real-time. Operational strategy, written process, control policies, and guidelines. Deriving standard Alpha states from standard control frameworks in conformity to NISTSP800-171 and NISTSP800-160 . Creating an ecosystem of practices and preparing incremental improvements. Creating information More ❯
support). Monitor security tools and respond to alerts and incidents. COMPLIANCE ACTIVITIES: Change Management Incident Management Maintenance Vulnerability scanning Implement NISTSP800-171 for internal systems. Establish a System Security Plan (SSP) . The SSP needs to go through each NISTSP … 800-171 control and include how the control is implemented, monitored, and enforced. GOVERNANCE: Create programs and pathways for transition into cybersecurity, regulations, compliance, and GRC, translating business into technical and security risk. RISK MANAGEMENT: The goal is to understand the lifecycle of risk, apply complex critical skills … in emergent technology. Experience in architecting, building, and securing systems at scale. In-depth knowledge of cybersecurity compliance standards such as ISO, SOC, NIST, CMMC, EDRS, and ITAR. Certifications in (ISACA, CISM, CRISC, CISA, ITCA) . Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) . More ❯
informed of new and updated industry frameworks and regulations: GDPR, ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, SP800-53, PFMI, CPMI ISOCO and FFIEC handbook. Keep informed of new and emerging security threats & assess effectiveness of current controls to identify … equivalent or working towards certification is preferred. Knowledge of Risk Management life cycles based on an established framework: ISO 27001, SANS, NISTSP800-53, CERT, ENISA. Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security Controls, NISTMore ❯
cybersecurity and AI governance frameworks. This role is pivotal in ensuring our customers receive accurate, clear, and timely answers to their questions regarding NIST (CSF, 800-53, etc.), SOC2 (Type 1 & 2), ISO 27001, and the emerging ISO 42001 standard. The ideal candidate possesses deep subject … do Compliance Subject Matter Expert: Serve as the go-to expert for customer inquiries related to the interpretation, requirements, and best practices of NIST, SOC2, ISO 27001, and ISO 42001 frameworks Query Resolution: Directly address and resolve customer questions regarding these compliance standards, ensuring accuracy and clarity in … with a strong focus on specific frameworks Deep, demonstrable understanding and practical knowledge of NIST frameworks (e.g., Cybersecurity Framework, NISTSP800-53). Must be able to explain core concepts and requirements accurately Deep, demonstrable understanding and practical knowledge of SOC2 (Trust Services More ❯
, ISO 27001, or similar. General understanding of operational risk and risk-related control frameworks and practices such (ISO 27001, NISTSP800-53, NIST CSF, COBIT, ITIL, etc.). Experience with IAM tools and technologies, such as Microsoft Entra ID (formerly Azure More ❯
e.g., NIST, ISO27001, CIS). Operational Technology Security : Protect critical infrastructure through robust OT security assessments and frameworks (e.g., NISTSP800-82, CAF). What We’re Looking For Proven experience in cybersecurity, technology risk, or security architecture consulting. Expertise in one or More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Consulting Point
e.g., NIST, ISO27001, CIS). Operational Technology Security : Protect critical infrastructure through robust OT security assessments and frameworks (e.g., NISTSP800-82, CAF). What We’re Looking For Proven experience in cybersecurity, technology risk, or security architecture consulting. Expertise in one or More ❯
and operational teams to mitigate threats. Security Assessments & Compliance: Conduct OT security assessments, evaluate risk, and ensure compliance with IEC 62443, NISTSP800-82, NERC CIP, ISO 27001, and NIS2 frameworks. Vulnerability & Risk Management: Perform vulnerability analysis and penetration testing, and implement risk mitigation strategies … Network Security: Hands-on experience with firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. Incident Response & Risk Management: Experience in security monitoring, incident More ❯
ZPA ZTMA, CrowdStrike, CyberArk, SailPoint, Ping, and ability to design and build a controls dashboard from evidence outputs from MS solutions, using ISO27K, NIST, NIS 2, DORA, TISAX, PCI, and/or equivalent. Exposure to Threat Methodology and Incident Response: Identify, analyze, and respond to security events and … team exposure and cyber threat mitigation. Security Assessments & Compliance: Exposure to security assessments, evaluate risk, and ensure compliance with IEC 62443, NISTSP800-82, NERC CIP, ISO 27001, and NIS2 frameworks or combination. Vulnerability & Risk Management: Able to implement risk mitigation strategies tailored for ICS … related field. Network Security: Exposure to Firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. Incident Response & Risk Management: Experience in security monitoring, incident More ❯
measures, ensuring adherence to best practices, international standards, and local regulations. Ideally suited to candidates who possess expert knowledge of security frameworks including NIST800, ISO 27001, and cybersecurity guidelines from PRA, FCA, and ICO. Candidates with at least 3 years' relevant experience in finance or … controls. Provide cybersecurity training to ensure staff awareness and compliance. Skills & Qualifications: Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST800, ISO 27001) and GDPR regulations. Experience with network security infrastructure and SIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux More ❯
measures, ensuring adherence to best practices, international standards, and local regulations. Ideally suited to candidates who possess expert knowledge of security frameworks including NIST800, ISO 27001, and cybersecurity guidelines from PRA, FCA, and ICO. Candidates with at least 3 years' relevant experience in finance or … controls. Provide cybersecurity training to ensure staff awareness and compliance. Skills & Qualifications: Minimum 3 years' experience in cybersecurity. Strong knowledge of security frameworks (NIST800, ISO 27001) and GDPR regulations. Experience with network security infrastructure and SIEM tools (Splunk, SolarWinds). Proficiency in Windows/Linux More ❯
and training initiatives across the organisation. Skills & Experience Required Hands-on experience in cybersecurity governance, risk, or assurance. Strong knowledge of NISTSP800-53 and deep familiarity with GDPR and financial regulations. Experience managing service catalogues and aligning BAU controls with regulatory expectations. Proficiency in More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Albany Beck
and training initiatives across the organisation. Skills & Experience Required Hands-on experience in cybersecurity governance, risk, or assurance. Strong knowledge of NISTSP800-53 and deep familiarity with GDPR and financial regulations. Experience managing service catalogues and aligning BAU controls with regulatory expectations. Proficiency in More ❯
a major transformation of its Security Risk Management capability, focusing on enhanced technical execution, regulatory alignment, and operational maturity. Guided by NISTSP800-53, GDPR, PRA (BoE), and FRB/OCC expectations, they are shifting from project-led practices towards a BAU security operations model. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Albany Beck
a major transformation of its Security Risk Management capability, focusing on enhanced technical execution, regulatory alignment, and operational maturity. Guided by NISTSP800-53, GDPR, PRA (BoE), and FRB/OCC expectations, they are shifting from project-led practices towards a BAU security operations model. More ❯
comprehensive understanding of what it takes to comply with cyber security industry standards and frameworks in practise (e.g. ISO 27001, NIST CSF, SP800-53, NCSC CAF, Cyber Essentials). Has a thorough understanding of cyber security threat and risk with the ability to think like More ❯
compliant technology environment. What you will be doing: Maintain security policy, standards, procedures and frameworks. Ensure alignment with security industry standards such as NIST CSF and NIST800-53. Act as an advisor to colleagues across the organisation on best security practice. Conduct … Information Security, CICA, CRISC, CISM and/or Data analysis beneficial but not essential if experience validates skills. Knowledge of security frameworks (e.g., NIST CSF, ISO 27001, SOC1,2). Prince 2, MSP, APMQ advantageous. A desire to continue learning and developing security skills and qualifications Our commitment More ❯
london, south east england, United Kingdom Hybrid / WFH Options
CLS Group
compliant technology environment. What you will be doing: Maintain security policy, standards, procedures and frameworks. Ensure alignment with security industry standards such as NIST CSF and NIST800-53. Act as an advisor to colleagues across the organisation on best security practice. Conduct … Information Security, CICA, CRISC, CISM and/or Data analysis beneficial but not essential if experience validates skills. Knowledge of security frameworks (e.g., NIST CSF, ISO 27001, SOC1,2). Prince 2, MSP, APMQ advantageous. A desire to continue learning and developing security skills and qualifications Our commitment More ❯
Architecture: Translate business, data protection and security requirements into practical and well-structured architectural designs, utilizing industry best practices and security frameworks (e.g., NIST, ISO 27001, CIS). Develop and maintain secure architectural patterns and standards, with a solid working knowledge of cloud security (AWS, Azure, GCP). … architecture roles, with a focus on cloud security, and compliance. Strong understanding of security governance, risk, and compliance frameworks such as ISO 27001, NIST800-53/CSF, NIS/NIS2, DORA, UK CNI/OT/IIOT compliance. Hands-on experience building credibility with external More ❯
Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and security standards and regulations. Provides internal customer support … Provides a documented work history that includes a minimum of 5-years experience in Information Security. Proficiency in security framework models such as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network … upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN More ❯
directs, develops or maintains organisational cyber and information security policies, standards and processes, using recognised standards (e.g. the ISO/IEC 27000 family, NIST CSF) where appropriate. Applies recognised cyber and information security standards and controls within an organisation, programme, project or operation. Applies relevant security classification. Risk … protection, risk management, enterprise IT, legal or (relevant) compliance roles. Strong understanding of security governance, risk, and compliance frameworks such as ISO 27001, NIST800-53/CSF, NIS/NIS2, DORA, UK CNI/OT/IIOT compliance. Hands-on experience building credibility with external More ❯
both a GRC and technical nature alongside frameworks such as ISO27001/2:2005/13, DORA, NIS 2, PCI-DSS, GDPR-DPO, NIST CSF SP800-53, PSD-2, FCA/PRA, and MS Azure. Ownership of Strategic, Operational, and Tactical IT Security and Risk Management, technical and More ❯
Services regulatory landscape (e.g., PRA, FCA, BoE, ECB, MAS). Experience working with a range of security governance frameworks and standards e.g., ISO27001, NIST SP800-53, PCI-DSS. Security and Cloud related qualifications e.g., CISSP, CCSP, CCSK, TOGAF, SABSA, and/or vendor architectural qualifications in AWS, Azure More ❯
in information security assurance with a focus on application security. Experience working with regulatory compliance and information security management frameworks (e.g., ISO 27000, NIST SP800 series and CSF). Adaptable, ability to pivot quickly to new challenges to support the business and changing risk profile. Business Acumen, an More ❯
the security of both OT and IT environments, including SCADA systems and Industrial Control System (ICS) Governance and compliance of all OT systems - NIST800-82, IEC 62443, OG86, NERC-CIP, SOCI, NIST-CSF, NIS2 Taking a proactive role in threat hunting, incident response … awareness Key skills needed are: 3+ years in a cyber security role with a good level of exposure to OT security Knowledge of NIST and IEC 62443 OT frameworks Knowledge of the Microsoft security stack and wider IT security experience highly desirable Knowledge of NERC CIP and/ More ❯