Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
QinetiQ Limited
risk exposure to cyber security, in support of operational and business planning activity across a range of different domains or sectors using established frameworks (e.g. NIST, MITREATT&CK, UK Government) Identify mitigations for cyber risk in a given business or operational scenario and threat environment Support development of cyber security risk cases in a … years of experience in security vulnerability, risk, audit & compliance Understand relevant NIST frameworks and ISO27001 standards and how to apply in practice Knowledge of MITREATT&CK Essential qualifications for the Cyber Security Risk Consultant: We value difference and we don't have a fixed idea when it comes to background or education, provided you More ❯
presence; able to communicate technology concepts at all levels. Demonstrated ability to establish lasting customer relationships. Framework fluency: familiarity with NIST CSF, ISO 27001, CIS Controls, MITREATT&CK and core domains (EDR/SIEM/IAM/Zero Trust; cloud security across AWS/Azure/GCP). Solution experience: selling MDR/XDR More ❯
risk management approaches, tools, and techniques. Threat modelling (e.g. STRIDE) and socio-technical risk assessment (e.g. NIST 800-30) methodologies. Attack classification and characterisation frameworks (e.g. MITREATT&CK) Computer, Network and Cloud Security architectures and controls, System Hardening, Secure Boundary Protection architectures and controls, Cryptographic controls (Data at Rest, Data in Transit, Public Key More ❯
risk management approaches, tools, and techniques. Threat modelling (e.g. STRIDE) and socio-technical risk assessment (e.g. NIST 800-30) methodologies. Attack classification and characterisation frameworks (e.g. MITREATT&CK) Computer, Network and Cloud Security architectures and controls, System Hardening, Secure Boundary Protection architectures and controls, Cryptographic controls (Data at Rest, Data in Transit, Public Key More ❯
risk management approaches, tools, and techniques. Threat modelling (e.g. STRIDE) and socio-technical risk assessment (e.g. NIST 800-30) methodologies. Attack classification and characterisation frameworks (e.g. MITREATT&CK) Computer, Network and Cloud Security architectures and controls, System Hardening, Secure Boundary Protection architectures and controls, Cryptographic controls (Data at Rest, Data in Transit, Public Key More ❯