software security design review Strong knowledge of Agile, DevSecOps, System Engineer and or equivalent Knowledge of security standards and secure development principles such as NCSC Secure Development & Deployment Guidance, OWASP, NIST Secure Software Development Framework (SSDF - 800-218), Microsoft Azure Secure Development best practices, ISO27001 Experience with Azure cloud infrastructure More ❯
languages like PowerShell, YAML, JSON Expertise in application security tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threat modelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator - able to More ❯
languages like PowerShell, YAML, JSON Expertise in application security tools and DevSecOps processes Understanding of key frameworks and standards (e.g. OWASP, NIST SSDF, ISO27001, NCSC) Experience with threat modelling, risk assessments, and secure design reviews Comfortable owning security strategy and tooling across complex, modern product landscapes Strong communicator - able to More ❯
architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire to work More ❯
Experience in security architectural assurance and handling complex projects. Excellent stakeholder management skills, up to executive level. Expertise in cybersecurity frameworks such as NCSC CAF, NIST, ISO 2700x series, CIS. Understanding of the impact of emerging technologies on information security. Capabilities: Communication and Information: Engage and communicate The Crown More ❯
and gas Water Civil Nuclear Transport (including aviation, rail, maritime, road and autonomous vehicles) Wider critical infrastructure Security standards relating to the sector, including: NCSC NIS Guidance and CAF ISO 27001 and ISO 27005 NERC CIP ISA-99/IEC 62443 NIST CSF. Additional information Please note that the interview More ❯
maturity, security architecture, cyber transformation, and regulatory compliance for cyber. Experience with recognised cybersecurity standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR, and NIS2. Experience working in various environments or organisational contexts to develop cyber strategy and manage cyber risk. A desire to work with More ❯
and virtualisation issues Automate tasks using PowerShell, CLI, and orchestration tools Implement backup & disaster recovery processes Collaborate with security teams to maintain compliance (CIS, NCSC) Create and maintain detailed technical documentation 🧠 What You Bring Extensive experience with VMware VCF stack (vSphere, NSX, Aria) Strong expertise in Windows Server and core More ❯
and virtualisation issues Automate tasks using PowerShell, CLI, and orchestration tools Implement backup & disaster recovery processes Collaborate with security teams to maintain compliance (CIS, NCSC) Create and maintain detailed technical documentation 🧠 What You Bring Extensive experience with VMware VCF stack (vSphere, NSX, Aria) Strong expertise in Windows Server and core More ❯
and run processes to monitor UKPN IT compliance to legal and regulatory requirements such as Smart Energy Code, Cyber Essentials, NationalCyberSecurityCentre (NCSC) Networks & Information Systems (NIS) Regulations Cyber Assessment Framework (CAF) and all IT related audits (internal and external) where the scope is wholly or significantly relevant … of compliance, security and regulatory frameworks such as Cyber Essentials, Smart Energy Code (SEC), Network and Information Systems Directive (NIS), NationalCyberSecurityCentre (NCSC) Cyber Assessment Framework (CAF), ISA/IEC 62443, ISO/IEC 27001/27002, GDPR, Cloud Security Alliance (CSA) Star framework, SOC2 Type 2 audits More ❯
complex hybrid On-Prem AD and Entra environment. Design, document, test, and implement a secure approach to separating high-privilege accounts in line with NCSC and Microsoft best practices. Execute closed user group testing, followed by phased rollout to 30–150 users with minimal disruption. Produce high-quality documentation suitable More ❯
complex hybrid On-Prem AD and Entra environment. Design, document, test, and implement a secure approach to separating high-privilege accounts in line with NCSC and Microsoft best practices. Execute closed user group testing, followed by phased rollout to 30–150 users with minimal disruption. Produce high-quality documentation suitable More ❯
understanding of what it takes to comply with cybersecurity industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP 800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cybersecurity threat and risk with the ability to think like an attacker and design controls More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Walsh Employment
operate across delivery assurance , technical strategy , and stakeholder engagement Demonstrated experience working with major IT service providers and within secure government environments Familiarity with NCSC guidance , GDPR , and other relevant security frameworks Excellent communication and technical documentation skills Role & Responsibilities As Lead Technical Architect , you will act as a technical More ❯
separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal Identity & Access Management Engineer will More ❯
separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal Identity & Access Management Engineer will More ❯
South West London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal Identity & Access Management Engineer will More ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
separation of high-privilege accounts in a hybrid Active Directory and Entra ID environment, implementing identity architecture in line with Zero Trust principles and NCSC guidance. This is a hands-on technical delivery role, contributing to operational rollout, secure configuration, and structured documentation. The ideal Identity & Access Management Engineer will More ❯
to align with internal business objectives, industry good practices (including Secure by Design aligned to UK Government principles), and regulatory requirements (including GovAssure and NCSCCyber Assurance Framework). What you'll be doing: Develop and execute GRC strategies that align with business objectives and support business processes. Drive pragmatic … initiatives that build a culture of accountability and responsibility across engagements. Enhance governance processes and advise on evidencing alignment with regulatory requirements (such as NCSC CAF) and industry good practices (including Secure by Design). Provide security expertise across standards and accreditations, measure and control the effectiveness of the security … or management. Relevant certifications such as CISSP, CISM, CCSP, CISA, CRISC, or equivalent experience. Practical knowledge of industry security frameworks like NIST 800-53, NCSC CAF, NIST CSF, DORA, and NCSC guidelines. Good understanding of cybersecurity domains including network and cloud security, vulnerability management, third-party risk, and application security. More ❯
in EU amongst Goverments and public sector bodies The role: 📍End-to-end sales cycles with European public sector and defence 📍Own relationships within NCSC's, CIRTs, MOD's and CNI organisation 📍Can be based anywhere in EU. Remote role 📍Salary – Six figure base + double OTE Must have requirements More ❯
controls such as RBAC (Role-Based Access Control), MFA (Multi-Factor Authentication), and API security mechanisms . Ensure compliance with GDPR, ISO 27001, and NCSCCyber Essentials security standards. 3. Vulnerability Management & Defect Tracking Identify, document, and track security defects, working closely with development teams to resolve vulnerabilities . Provide … OAuth 2.0 security mechanisms . Strong risk assessment, problem-solving, and communication skills . Awareness of UK government security frameworks , including Cyber Essentials and NCSC guidelines . Nice to Have Skills Experience working in UK public sector engagements (MoJ, HMCTS, DWP, Home Office, NHS, etc.) . Knowledge of User-Centric More ❯
ll collaborate across diverse teams, communicate complex risks clearly, and contribute to shaping DBT's secure architecture in line with NationalCyberSecurityCentre (NCSC) guidance and best practice as the team grows. Responsibilities Interact with senior stakeholders across DBT and influence a range of people across larger teams and … to a technical level, including working with security tools, network security infrastructure technologies and information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical More ❯
to a diverse student body, ensuring that the modules and quality of delivery adhere to the criteria for British Computing Society and the NationalCyberSecurityCentre, as well as in carrying out research aligned with the priorities of the Centre for Sustainable Cyber Security. Minimum Requirements: PhD in cyberMore ❯