GRC& Risk and Assurance

Walter Everett
London
1 month ago
Applications closed

Related Jobs

View all jobs

Security Consultant

Senior Product Assurance Manager

Senior Information Security Analyst ( Hybrid / Leeds )

Incident Response Manager

Incident Response Manager

GRC Senior Security Consultant

Governance, Risk, and Compliance (GRC) ConsultantWalter Everett is a specialist recruitment company, and our client is currently looking to recruit a talented and technical Governance, Risk, and Compliance (GRC) Consultant to join their dynamic and forward-thinking team.This is an exciting opportunity to work on meaningful projects that impact industries worldwide, driving innovative solutions while working with brilliant colleagues and clients.What You’ll Be Doing:Performing enterprise-level risk assessments for large-scale organizationsDrive pragmatic and creative solutions to GRC challenges, leveraging agile methodologies to adapt to new regulations, compliance requirements, and business changes.Foster continuous improvement in GRC processes, improving management information to prioritize risk-based decisions effectively.Lead initiatives to build a culture of accountability and responsibility across engagements.Enhance governance processes and advise on evidencing alignment with regulatory requirements and industry best practices (e.g., Secure by Design, NCSC CAF).Provide security expertise across standards and accreditations, ensuring the effectiveness of the security controls framework and maintaining the Information Security Management System.Derive and deliver documented Information Security Management Plans aligned with regulatory, legal, and compliance standards.Assist in identifying and analyzing emerging cybersecurity vulnerabilities and threats, leading risk mitigation efforts.Work with Service Management to ensure that partners and suppliers adhere to agreed standards and policies, verifying compliance and security KPIs.Collaborate with 1st, 2nd, and 3rd lines of defense on matters related to cybersecurity, data privacy, and regulatory considerations.Lead the development of governance, risk, and compliance aligned to policy, standards, and industry practices.Perform focused risk assessments of services and technologies, including supplier and third-party assessments during onboarding and throughout the contract lifecycle.Chair and coordinate Security Working Groups (SWG) and actively participate in governance forums.What Experience You’ll Bring:Extensive knowledge of GRC frameworks, regulatory compliance, and proactive risk management.Minimum of 10 years’ experience in a GRC role, with at least 5 years in a leadership or managerial position.Relevant certifications such as CISSP, CISM, CCSP, CISA, CRISC, or equivalent experience.Expertise in industry security frameworks such as NIST 800-53, NIST CSF, DORA, and NCSC guidelines.Strong understanding of cybersecurity domains, including network and cloud security, vulnerability management, and third-party supplier risk management.Knowledge of networking (e.g., switching, routing, firewalls).Familiarity with security testing and vulnerability management (e.g., pen testing/ITHC, CVSS/CVE).Experience working with standards such as ISO 27001, 27002, 27017, and 27108.Desirable Skills and Experience:Thrives as a consultant, enjoying the variety and challenges of engaging with different clients and technologies.Proposes security requirements for new systems or changes to existing systems with minimal supervision.Executes technical management tasks for ongoing client projects.Hands-on technical background with a range of technologies and systems.Diversity Statement:Walter Everett is committed to fostering an inclusive and diverse workplace. We are happy to discuss reasonable adjustments and accommodations throughout the recruitment process to ensure everyone has an equal opportunity to succeed.

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Top 10 Cybersecurity Career Myths Debunked: Key Facts for Aspiring Professionals

In a hyper-connected world, cybersecurity is no longer an afterthought—it’s a core component of modern business, government, and everyday life. From stopping ransomware attacks to safeguarding personal data, cybersecurity professionals shoulder a vital responsibility: keeping digital systems, networks, and data safe. Unsurprisingly, the demand for skilled cybersecurity talent continues to surge, offering robust and often lucrative career paths. Yet, despite the industry’s prominence, myths and misconceptions about cybersecurity careers abound. Is it really just about hacking? Do you need to be a superhuman coder with years of experience? Or is cybersecurity just a niche field, reserved for tech giants? At CyberSecurityJobs.tech, we see firsthand how these myths deter capable individuals from entering or advancing in one of the most dynamic fields in tech. This article aims to bust the top 10 cybersecurity career myths—providing clear, evidence-based insights into what it really takes to thrive in this ever-evolving domain. Whether you’re a recent graduate exploring the field, a mid-career professional seeking a pivot, or simply curious about the prospects, read on to discover the true breadth and promise of cybersecurity careers.

Global vs. Local: Comparing the UK Cybersecurity Job Market to International Landscapes

Understanding opportunities, salaries, and work culture in cybersecurity across the UK, the US, Europe, and Asia Cybersecurity has rapidly ascended from a back-office concern to a strategic priority for every industry. As data breaches, ransomware, and nation-state attacks increase in frequency and sophistication, organisations worldwide are racing to fortify their digital defences. This ongoing surge in cyber threats fuels an unprecedented demand for skilled security professionals—ranging from penetration testers and threat intelligence analysts to cloud security architects and CISOs. In this article, we’ll explore how the UK cybersecurity job market compares to major international hubs in the United States, Europe, and Asia. We’ll discuss job opportunities, salary bands, work culture, and provide guidance for those who might be contemplating remote or overseas positions. By understanding the nuances of each region’s cybersecurity ecosystem, you can make a more informed decision about where and how to advance your career in this high-impact, fast-evolving sector. Whether you’re a seasoned expert with years of experience or a career-changer eager to break into cybersecurity, this overview will help you navigate the global landscape. By the end, you’ll have a clearer perspective on each region’s advantages and challenges—along with practical insights for seizing the best opportunities in a field that has become mission-critical for every modern organisation.

Cybersecurity Leadership for Managers: Strategies to Motivate, Mentor, and Set Realistic Goals in Threat-Driven Environments

In an era of rapidly increasing data breaches, ransomware attacks, and corporate espionage, the importance of robust cybersecurity cannot be overstated. Protecting digital assets has become as essential as safeguarding physical resources, and organisations worldwide rely heavily on specialised teams to defend against sophisticated cyber threats. However, even the most advanced tools and techniques are only as effective as the leadership guiding their use. Cybersecurity leadership requires a dynamic blend of technical know-how, strategic thinking, and people-management skills to maintain readiness against ever-evolving threats. This article is designed for professionals aiming to lead cybersecurity teams or transition into managerial roles where understanding how to motivate, mentor, and set realistic goals is paramount. With insights into building high-performing teams, fostering collaboration, and embracing continuous learning, you’ll be equipped to protect your organisation from a broad spectrum of cyber risks.