secure architectures, incorporating identity, access management, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools More ❯
the training you will sit an industry wide qualification (such as CRT or CSTM) before commencing billable client facing work. After gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetration testing and consultancy, ready to specialise or broaden into More ❯
the training you will sit an industry wide qualification (such as CRT or CSTM) before commencing billable client facing work. After gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetration testing and consultancy, ready to specialise or broaden into More ❯
of the UKs most sensitive programmes. What Youll Do Design & implement secure cloud architectures (IAM, encryption, VPC). Lead risk assessments, gap analyses & threat modelling. Advise on compliance (GDPR, NCSC Principles, ISO 27001). Configure cloud-native security tools & integrate with SIEM (Splunk, Chronicle). Embed security in CI/CD pipelines with DevOps teams. Support incident response & recovery for More ❯
to integrate identity services across platforms Define and enforce identity lifecycle management, role-based access control (RBAC), and privileged access strategies Conduct risk assessments and ensure identity solutions meet NCSC and MOD security requirements Provide technical leadership and mentoring to IAM engineers and support staff Maintain documentation and contribute to architecture governance boards Required Skills & Experience Active DV clearance (Developed More ❯
swindon, wiltshire, south west england, united kingdom
Stable
to integrate identity services across platforms Define and enforce identity lifecycle management, role-based access control (RBAC), and privileged access strategies Conduct risk assessments and ensure identity solutions meet NCSC and MOD security requirements Provide technical leadership and mentoring to IAM engineers and support staff Maintain documentation and contribute to architecture governance boards Required Skills & Experience Active DV clearance (Developed More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Trowbridge, England, United Kingdom Hybrid / WFH Options
NexGen Associates
and feedback analysis Governance and compliance Work in line with ITIL and ITSM processes Support risk management and compliance reporting Help maintain relevant accreditations such as Cyber Essentials and NCSC Cloud Security Principles Requirements for the role: No formal qualifications required but relevant experience in Business or IT is essential ITIL Foundation preferred and will be supported if not already More ❯
Trowbridge, cardiff, united kingdom Hybrid / WFH Options
NexGen Associates
and feedback analysis Governance and compliance Work in line with ITIL and ITSM processes Support risk management and compliance reporting Help maintain relevant accreditations such as Cyber Essentials and NCSC Cloud Security Principles Requirements for the role: No formal qualifications required but relevant experience in Business or IT is essential ITIL Foundation preferred and will be supported if not already More ❯
Architect will have experience in implementing enterprise-level architecture in complex, multi-supplier/multi-platform environments. Experience designing and implementing secure systems to meet Government Security Classification and NCSC standards. Hands-on experience with Azure, AWS, or other cloud platforms; on-premise technologies; identity management; storage; networking; and security controls. Minorities, women, LGBTQ+ candidates, and individuals with disabilities are More ❯
Architect will have experience in implementing enterprise-level architecture in complex, multi-supplier/multi-platform environments. Experience designing and implementing secure systems to meet Government Security Classification and NCSC standards. Hands-on experience with Azure, AWS, or other cloud platforms; on-premise technologies; identity management; storage; networking; and security controls. Minorities, women, LGBTQ+ candidates, and individuals with disabilities are More ❯
Edmonton, Cornwall, United Kingdom Hybrid / WFH Options
Sky
and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver More ❯
Brixton, Devon, United Kingdom Hybrid / WFH Options
Sky
and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver More ❯
Cranham, Gloucestershire, United Kingdom Hybrid / WFH Options
Sky
and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver More ❯
Stamford Hill, Cornwall, United Kingdom Hybrid / WFH Options
Sky
and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring Solid More ❯
access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO 27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cybersecurity standards such as NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access More ❯
access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO 27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cybersecurity standards such as NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access More ❯
access policies. Familiarity with common regulatory and compliance frameworks (e.g. NIST, CIS Controls, ISO 27001, Cyber Essentials Plus). Experience aligning infrastructure builds with cybersecurity standards such as NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Experience implementing monitoring, logging, and alerting toolsets including SIEM and threat detection platforms. Understanding of data classification, encryption, and secure storage/access More ❯
remote access. Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cybersecurity standards such as NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Awareness of common regulatory and compliance frameworks (e.g. ISO 27001, Cyber Essentials Plus). Ability to work with cybersecurity engineers to interpret More ❯
remote access. Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cybersecurity standards such as NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Awareness of common regulatory and compliance frameworks (e.g. ISO 27001, Cyber Essentials Plus). Ability to work with cybersecurity engineers to interpret More ❯
remote access. Knowledge of identity and access management (IAM), including multi-factor authentication (MFA), RBAC, and conditional access policies. Experience aligning infrastructure builds with cybersecurity standards such as NCSC guidance, CIS benchmarks, or Microsoft Security Baselines. Awareness of common regulatory and compliance frameworks (e.g. ISO 27001, Cyber Essentials Plus). Ability to work with cybersecurity engineers to interpret More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Hays
/CISA/CISMP Strong demonstrable experience of IT and cyber governance, compliance, risk, and security within enterprise IT environments. Awareness and experience of working within industry, Government and NCSCsecurity governance frameworks, standards, policies, and legislation (e.g. GovAssure, Cyber Assurance Framework, Government Functional Standards, Cyber Essentials, GDPR. Experience communicating with stakeholders at all levels. Experience leading or contributing to More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
/CISA/CISMP Strong demonstrable experience of IT and cyber governance, compliance, risk, and security within enterprise IT environments. Awareness and experience of working within industry, Government and NCSCsecurity governance frameworks, standards, policies, and legislation (e.g. GovAssure, Cyber Assurance Framework, Government Functional Standards, Cyber Essentials, GDPR. Experience communicating with stakeholders at all levels. Experience leading or contributing to More ❯
bath, south west england, united kingdom Hybrid / WFH Options
Hays
/CISA/CISMP Strong demonstrable experience of IT and cyber governance, compliance, risk, and security within enterprise IT environments. Awareness and experience of working within industry, Government and NCSCsecurity governance frameworks, standards, policies, and legislation (e.g. GovAssure, Cyber Assurance Framework, Government Functional Standards, Cyber Essentials, GDPR. Experience communicating with stakeholders at all levels. Experience leading or contributing to More ❯