SKILLS AND EXPERIENCE CISSP, CISM, CCSP, CRISC or equivalent experience Good knowledge covering several of the following examples (this list is not exhaustive): AD, Cryptography, End User Computing, IAM, PKI, Server hardening, SIEM, SOAR, virtualisation (VMware) Participate in pre-sales tasks and perform ongoing support of delivery collateral. Familiarity with More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Thales Group
You can independently define architectures, are proficient in Infrastructure Security, Security Supervision, and Information Systems Security. You are familiar with Risk Analysis, Network Security, Cryptography, IAM, cloud technologies, and compliance monitoring. You excel in working with customers and technical teams. NICE TO HAVE: Domain expertise in Defence, Nuclear, Government, Aerospace More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
and ensuring compliance with legal and regulatory standards. Security Architecture & System Hardening - Experience designing, implementing, and maintaining secure IT infrastructures by applying best practices. Cryptography - Knowledge of encryption algorithms, secure key management, and certificate lifecycle management to protect data integrity and confidentiality. Threat Intelligence & Analysis - Ability to gather, analyse, and More ❯
defence and cyber security technologies, with an emphasis on R&D, design, and rapid prototyping. It is a trusted specialist supplier of high-grade cryptography, advanced network products, and related services and as such has become a key partner to the UK’s government, military, and civil organisations. It is More ❯
SC Clearance for UK-caveated programmes. In-depth knowledge of Electronic Hardware Verification and Validation methodologies Knowledge of Security aspects covering Information Warfare, Networks, Cryptography, and System Vulnerabilities Strong interpersonal skills with the ability to steer technical interchange discussions Product Data Management using Teamcenter/SharePoint/Confluence. Self-motivated More ❯
response and playbook development Detection creation within SIEM tools and using GitHub Vulnerability scanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability to understand client-specific challenges and tailor solutions accordingly More ❯
swindon, wiltshire, south west england, United Kingdom
Tata Consultancy Services
If you need support in completing the application or if you require a different format of this document, please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100 with the subject line: “Application Support Request More ❯
If you need support in completing the application or if you require a different format of this document, please get in touch with at UKI.recruitment@tcs.com or call TCS London Office number 02031552100 with the subject line: “Application Support Request More ❯