to delivering outstanding service and creating memorable vacations for all our guests. We are currently seeking a motivated individual to join us as an InformationAssurance and Data Governance Specialist Position: InformationAssurance and Data Governance Specialist (Manager level) Location: Office based, Bexhill-on-Sea Type … Full-time, 5 days, Temp-Perm (1 year FTC) Role Summary: As the Information and Data Governance Specialist, you will lead data governance, data management, records management and records retention activities. This role involves cataloguing data, developing quality metrics, supporting business teams to establish and implement retention rules, and … data flows between systems, with the aim of ensuring access to, and visibility of, data are appropriately permissioned across the business. Monitor and review information security practices internally and within our supply chain to mitigate risks and enhance data protection. Requirements: Bachelor's degree in Information Security, Informationmore »
Stevenage, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Omega Resource Group
the MBDA UK Procurement Department in the implementation of the Supply Chain Cyber Security Policy Qualifications & Requirements Knowledge and understanding of MOD and Government information security policy, standards, and guidance. Experience in information security Risk Assessments, Risk Treatment Plans, and Risk Management and Accreditation Documents. Proven knowledge of … supply chain cyber security challenges, Cyber Essentials, DefCon 658, Def Stan 05-138, and Def Stan 05-139. (preferred) Informationassurance experience across the Systems Engineering Development Lifecycle (preferred). Effective written and verbal communication skills, with the ability to adapt depending on the audience. Ability to … discern key technical, commercial, and program influences from available information. Systems thinking and an understanding of systems engineering For more information on this role, please contact Angelika Zaucha by sending a copy of your CV to For details of other opportunities available within your chosen field please visit our more »
Architecture Manager, Cyber Security Operations Manager, Cyber Security Governance, Risk and Compliance Manager, and Cyber Security Portfolio Manager. They will also support the wider Information Systems team, IT Service Providers and partners to implement and optimise cyber security technical assurance capabilities across four main services; Technical Security Compliance … Product Security Assurance, Vulnerability Management (VM), and Disaster Recovery and Business Continuity. Key responsibilities: Define and deliver the cyber security technical assurance strategy, setting out clear policies and technical standards, modelling best practices and measuring success against defined measurement metrics (KPIs). Manage the cyber security technical assurance … ensure the quality and timeliness of services and deliverables to meet our requirements, reviewing performance, driving improvements, optimisation and automation of the cyber security assurance capabilities across a variety of technologies and platforms. Ensure the IT estate is compliant with The Client's policies and technical standards to protect more »
Qualifications: Minimum 5 years+ experience leading a Cyber Security Assurance function or similar such as Cyber Security Integration function, Cyber Security Engineering function with some experience in assurance testing techniques and methodologies. Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, related field or equivalent training and …/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global InformationAssurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track record leading more »
people in it. There will be a huge amount of autonomy to make important decisions. Key responsibilities: Develop and implement the cybersecurity assurance strategy, establishing clear policies and technical standards. Model best practices and track success using defined KPIs. Lead the cybersecurity technical assurance team, ensuring high-quality … and timely services and deliverables. Continuously review performance, drive improvements, and optimise and automate cybersecurity assurance capabilities across various technologies and platforms. Ensure the IT infrastructure adheres to policies and technical standards, safeguarding company assets by driving remediation actions and countermeasures to address identified weaknesses and vulnerabilities. Set up … and enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT more »
people in it. There will be a huge amount of autonomy to make important decisions. Key responsibilities: Develop and implement the cybersecurity assurance strategy, establishing clear policies and technical standards. Model best practices and track success using defined KPIs. Lead the cybersecurity technical assurance team, ensuring high-quality … and timely services and deliverables. Continuously review performance, drive improvements, and optimise and automate cybersecurity assurance capabilities across various technologies and platforms. Ensure the IT infrastructure adheres to policies and technical standards, safeguarding company assets by driving remediation actions and countermeasures to address identified weaknesses and vulnerabilities. Set up … and enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT more »
Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … discipline, and/or evidence of further professional study. Registered NCSC certified professional at senior level or above, or NCSC recognised qualification, e.g. ISC2Certified Information System Security Professional. Knowledge of UK/NATO InformationAssurance standards, procedures & systems, including Government Functional Standard GovS 007: Security, HMG IS1 more »
Stevenage, Hertfordshire, South East, United Kingdom
Omega Resource Group
UK Procurement Department in the implementation of the Supply Chain Cyber Security Policy. Qualifications & Requirements – Systems Engineer Knowledge and understanding of MOD and Government information security policy, standards, and guidance. Experience in information security Risk Assessments, Risk Treatment Plans, and Risk Management and Accreditation Documents. Proven knowledge of … supply chain cyber security challenges Informationassurance experience across the Systems Engineering Development Lifecycle (preferred). Effective written and verbal communication skills, with the ability to adapt depending on the audience. Ability to discern key technical, commercial, and program influences from available information. Systems thinking and systems engineering more »
Administer employee and contractor entry passes. Manage receipt and dispatch of all classified assets. Maintain classified asset register. Conduct classified asset musters. Manage the informationassurance profile of our IT infrastructure. Manage and maintain Cyber Essentials Plus certification. Ensure adherence to required security frameworks, protocols on site and more »