frameworks aligned with government standards. Lead and support risk assessments, threat modelling, and incident response initiatives. Work closely with stakeholders to ensure compliance with NCSC and other relevant security policies. Develop and deliver security strategies, policies, and best practice guidance to internal teams and external clients. Engage in security auditing More ❯
cloud security engineers to integrate security best practices. Implement automation and scripting (Python, Ansible) for security operations and firewall policy management. Ensure compliance with NCSC, NIST, and security frameworks. Perform penetration testing, vulnerability scanning, and remediation of identified security risks. Support SIEM integration and log analysis for threat intelligence and More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Gleeson Recruitment Group
technologies, and networking components. Proven experience working within highly secure environments and within structured security frameworks including ISO27001:2022, Cyber Essentials+, NIST CSF, and NCSC CAF. Strong working knowledge of Linux (RHEL, Ubuntu) administration and scripting (Bash, PowerShell, Python). Working knowledge of RH OpenShift technologies. Experience supporting or deploying More ❯
you'll need intimate knowledge of the security solutions market and able to make tailored recommendations to customers based on their risks. As an NCSC Assured Service Provider that partners with UK organisations to reduce cyber risk and drive security improvement, the solutions architecture team are trusted advisors to Saepio More ❯
and manage internal and external Security Working Groups. Support Serco Defence projects and design activities, ensuring compliance with MOD Secure by Design, HMG policy, NCSC guidance, NIST 800, and ISO 27001. Advise on technical requirements and compliance with formal contract security schedules (Security Aspects Letters) and recommend security technologies and More ❯
software security design review Strong knowledge of Agile, DevSecOps, System Engineer and or equivalent Knowledge of security standards and secure development principles such as NCSC Secure Development & Deployment Guidance, OWASP, NIST Secure Software Development Framework (SSDF - 800-218), Microsoft Azure Secure Development best practices, ISO27001 Experience with Azure cloud infrastructure More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
AtkinsRéalis
CISM) or equivalent. Associate/Full Membership of recognised security professional body such as the Institute of Information Security Professionals (IISP), IS2, BCS, CIISEC. NCSC Certified Cyber Professional/CESG CCP (Security and Information Risk Advisor or Security Architect). Understanding of 'Secure by Design' methodology and NIST More ❯
CISM) or equivalent. Associate/Full Membership of recognised security professional body such as the Institute of Information Security Professionals (IISP), IS2, BCS, CIISEC. NCSC Certified Cyber Professional/CESG CCP (Security and Information Risk Advisor or Security Architect). Understanding of ‘Secure by Design’ methodology and NIST More ❯
advisor on information security, ensuring risk-based decision-making and strong stakeholder engagement across the business. Maintain close working relationships with external stakeholders including NCSC and NPSA, ensuring Prevail remains alert to national-level threat reporting and guidance. Represent information security within executive-level planning, commercial proposals, and assurance processes. More ❯
designing and delivering solutions within the UK Government domain. Familiarity with compliance & security standards across the enterprise IT landscape such as ISO 27001 and NCSCCyber Essentials. Familiarity with ITIL service management principles & tools, and their use in an enterprise environment. Additional Information We pride ourselves in offering an excellent More ❯
Stevenage, Hertfordshire, South East, United Kingdom
Stevenage Borough Council
vulnerability management platforms (Tenable/Nessus/Qualys). Knowledge of threat intelligence, risk management, and cyber incident response frameworks. In-depth knowledge of NCSCCyber Assessment Framework (CAF), PSN Compliance, Cyber Essentials, NIST, or ISO 27001. Qualifications: Degree or equivalent level qualification or experience. ITIL Foundation certification or equivalent. More ❯
vulnerability management platforms (Tenable/Nessus/Qualys). Knowledge of threat intelligence, risk management, and cyber incident response frameworks. In-depth knowledge of NCSCCyber Assessment Framework (CAF), PSN Compliance, Cyber Essentials, NIST, or ISO 27001. Qualifications: Degree or equivalent level qualification or experience. ITIL Foundation certification or equivalent. More ❯
software. Have experience building and implementing secure by design principles within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large More ❯
software. Have experience building and implementing secure by design principles within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Be passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in More ❯
and technology professionals Ability to consistently deliver high quality outputs for our clients, enhancing our reputation and generating repeat business Desirable certifications: CISSP, ISO27001, NCSC CCP, GCISP, PRINCE2 (or equivalent) Desirable skills: Awareness of or experience in one or more of the following: Strategy and operating model, supply chain risk More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
penetration testing and effectively translating cyber risk analysis into standards, patterns and approaches to enable the safe exploitation of current and emerging technologies. Understanding NCSC information security guidance and architecture patterns. Understanding government Secure by Design principles. Understanding architecture methodology e.g. SABSA, TOGAF. At the Home Office, your work has More ❯
other compliance regimes including remediation of audit findings. Manage the NHSCFA Cyber Risk Management process, producing comprehensive Risk Documentation in accordance with the NationalCyberSecurityCentre best practice. Assess the effectiveness of Security Controls by conducting reviews, internal audits and spot-checks of ICT Security Infrastructure elements including, but More ❯
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯
Cardiff, South Glamorgan, United Kingdom Hybrid / WFH Options
Deloitte LLP
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire More ❯