information security best practice Experience of owning and delivering information security initiatives, including awareness programmes, phishing simulations and training. Experience/understanding of National CyberSecurity Centre (NCSC) best practices and guidance Experience of leading and conducting audits (especially ISO27001) is essential in this role. Familiar with principles of good … data governance, cybersecurity and data protection. Ability to work across multiple technical projects simultaneously as required, delivering to deadlines Nice To Have: Experience of working in a MoD restricted environment and familiarity with MoD security standards A recognised information security certification (such as CIPT, CISSP, CISM, CISA, Lead Auditor more »
DV Clearance Demonstrable expertise at CCNP/CCIE Level in network security. Proficiency in Cisco ASA/Firepower Firewalls. Nice-to-Haves: Experience in Cybersecurity practices. Familiarity with Cisco ISE, Cisco Umbrella, and Stealth Watch. If you are passionate about network security and ready to make a significant impact within more »
systems involving components such as hardware to ML and work on highly automated test applications whilst also testing complex systems for functional safety, and cybersecurity requirements. Responsibilities: Create automated test scripts in Python for system tests. Support the verification and validation considering all elements of the test life cycle more »
office Must have demonstratable experience in the following areas: Windows AD Storage & Compute Virtualisation & VDI Azure Cloud infrastructure, configuration & management, Microsoft 365, application management, Cybersecurity, Networking and connectivity, Automation and orchestration more »
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
stakeholders to develop and implement technology solutions. As the Senior Information Security Manager here you will be responsible for maintaining and executing WHSmith’s cybersecurity strategy, ensuring compliance with regulations, managing incident response efforts, and implementing effective security controls to protect the organisation's digital assets. You will lead … incident response, vulnerability management, and threat intelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cybersecurity policies, standards, and procedures, ensuring compliance with industry regulations and best practices, and creating a framework for security governance Working closely with senior management … IT teams, legal and compliance departments, and other stakeholders to align cybersecurity initiatives with business objectives Providing strategic guidance to senior management, ensuring that cybersecurity initiatives support business operations while mitigating risk Maintaining cybersecurity policies, standards, and procedures, ensuring compliance with industry regulations and best practices Leading more »
in work, to strengthen and transform Security Operations Centers Demonstrable experience in providing senior-level supervision and direction on technical matters, Knowledge of the Cybersecurity Capability Maturity Model (C2M2) & NIST Cybersecurity Framework (CSF) Experience of Security Operations Centers operating within the Military domain Main tasks: Providing the authoritative technical subject … Cyber Kill Chain (CKC), Intelligence Driven Defence (IDD), Unified Enterprise Defence (UED), Consultancy and communication Important Knowledge Cybersecurity Capability Maturity Model (C2M2) and NIST CyberSecurity Framework (CSF) Current awareness of the market for data analytics and SIEM platforms, including emerging leaders and Network security implementations (e.g host-based IDS more »
Location - once a week on site (Corsham) I am currently looking for an SC Cleared Security Assurance Co-Ordinator to join a well established CyberSecurity Consultancy based in Corsham. You must hold Acitve SC Clearance for this role. Role and responsibilities will include: Provide Technical Security Support and Assurance more »
will involve the development of highly automated test equipment to automatically verify all parts of the autonomy stack. These include functional, functional safety, and cybersecurity requirements. This role offers the exciting opportunity to work in a rapidly evolving and expanding field, applying novel technologies, techniques and measured to overcome more »