Naukrijobs UK
Register
London Jobs
Manchester Jobs
Liverpool Jobs
Nottingham Jobs
Birmingham Jobs
Cambridge Jobs
Glasgow Jobs
Bristol Jobs
Wales Jobs
Oil & Gas Jobs
Banking Jobs
Construction Jobs
Top Management Jobs
IT - Software Jobs
Medical Healthcare Jobs
Purchase / Logistics Jobs
Sales
Ajax Jobs
Designing Jobs
ASP .NET Jobs
Java Jobs
MySQL Jobs
Sap hr Jobs
Software Testing Jobs
Html Jobs
IT Jobs
Logistics Jobs
Customer Service Jobs
Airport Jobs
Banking Jobs
Driver Jobs
Part Time Jobs
Civil Engineering Jobs
Accountant Jobs
Safety Officer Jobs
Nursing Jobs
Civil Engineering Jobs
Hospitality Jobs
Part Time Jobs
Security Jobs
Finance Jobs
Marketing Jobs
Shipping Jobs
Real Estate Jobs
Telecom Jobs

DPO & Information Security Oversight Manager

Job LocationGreater Manchester
EducationNot Mentioned
SalaryCompetitive salary
IndustryNot Mentioned
Functional AreaNot Mentioned
Job TypePermanent, full-time

Job Description

Job Description My SME banking client is looking for a DPO to oversee the expansion of their data protection programme in a new position for the firm. Personal Data/Data Privacy  Acts as the Banks Data Protection Officer  Oversight of all aspects of data privacy under GDPR and any relevant law and guidelines, and data management including ongoing monitoring and testing of appropriate controls and procedures.  Provide advisory support to Line One in relation to DPIA completion.  Escalates any issues in relation to ineffective data privacy and data management.  Acts as lead on any data breaches and ensure these are where deemed necessary or material reported to ICO within timelines.  Acts as the regulatory/ICO liaison.  Challenge management of personal data and overall data privacy under GDPR and any relevant law and guidelines. Information Security  Works with IT and other stakeholders on defining Information Security strategy and framework and ensures this is congruent to the Banks data privacy and protection management frameworks.  Provides expertise and coordination when required to the Banks approach to system user access.  Performs Line Two independent user access and security monitoring.

APPLY NOW

© 2019 Naukrijobs All Rights Reserved