improvement Areas of Knowledge We are looking for people who have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS / IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital … Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security (e.g., OWASP Top 10) Compliance and Governance (e.g., GDPR, ISO27001) Security Tools (e.g., Wireshark, Nmap, Metasploit, Kali Linux) Person Specification: Experience delivering cybersecurity training or mentoring professionals in a security capacity Strong ability to develop learners from intermediate to More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
team and engage in a diverse range of client projects within the defence, national security, environmental, and research sectors. This includes the provision of strategic risk management advice and / or technical consultancy within the context of cybersecurity. You will join a team of highly skilled professionals dedicated to safeguarding technologies and systems, many of which are critical to … and information assurance policies, standards, and guidance with experience in consultancy or supplier roles. Securing OT (Operational Technologies) with knowledge and understanding of challenges, particularly within military platforms and / or Critical National Infrastructure (CNI) Federation of Security Operations Centre (SOC)operations across two or more organisational environments such as enterprise, edge / deployed environments or cloud . … Demonstrable knowledge of cyber detection (e.g., threat identification / intelligence, real-time monitoring, anomaly detection) and cyber response (e.g. incident response, eradication and remediation, recovery, post-incident analysis). DevSecOps. Zero Trust Architecture (ZTA) expertise for enterprise, cloud and air-gapped environments along with knowledge of operational use of Zero Trust within any of the following: , IdAM systems, application More ❯
way Work closely with digital, cybersecurity, platform, and business teams to translate strategic goals into practical technical designs Champion security-by-design and compliance with frameworks like NIS2 and ISO27001 Guide architectural decisions across Azure, Power Platform, M365, and related tools Steer innovation, solution modernisation, and cloud governance Manage a team of solution architects, developing capability and fostering a culture More ❯