will help our clients: Security Architecture: Translate business, data protection and security requirements into practical and well-structured architectural designs, utilizing industry best practices and security frameworks (e.g., NIST, ISO 27001, CIS). Develop and maintain secure architectural patterns and standards, with a solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat … security, data protection, and security architecture roles, with a focus on cloud security, and compliance. Strong understanding of security governance, risk, and compliance frameworks such as ISO 27001, NIST800-53/CSF, NIS/NIS2, DORA, UK CNI/OT/IIOT compliance. Hands-on experience building credibility with external stakeholders through technical presentations, audits More ❯
Defender/Entra, Zscaler ZPA ZTMA, CrowdStrike, CyberArk, SailPoint, Ping, and be able to design and build a controls dashboard form evidence outputs form MS solutions, using ISO27K, NIST, NIS 2, DORA, TISAX, PCI and or equivalent. Exposure to Threat Methodology and Incident Response: Identify, analyze, and respond to security events and incidents from a process point of … activities, in conjunction with operational team exposure and cyber threat mitigation. Security Assessments & Compliance: Exposure to security assessments, evaluate risk, and ensure compliance with IEC 62443, NISTSP800-82, NERC CIP, ISO 27001, and NIS2 frameworks or combination. Vulnerability & Risk Management: Able to implement risk mitigation strategies tailored for ICS/SCADA and IoT environments. … Cybersecurity, Information Technology, or a related field. Network Security: Exposure to Firewalls, IDS/IPS, VPNs, authentication systems, PKI, log management, and content filtering. Cybersecurity Frameworks: Familiarity with NIST, IEC 62443, ISO 27001, NERC CIP, GSMA IoT Security Guidelines, and other industry security standards. Incident Response & Risk Management: Experience in security monitoring, incident response, and risk mitigation. Technical More ❯
as well cloud-hosted applications or environments. Experience with CTM frameworks like STRIDE, PASTA, MITRE ATT&CK etc. Experience in conducting assessments against common security standards like ISO27001, NIST CSF, NIST800-53, CIS benchmarks etc. Experience in assessing, documenting and managing cyber risk, including third-party risk. Experience in driving remediation efforts and More ❯
will help our clients: Security Architecture: Translate business, data protection and security requirements into practical and well-structured architectural designs, utilizing industry best practices and security frameworks (e.g., NIST, ISO 27001, CIS). Develop and maintain secure architectural patterns and standards, with a solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat … security, data protection, and security architecture roles, with a focus on cloud security, and compliance. Strong understanding of security governance, risk, and compliance frameworks such as ISO 27001, NIST800-53/CSF, NIS/NIS2, DORA, UK CNI/OT/IIOT compliance. Hands-on experience building credibility with external stakeholders through technical presentations, audits More ❯
London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
the companys information protection requirements. • Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and security standards and regulations. • Provides internal customer support via assigned tickets for security … Computer Science, or similar discipline. • Provides a documented work history that includes a minimum of 5-years experience in Information Security. • Proficiency in security framework models such as NIST, etc., implementing and auditing security measures, security response, and incident management. • Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security, administration of DLP, antivirusantimalware … to manage and continuously improve upon vulnerability management program. • Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: • Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) • Knowledge and experience with Microsoft Office and Visio. • Knowledge of WAN technologies including MPLS, SD WAN. More ❯
as well cloud-hosted applications or environments. Experience with CTM frameworks like STRIDE, PASTA, MITRE ATT&CK etc. Experience in conducting assessments against common security standards like ISO27001, NIST CSF, NIST800-53, CIS benchmarks etc. Experience in assessing, documenting and managing cyber risk, including third-party risk. Experience in driving remediation efforts and More ❯
role A track record of delivering security solutions for large-scale infrastructure, transformation or integration programmes Practical knowledge and understanding of industry security frameworks and guidance such as NIST CSF, NIST800-53, NCSC CAF and other NCSC guidelines Good knowledge of networking (switching, routing, firewalls) Experience with the design concepts associated with adoption More ❯
as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO 27001, SOC 2, NIST800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving skills. Ability to communicate More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO 27001, SOC 2, NIST800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving skills. Ability to communicate More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO 27001, SOC 2, NIST800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving skills. Ability to communicate More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
as well as using GRC tools and guidance developed for Risk mitigation. Practical knowledge of information security standards and risk assessment frameworks such as ISO 27001, SOC 2, NIST800-32 Strong knowledge of cyber controls, policies, and procedures. Experience of delivering metrics for senior level audiences. Demonstrate analytical and problem-solving skills. Ability to communicate More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
incident response and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST800-30/53, OWASP) . Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
incident response and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security frameworks (ISO 27001, NIST800-30/53, OWASP) . Experience with risk management methodologies and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). More ❯
Corsham, England, United Kingdom Hybrid / WFH Options
Cyber UK
building security. Risk Management: Lead Cyber and Information Security Risk Management for NSoIT(D). Implement and manage cyber security risks in STREAM and ARM. Conduct and manage NIST800-based Risk Assessments. Oversee cyber and information security architecture within STREAM. Deliver routine cyber and information security risk reporting. Act as secretary to the programme Security More ❯
needs (system administration, help desk support). Monitor security tools and respond to alerts and incidents. COMPLIANCE ACTIVITIES: Change Management Incident Management Maintenance Vulnerability scanning Implement NISTSP800-171 for internal systems. Establish a System Security Plan (SSP) . The SSP needs to go through each NISTSP800-171 control … SKILLS SET: 20 years experience in emergent technology. Experience in architecting, building, and securing systems at scale. In-depth knowledge of cybersecurity compliance standards such as ISO, SOC, NIST, CMMC, EDRS, and ITAR. Certifications in (ISACA, CISM, CRISC, CISA, ITCA) . Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) . Information Systems Security Architecture Professional More ❯
London, England, United Kingdom Hybrid / WFH Options
CLS-Group
security practices across the enterprise Stay abreast of industry trends, frameworks, and regulations (e.g., GDPR, ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, SP800-53, PFMI, CPMI ISOCO and FFIEC handbook, SABSA) to ensure the organization is proactive in addressing emerging security threats and compliance challenges Foster relationships with key functional … and infrastructure domains. Extensive experience working with senior leadership and stakeholders to drive strategic security initiatives, influencing decisions at the enterprise level. Strong understanding of security frameworks, including NIST CSF, SABSA etc, and the ability to apply them in diverse environments. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information … Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NISTSP800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and services Our commitment to employees: At CLS, we celebrate diversity and consider this More ❯
operational excellence. Role Overview As a Security Architect, you will be responsible for enhancing the security posture of DXC's client services by ensuring full compliance with the NIST800-53 framework. You will evaluate existing security controls, map them to NIST standards, and develop new controls and documentation to improve compliance and overall … security. Key Responsibilities Architect and oversee the implementation of security solutions in compliance with NIST800-53. Work closely with the customer's architecture team to develop and implement security strategies. Identify security risks, define security requirements, and recommend remediation strategies. Develop and enforce security policy standards to ensure compliance with customer security requirements. Provide … solutions. Support incident investigations and security control enhancements. Ensure security architectures align with industry frameworks such as TOGAF and SABSA. Gap Analysis Report: Assessing current security posture against NIST800-53. Security Control Mapping: Documenting alignment of existing controls with compliance frameworks. Implementation Plans: Designing and deploying new security controls. Updated Security Documentation: Policies, procedures More ❯
Manchester, England, United Kingdom Hybrid / WFH Options
Capgemini Invent
L1/2, NIST, ISO27001, COBIT, etc.). Operational Technology – Ensure the security of critical infrastructure aligns with industry standards and regulatory requirements (e.g. NISTSP800-82, CAF, DPA 2018, etc.). As An Experienced Consultant In The Business You’ll Help Set The Direction, Grow Our Business, Model Our Values And Behaviours … is as follows: Working with SOC teams, OT Security, Security Architecture, Security Op Model Transformation projects and Cybersecurity Assessments. Familiarity with core Cybersecurity frameworks and industry frameworks (e.g., NIST CSF, ISO27001, CIS Critical Controls), regulations (e.g., NIS2) and financial regulations (e.g., DORA, FCA, Bank of England, etc.). Have experience (or knowledge) in securing Gen AI for business More ❯
and common security elements Understanding the best practices, control frameworks, and applicable legal and regulatory requirements data privacy and breach notification laws, ISO 27001, NIST CSF and SP800-53, CIS, CSA CCM, PCI DSS, etc. Demonstrable strong leadership skills, including the ability to develop, mentor and coach others Experience in working in large or federated More ❯
on network and information security procedures. Collaboration: Work with the IT team to maintain security configurations and disaster recovery plans. Expertise and knowledge of the security framework includes NIST800, ISO 27001, cybersecurity guidelines from PRA, FCA and ICO, familiar with GDPR regulation. Strong knowledge of IT internal control and audit, information security officer is highly More ❯
security restructure programmes, projects of both a GRC and technical nature alongside frameworks such as ISO27001/2:2005/13, DORA, NIS 2, PCI-DSS, GDPR-DPO, NIST CSF SP800-53, PSD-2, FCA/PRA, and MS Azure. Ownership of Strategic, Operational, and Tactical IT Security and Risk Management, technical and legislative mandates ranging from planning More ❯
controls (e.g., Vulnerability Management, Incident Response, Network Security) Analytical and organizational skills are necessary to conduct audits Strong issue writing and workpaper documentation skills Knowledge and awareness on NIST800-53 controls, NIST Cyber Security Framework, SANS and Center for Internet Security (CIS) is a plus Knowledge of technology controls around Cloud Computing reviews More ❯
consulting and implementation services include: Strategy & transformation On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF Supplier assurance PCI, PA & P2PE Incident response planning Card production audits Cyber security review SOC advisory & implementation XDR consulting & implementation Alongside our core services, we have a range … and track record in MS Purview information protection & Data Loss Prevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Can work with control frameworks such as NIST800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and other frameworks as requested by clients. Able to always deliver projects within time and … learn new skills and disciplines. Knowledge Experience in two or more of the below: Excellent attention to detail and documentation. Industry standards such as ISO 27001 Series, GDPR, NIST, PCI DSS. Customer facing experience at senior levels. CISSP/CISM/ISO 27001 LA or LI/PCI DSS QSA would be an advantage Outputs Ability to successfully More ❯
consulting and implementation services include: Strategy & transformation On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF Supplier assurance PCI, PA & P2PE Incident response planning Card production audits Cyber security review SOC advisory & implementation XDR consulting & implementation Alongside our core services, we have a range … and track record in MS Purview information protection & Data Loss Prevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Can work with control frameworks such as NIST800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and other frameworks as requested by clients. Able to always deliver projects within time and … learn new skills and disciplines. Knowledge Experience in two or more of the below: Excellent attention to detail and documentation. Industry standards such as ISO 27001 Series, GDPR, NIST, PCI DSS. Customer facing experience at senior levels. CISSP/CISM/ISO 27001 LA or LI/PCI DSS QSA would be an advantage Outputs Ability to successfully More ❯
consulting and implementation services include: Strategy & transformation On-demand virtual roles Data discovery and mapping Risk advisory and assurance Continuity/Resilience Data privacy and GDPR ISO 27001 & NIST CSF Supplier assurance PCI, PA & P2PE Incident response planning Card production audits Cyber security review SOC advisory & implementation XDR consulting & implementation Alongside our core services, we have a range … track record in MS Purview information protection & Data Loss Prevention (DLP) Experienced in Azure Resource Manager template, Git, KQL, PowerShell Ability to work with control frameworks such as NIST800-53, SANS Top 20 CSC, ISO 27001, Risk Assessment (ISO27005), Privacy and other frameworks as requested by clients. Able to deliver projects within time and budget … learn new skills and disciplines. Knowledge Experience in two or more of the below: Excellent attention to detail and documentation. Industry standards such as ISO 27001 Series, GDPR, NIST, PCI DSS. Customer-facing experience at senior levels. CISSP/CISM/ISO 27001 LA or LI/PCI DSS QSA would be an advantage Outputs Ability to successfully More ❯