effectively communicate updates, challenges, and solutions to team members, stakeholders, and management, along with preparing insightful management reports? If so, we'd love to hear from you! At Livestock Information Ltd, our mission is to be an outstanding service provider of livestock data, empowering government, industry, and farmers to effectively manage disease and infection control, whilst enhancing productivity and … identity and integration services. The successful candidate will lead a team that designs, implements, and manages DevOps practices and pipelines in Azure cloud environments with a strong focus on Security by Design principles and ensuring adherence to both the good industry and government security standards. In addition, you will guide Azure B2C identity management, API Management (APIM) of … platforms, and SQL systems. The team play a key role in designing and managing continuous integration/continuous deployment. By working with cross-functional teams including development, operations, security and third parties, you will enable efficient, automated, secure, and scalable software delivery, alongside providing both proactive and reactive maintenance, and out-of-hours support with the aim to optimise More ❯
of InformationSecurity you’ll own InformationSecurity strategy, polices and operations across the business to support our client’s strategic growth agenda. This includes infosec across IT projects, IT applications, data, information, IT infrastructure & suppliers. Key is the confidentiality, integrity, and availability of its information assets by managing risks, and ensuring compliance with … a sustainable world. The breadth of this means you’ll provide strategic leadership and guidance on InformationSecurity to a range of stakeholders, develop and evolve the InfoSec roadmap, while simultaneously engaging operationally such as managing cyber security incidents and educating the business on best practice in information and data security. In this complex company with … diverse technologies, you’ll lead CMMC compliance, maintain regulatory compliance with various international security frameworks (ISO27001, NIST), develop the small security team, and provide infosec expertise for technology projects such as improved data/business intelligence. By horizon scanning in InformationSecurity & cyber security, you’ll mitigate potential risks and evolve informationsecurityMore ❯
innovative and effective technology into the hands of over 200,000 users, from the boardroom to the front line. We lead on cutting-edge data science, automation, and cyber security at scale. Our mission goes beyond the battlefield by leading humanitarian efforts and driving digital innovation that impacts lives across the globe. Defence Digital forms part of Strategic Command … technical requirements into effective DevOps processes Build and manage complex technical stories independently Oversee live test environment management and maintenance Identify and resolve delivery-preventing issues proactively For more information on the Devops Engineer profession please see the Government Digital and Data Framework; Devops Engineer Person specification To be successful in the role of Senior Devops Engineer you will … bring experience of; Strong technical proficiency in designing, developing, and testing complex programs and systems, with a keen eye for identifying and resolving faults. A deep understanding of informationsecurity principles and the ability to embed security controls into solutions from the outset. Experience in process optimisation, including identifying inefficiencies and implementing improvements to enhance development workflows. More ❯
You will be joining the innovative InformationSecurity Cybertech Engineering team as a full stack software engineer in a global team responsible for developing web applications (Java/Angular), data engineering (Python) and solutions with third party products. You will be working in a collaborative and inclusive fast-paced environment that leverages agile approaches to deliver solutions quickly. … determine, and design the solution that is both robust and quick to market. The suite of applications developed and maintained by the team are used to enhance the firms informationsecurity threat detection, compliance, entitlement management architectures and audit assurance programs. You'll have the freedom to challenge the status quo, mentor fellow engineers, and contribute to our … quickly. Working directly with project leads, stakeholders, and engineers to understand the problem, determine, and design the solution that is both robust and quick to market. Enhancing the firms informationsecurity threat detection, compliance, entitlement management architectures, and audit assurance programs. Challenging the status quo, mentoring fellow engineers, and contributing to ongoing success while fostering personal and professional More ❯
At SERIS Security, we offer integrated surveillance and security where people and technology reinforce each other. Together, we provide high-quality support that meets the real needs of our customers. Our services include Security through professional on-site surveillance, Monitoring from our control rooms with 24/7 follow-up, and Technology with smart customised security solutions. At SERIS Academy , we train employees and ensure continuous development within the security sector. We also offer logistics support through our Logistics service. But we can't do that without our employees. Therefore, we are looking for people who want to build a safe future with us. SERIS Security is looking for a Quality Manager to … support its ambition for operational excellence, safety, compliance and continuous improvement. Reporting to the CEO, you will manage and optimize the Integrated Management System (IMS) across SERIS Academy, Logistics, Security, and Technology. Your mission As our Quality Manager , you ensure that our operations consistently meet the highest standards for quality, safety, environment, and informationsecurity . You More ❯
Rugby, Warwickshire, West Midlands, United Kingdom
Morgan Sindall Construction
Full time, permanent Are you ready to make a real impact in a growing, security-focused IT environment? At Morgan Sindall, were expanding our public sector and HMG project portfolioand were looking for someone who can help us deliver secure, compliant, and high-performing IT services. As our new IT Secure Projects Service Delivery Manager, youll be the vital … forward-thinking team. What Youll Be Doing - Supporting secure IT service delivery across high-profile public sector and HMG projects. - Collaborating with project teams, suppliers, and clients to embed security from the ground up. - Helping shape policies, assess risks, and respond to incidents with confidence. - Driving continuous improvement and knowledge sharing across the business. - Playing a key role in … service transitions and ensuring compliance with ISO 27001, NCSC guidance, and more. What Youll Bring - Experience in IT service delivery or security operationsespecially in secure or regulated environments. - A working knowledge of SFIA-aligned practices and frameworks. - Strong communication , coordination, and stakeholder management skills. - A proactive mindset and the ability to work both independently and as part of a More ❯
Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Via Umbrella Engagement Location: Gloucestershire (Hybrid 1-2 Days P/W - Can be flexible) We are seeking a highly motivated IAM SailPoint Analyst to join our InformationSecurity team. This role is crucial for administering, maintaining, and supporting our Identity and Access Management (IAM) systems and processes, ensuring users have the right access to the right resources … at the right time, thereby enhancing our security and compliance. Responsibilities: Hands-on experience with SailPoint IdentityIQ or IdentityNow is highly preferred, along with other enterprise IAM solutions (e.g., Okta, Microsoft Azure AD). Administer and manage IAM systems, including user provisioning, de-provisioning, access reviews, and RBAC. Perform daily operational tasks like processing access requests and troubleshooting issues. … Assist in developing and enforcing IAM policies and standards. Collaborate with IT and business units on IAM solutions. Participate in IAM projects (upgrades, integrations). Monitor IAM systems for security events and anomalies. Maintain comprehensive documentation of IAM configurations. Strong understanding of IAM concepts (authentication, authorization, provisioning, SSO, MFA, PAM). Familiarity with directories (Active Directory, LDAP). Knowledge More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Capgemini
to transform and manage their business by harnessing the power of technology. We are looking for an individual who is passionate about cybersecurity and has experience driving and delivering security services within organisations. We are looking for someone with strong interpersonal and communication skills; someone who can build and maintain effective working relationships with various people (Capgemini, clients, 3rd … . We hope to find someone who enjoys working collaboratively, who is open to sharing knowledge and helping others. We are looking for an individual who enjoys being a security advocate, coaching and mentoring members of the team and able to give general security training in and around security incident and access management. We know unicorns don … Conduct vulnerability analysis and create impact assessments including risk assessment of vulnerability reports and impact risks to service Collate conclusions and recommendations and Identify and communicate current and emerging informationsecurity threats Assess current technology architecture for vulnerabilities, weaknesses and for possible upgrades or improvement and notify requirements to address security deficiencies Report audit findings, including corrective More ❯
networking at all major NGC locations. Manage all NGC owned servers, switches, firewalls and routers. Maintain appropriate licenses and subscriptions for computer hardware and software. IT Governance Manage system security, performance monitoring and alerting, ensure appropriate backups are in place and retained for all systems. Ensure a disaster recovery arrangement is maintained, as required in collaboration with the compliance … team and operations are in place to ensure compliance during business continuity events. Work with Compliance Director in the development, adoption and enforcement of InformationSecurity policies, procedures and standards. Work with the Network and Security Architect to ensure appropriate security, patching, maintain secure Internet connectivity & private network connection to/from our partners, customers and … Linux Operating System. Experience with mid tier storage hardware & appliance is essential, more specifical experience with IBM Storage V37xx & V50xx series will be beneficial. Infrastructure applications, Networking, VMware, Firewall, Security and/or Enterprise-level SANs. Experience with Cloud Services & Provisioning (Experience of Oracle Cloud would be preferential) Ability to lead cross functional project teams in implementing projects of More ❯
always log a change in accordance with our change management process to fix a fault or satisfy a work request. Help the Service Desk and wider teams quickly identify security or a major incidents. Update the customer every 30 minutes. React to monitoring alerts as soon as they are raised and work with Service Desk colleagues to ensure the … automation to remove manual work/process. Conduct weekly ticket reviews and monthly Service reviews with the customer. Manage and Maintain all Licensing and certificates. Patching & Vulnerability Management. Consider InformationSecurity as part of the incident and security management process to ensure the confidentiality, integrity and availability of both internal and customer IT assets are maintained at … on customer satisfaction. Happy to travel to customer sites and be away from home as needed. Willing and able to work evenings and weekends when needed. Ability to obtain Security Clearance and Non-Police Personnel Vetting (NPPV3). Full UK driving license. What we offer A competitive salary £40-£45K. Opportunities for professional development and certification. Bring Your Own More ❯
student accomplishments and benefits to the community and state Identifying opportunities to connect college resources to student needs Required Qualifications An earned doctoral degree in computer science/engineering, information systems, or a related discipline. The candidate will need a minimum of seven to ten years full time experience and bring a substantial personal record in research and education. … Professor - this rank requires a doctoral degree in computer science, information systems, cybersecurity, computer engineering or related disciplines. At least five years at the rank of Associate Professor or comparable training, background, and experience are required. The candidate must have an active externally-funded research program and a strong record of competitive federal or state research funding. The candidate … the faculty ranks at Augusta University is only through the annual Promotion and Tenure process in which faculty may apply if eligible (typically five-year increments). For more information on ranks, please review the Augusta University Promotion and Tenure Website: College/Department Information Founded in 1828 and located in Augusta, Georgia, Augusta University is a public More ❯
documentation Assist with internal governance reviews and formal reporting Work with IT teams and third-party providers on GRC initiatives Requirements: 3–5+ years’ experience in IT GRC or InformationSecurity Knowledge of ISO 27001, NIST, and (ideally) DORA Strong analytical, communication, and stakeholder engagement skills Experience with IT infrastructure risk and control assessments This is a great More ❯
documentation Assist with internal governance reviews and formal reporting Work with IT teams and third-party providers on GRC initiatives Requirements: 3–5+ years’ experience in IT GRC or InformationSecurity Knowledge of ISO 27001, NIST, and (ideally) DORA Strong analytical, communication, and stakeholder engagement skills Experience with IT infrastructure risk and control assessments This is a great More ❯
accelerate change Curious - we turn knowledge into action Role Purpose We are looking for an experienced Systems Architect to make intuitive high-level decisions for software development, data architecture, security architecture and infrastructure architecture. You will need to see the "big picture" and create architectural approaches for software design, data flows, informationsecurity and cloud/on … an eye on generalised and repeatable patterns. Assist with solving complex technical problems when they arise through the methodical application of solution knowledge. Ensure software meets requirements of quality, security, extensibility, maintainability, and observability. Develop architecture roadmaps aligned with long term product roadmaps. About You A Bachelor's/Master's degree in computer science/engineering or related … least one of those technologies along with its tooling and ecosystem. Excellent knowledge of data architecture and experience working with enterprise data platforms. Excellent knowledge of infrastructure architecture and security such as networking, containers, storage, API gateways etc. with a special emphasis on AWS/Azure cloud infrastructure. Knowledge of software quality assurance principles, test automation tools, CI/ More ❯
resolve application issues following agreed procedures, using management software to monitor performance and carry out maintenance tasks. Apply ethical data transformation techniques in line with policies, being sensitive to information risks. Define and manage scoping, requirements, and prioritization for small-scale changes; assist with complex initiatives, ensuring standards are followed, requirements are well-documented, and traceability is maintained. Manage … Stakeholder and customer engagement experience. Ability to manage complex workloads and deliver performance. Awareness of GDPR, Data Protection, and Cyber Security. Please note: The post holder must maintain high informationsecurity standards and be vetted to Local Force Management Vetting (MV). If this sounds like you, apply now More ❯
vulnerabilities. • Ensure alignment with UK regulatory expectations where applicable. • Stay current on IAM trends, threats, and technologies; propose innovation where appropriate. Qualifications,Experience Bachelor’s degree in Computer Science, InformationSecurity, or related field (or equivalent experience). • 3+ years of experience in identity and access management, preferably in a regulated industry (e.g., financial services or banking). … Relevant certifications: CISSP, CISM, Azure Security Engineer, Certified Identity and Access Manager (CIAM), etc. • Experience implementing or optimizing IAM in hybrid cloud environments. • Strong understanding of IAM domains: identity lifecycle, authentication, authorization, privileged access management, and access reviews. • Hands-on experience with IAM platforms such as Azure AD, CyberArk, or similar. • Proven experience developing and improving IAM processes and More ❯
vulnerabilities. • Ensure alignment with UK regulatory expectations where applicable. • Stay current on IAM trends, threats, and technologies; propose innovation where appropriate. Qualifications,Experience Bachelor’s degree in Computer Science, InformationSecurity, or related field (or equivalent experience). • 3+ years of experience in identity and access management, preferably in a regulated industry (e.g., financial services or banking). … Relevant certifications: CISSP, CISM, Azure Security Engineer, Certified Identity and Access Manager (CIAM), etc. • Experience implementing or optimizing IAM in hybrid cloud environments. • Strong understanding of IAM domains: identity lifecycle, authentication, authorization, privileged access management, and access reviews. • Hands-on experience with IAM platforms such as Azure AD, CyberArk, or similar. • Proven experience developing and improving IAM processes and More ❯
successful candidate will ensure the organisation meets the regulatory requirements for effective governance for all Technology activities impacting the UK legal entities wherever it is performed globally including Chief Information Office and Chief InformationSecurity Office, Operational resilience and UK Third Party governance. The individual will report directly to the UK Technology Head and will represent Technology … manage a small team. Key Responsibilities: Define and maintain a holistic governance framework for activities conducted for Technology on UK legal vehicles which includes accountability for associated governance and information flows and appropriate linkage to and leverage of established policies. Challenge Management Information received, drive consistency thereof, and ensure transparent information is provided in associated review forums. … defined) monitoring the list of Technology certified persons to ensure appropriate details on how each individual fulfils their responsibility, including record of governance meetings in place and associated Management Information (MI). Responsible for the monthly SMCR Support meeting, driving the overall agenda and outcomes, ensuring this meets defined standards with matters escalated accordingly Work closely with the UK More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Axians Networks Limited
two days a week. KEY RESPONSIBILITIES: Team Leader within the Professional Services/Delivery domain. Support the Axians account teams on strategic accounts. Create strategies, roadmaps & designs. Provide network & security architecture, configuration and implementation. Provide technical presentations, product demonstrations, and proof … of concepts. Complete project, implementation & migration activities. Design & optimization of network routing policies & associated technologies. Ensuring own and Teams adherence to Axians' Management System Manual for Quality (ISO 9001), InfoSec (ISO 27001) and ESG (ISO 14001). ADDITIONAL RESPONSIBILITIES Respond to customer and partner enquiries including RFI's and RFP's. Provide delivery documentation; HLD, LLD & Migration Strategy. Support Axians … service provider & Alt-Net industry would be an advantage. • Team leader or management experience of technical teams: 3+ years. • Technical experience: 8+ years in SD-WAN, switching/routing & Security hands on experience. • Juniper JNCIS/JNCIP specialisation certifications. JNCIE desirable. • Previous Pre-Sales experience would be an advantage. • A deep understanding of networking, security, cloud and emerging More ❯
procedures, and compliance frameworks. Build and manage a cross-functional procurement team (including vendor and sourcing specialists). Vendor & Partnership Management Manage complex vendor relationships across hardware, software, cloud, security, and telecom. Oversee vendor compliance with SLA, SOC 2, and other applicable frameworks. Maintain partnership requirements (e.g., Microsoft, Dell, Cisco), including certifications and revenue thresholds. Procurement Operations Oversee all … procurement lifecycle activities: assessment, process, negotiation, order fulfillment, and contract lifecycle. Work closely with Sales, Service Delivery, Legal, Security, and Finance for procurement alignment. Build and improve CPQ and procurement automation workflows to increase speed and accuracy. Procurement as a Service ( PraaS) Co-lead the launch of PraaS for Atlas clients, including pricing, fulfillment, client service, and logistics. Create … quarterly business reviews with strategic vendors. Risk Management & Compliance Own procurement risk framework across vendor, delivery, regulatory, and reputational risk. Lead due diligence for new vendors in collaboration with InformationSecurity and Legal. Track and ensure contract compliance across the entire vendor portfolio. Requirements Must-Have 7-10+ years of experience in procurement leadership roles, ideally within More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Bowerford Associates
Prem, Big Data and Data Lake environments. Expert knowledge in data technologies, data transformation tools, data governance techniques. Strong analytical and problem-solving abilities. Good understanding of Quality and InformationSecurity principles. Effective communication, ability to explain technical concepts to a range of audiences. Able to provide coaching and training to less experienced members of the team. Essential … Languages such as Spark, Java, Python, PySpark, Scala or similar (minimum of 2). Extensive Big Data hands-on experience across coding/configuration/automation/monitoring/security is necessary. Significant AWS or Azure hands-on experience. ETL Tools such as Azure Data Fabric (ADF) and Databricks or similar ones. Data Lakes: Azure Data, Delta Lake, Data More ❯
Employment Type: Permanent
Salary: £75000 - £80000/annum Pension, Good Holiday, Healthcare