birmingham, midlands, united kingdom Hybrid / WFH Options
Tilt Recruitment Limited
to influence at all levels Passionate about cloud innovation and continuous security improvement Microsoft Azure Security Engineer Associate or AWS equivalent Cyber Essentials/NCSC certification (or similar) Why Join? Be part of a high-profile modernisation programme at a critical juncture Join a newly formed Cloud Centre of Excellence More ❯
exposure to both traditional and ground-breaking enterprise IT, as well as custom operational technology systems, with a clear and defined pathway to achieve NCSC certification and greater responsibility. Your work will involve leading and finding solutions to customer problems in an agile, innovative, and team-centric manner. We are More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
National Physical Laboratory
and briefings. As a trusted and independent national capability, the UKTL will interact at the intersection of standards bodies, such as 3GPP, the NationalCyberSecurityCentre and the wider UK intelligence community, academia, Ofcom, as well as Communications Service Providers and telecommunication equipment vendors. What you could be doing More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
ll collaborate across diverse teams, communicate complex risks clearly, and contribute to shaping DBT's secure architecture in line with NationalCyberSecurityCentre (NCSC) guidance and best practice as the team grows. Responsibilities Interact with senior stakeholders across DBT and influence a range of people across larger teams and … to a technical level, including working with security tools, network security infrastructure technologies and information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical More ❯
and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. NationalCyberSecurityCentre) Combine different sources to create an enriched view of cyber threats and hazards Research and investigate common attack techniques and relate these to More ❯