Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST800-30, NIST800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST800-30, NIST800-53) Please reach out to Lewis Dunn @ ARM if you are interested or simply have some questions - E: or DD: Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is a More ❯
Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST800-30, NIST800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST800-30, NIST800-53) Please reach out to Lewis if you are interested or simply have some questions - E: or DD: (phone number removed) Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited ("ARM"). ARM is More ❯
security practices across the enterprise Stay abreast of industry trends, frameworks, and regulations (e.g., GDPR, ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, SP800-53, PFMI, CPMI ISOCO and FFIEC handbook, SABSA) to ensure the organization is proactive in addressing emerging security threats and compliance challenges Foster relationships with key functional … and infrastructure domains. Extensive experience working with senior leadership and stakeholders to drive strategic security initiatives, influencing decisions at the enterprise level. Strong understanding of security frameworks, including NIST CSF, SABSA etc, and the ability to apply them in diverse environments. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information … Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NISTSP800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and services Our commitment to employees: At CLS, we celebrate diversity and consider this More ❯
mission-critical systems. Analyze and validate secure boot flows, cryptographic controls, and firmware integrity mechanisms. Conduct threat modeling and traceability analysis against defense-aligned frameworks (e.g., NISTSP800-53, NIST RMF, Common Criteria, NATO NIAG, ISO 15408). Evaluate usage of post-quantum and hybrid cryptographic algorithms in secure communication and key management … service meshes). Hands-on experience performing design-level security reviews and verifying implementation alignment with defined threat models. Familiarity with defense-specific cybersecurity requirements (e.g., DFARS/NIST800-171, CMMC, MIL-STD-882, STANAGs). Understanding of tactical system constraints and secure integration challenges in C4ISR, unmanned systems, or EW contexts. Exposure to Zero More ❯
development, deployment, and support phases. Qualifications 7+ years in IT security, with a focus on product and cyber security design Strong understanding of industry standards and frameworks (e.g., NIST800-53, NIST CSF, NIST800-171, IEC 62443, ISO 27001) Proficiency in network, application, and database security architecture Hands-on More ❯
best-in-class security and disaster recovery solutions. What You'll Do: AWS cloud migration & build scalable infrastructure Automate deployments & CI/CD pipelines Ensure security & compliance with NIST800-53 Manage containerization (Docker) Implement disaster recovery & high availability solutions Lead the migration of on-premises infrastructure to AWS , ensuring minimal disruption and maximum efficiency Design … AWS services including EC2, S3, RDS, Lambda, VPC, IAM, CloudWatch, and CloudTrail Monitor system performance, conduct audits, and troubleshoot infrastructure issues Implement security and compliance measures aligned with NIST800-53 Automate infrastructure provisioning using Terraform, CloudFormation, or AWS CDK Optimize cost-efficiency of cloud resources DevOps & Automation (40%) Design, implement, and manage CI/CD …/CD tools (Jenkins, GitLab CI/CD, AWS CodePipeline) Strong scripting skills in Python, Bash, or PowerShell Solid understanding of networking, cloud security best practices, and compliance (NIST800-53) Experience with monitoring & logging tools (Prometheus, ELK Stack, Splunk) Excellent problem-solving and communication skills Location: Our office is located in Portsmouth, NH but we More ❯
position is critical to ensuring our products meet the highest standards of security by design. The successful candidate will be expected to bring deep, hands-on experience with NIST cybersecurity standards - this is essential -as well as a strong working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you … controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security … incident response efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST frameworks (including NIST800-30, NIST800-53) - non-negotiable Working knowledge of DefStan 05-138 (Issue 3) and DefStan More ❯
position is critical to ensuring our products meet the highest standards of security by design. The successful candidate will be expected to bring deep, hands-on experience with NIST cybersecurity standards - this is essential -as well as a strong working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you … controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security … incident response efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST frameworks (including NIST800-30, NIST800-53) - non-negotiable Working knowledge of DefStan 05-138 (Issue 3) and DefStan More ❯
position is critical to ensuring our products meet the highest standards of security by design. The successful candidate will be expected to bring deep, hands-on experience with NIST cybersecurity standards - this is essential -as well as a strong working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you … controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security … incident response efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST frameworks (including NIST800-30, NIST800-53) - non-negotiable Working knowledge of DefStan 05-138 (Issue 3) and DefStan More ❯
position is critical to ensuring our products meet the highest standards of security by design. The successful candidate will be expected to bring deep, hands-on experience with NIST cybersecurity standards - this is essential -as well as a strong working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you … controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security … incident response efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST frameworks (including NIST800-30, NIST800-53) - non-negotiable Working knowledge of DefStan 05-138 (Issue 3) and DefStan More ❯
position is critical to ensuring our products meet the highest standards of security by design. The successful candidate will be expected to bring deep, hands-on experience with NIST cybersecurity standards - this is essential -as well as a strong working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you … controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security … incident response efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST frameworks (including NIST800-30, NIST800-53) - non-negotiable Working knowledge of DefStan 05-138 (Issue 3) and DefStan More ❯
position is critical to ensuring our products meet the highest standards of security by design. The successful candidate will be expected to bring deep, hands-on experience with NIST cybersecurity standards - this is essential -as well as a strong working knowledge of Defence Standards DefStan 05-138 Issue 3 and DefStan 05-139 Issue 1 . If you … controls throughout the product development lifecycle Conduct detailed threat modelling and risk assessments using recognised tools Lead the implementation of risk management strategies based on industry best practices (NIST, ISO) Work closely with development teams to ensure secure-by-design principles are followed Identify and propose mitigations for security vulnerabilities in solution architectures Maintain and evolve internal security … incident response efforts and coordinate remediation actions where needed Serve as a subject matter expert on product and application security to internal stakeholders Key Requirements: Extensive experience applying NIST frameworks (including NIST800-30, NIST800-53) - non-negotiable Working knowledge of DefStan 05-138 (Issue 3) and DefStan More ❯
technical concepts and assessment results verbally and in written reports in simple terms; Knowledge of IEC 62443, MITRE ATT&CK for ICS, NIST CSF, NISTSP800-82 and relevant regulations in EU and UK; Interest and ability to write exciting whitepapers and publications ; A supportive and a proactive personality , you know how to More ❯
be responsible for overseeing Security Operations and ensuring the highest level of security for the customer. The Cyber Security Consultant leads detailed risk assessments, implements industry-standard frameworks (NIST, NCSC, NIS2), and actively manages SIEM/XDR tools such as IBM QRadar, Microsoft Sentinel, and Defender XDR. This role involves deeper client interaction, proactive risk management, and advanced … in cybersecurity). Responsibilities: Manage and strengthen client relationships with regular strategic interactions. Lead comprehensive cybersecurity risk assessments aligned to industry standards. Conduct environment reviews, ensuring compliance with NIST frameworks and related standards. Oversee and implement SIEM/XDR deployments, custom rule development, and incident response processes. Provide guidance on best practices for SIEM/XDR and threat … detection. Conduct security posture reviews and gap analysis. Prepare reports and present findings to client stakeholders. Location London, UK Good understanding of cybersecurity frameworks (NIST CSF, NCSC CAF, NIS2, NIST800-30). Good understanding of risk assessment methodologies (NIST800-30). Hands-on experience with SIEM/XDR More ❯
segregation and segmentation for industrial control systems (ICS), SCADA, and IIoT equipment Develop and enforce network segmentation and secure remote access strategies in alignment with IEC 62443 and NIST800-82. Evaluate and integrate security monitoring and threat detection solutions (e.g., Armis, Nozomi, Microsoft Defender for IoT). Assess risks and recommend security controls for … logging, monitoring, and incident response strategies for Azure workloads using Microsoft Defender for Cloud, Sentinel, and Log Analytics. Ensure compliance with relevant industry security frameworks (e.g., ISO 27001, NIST CSF, CIS Benchmarks) in cloud environments. Security Governance & Change Control Board (CCB) Represent the security team in the Change Control Board (CCB) and review architecturally significant changes from a … in managing high-performance teams and complex projects. Experience with Zero Trust Architecture (ZTA) and Secure Access Service Edge (SASE). Security Frameworks & Compliance Experience with IEC 62443, NIST800-82, ISO 27001, NIST CSF, CIS Controls. Microsoft technologies including Defender for Cloud, M365 Defender, MS Sentinel Collaboration & Leadership Bachelor's degree in information More ❯
focus, ensuring appropriate documentation and knowledge sharing.Proven experience of architecture design analysisExperience of NCSC's Cyber Assurance Framework (CAF), NIST Cyber Security Framework (CSF), NISTSP800-53, ISO 27001 and HMG regulations and other departmental IT in defence and securityAbility to work in small teams, highly specialised technology areas across diverse projectsExperience of More ❯
monitoring, alerting, and auditability solutions to support a secure, multi-cloud, geo-distributed workforce. Design, implement, and continuously improve Roku's Zero Trust Architecture, aligning with NISTSP800-207 and SP 1800-35 guidance. Collaborate with IT, Networking, and Security teams to troubleshoot identity-related issues and support global infrastructure initiatives. Identify and implement automation … GCP is a plus Solid understanding of SaaS platforms and their identity integration Understanding of Zero Trust Architecture principles Familiarity with IT security frameworks and compliance standards (e.g., NIST, GDPR, SOC 2, PCI DSS, HIPAA) Awareness of logging, monitoring, and alerting practices related to identity and access events Basic understanding of email security and DNS Backup and recovery More ❯
principles and ability to bake security in from concept through production. Practical experience implementing the NCSC or NIST Cybersecurity Framework (CSF) and/or NISTSP800-53 controls. Demonstrable understanding of ISO/IEC 27001 requirements and hands-on experience mapping technical controls to ISO clauses, supporting auditing and documentation. Ability to translate More ❯
or equivalent professional certification. Experience: 3+ years in a Cyber/Engineering role. Involvement in MOD accreditation and secure by design processes. Knowledge of standards like NISTSP800-30, 37, 53. Experience managing risks and services in compliance with regulations. Experience with software, firmware, and hardware security. Conducting risk assessments, threat modelling, vulnerability analysis. Overseeing More ❯
AlertMedia platform Experience with Conducttr platform Familiarity with Salesforce Shield, Event Monitoring, and encryption features Understanding of business continuity and disaster recovery frameworks (e.g., ISO 22301, NISTSP800-34, FFIEC) Working knowledge of data governance, compliance (e.g., GDPR, HIPAA), and audit readiness Soft Skills: Excellent documentation, communication, and problem-solving skills Please note you must More ❯
Working On: ️ Managing and enforcing information security policies, procedures, and standards to safeguard organizational data ️ Conducting risk assessments and ensuring compliance with relevant security frameworks (e.g., ISO 27001, NIST, GDPR) ️ Performing audits and security assessments to identify vulnerabilities and recommending appropriate mitigations ️ Collaborating with other teams to implement and maintain secure information management systems ️ Providing expert guidance on … experience as an Information Assurance Specialist or in a similar role focused on data protection and compliance ️ Strong understanding of information assurance frameworks (e.g., ISO 27001, NISTSP800-53, COBIT) ️ Experience with security assessments, audits, and vulnerability management ️ Knowledge of regulatory standards such as GDPR, HIPAA, and PCI-DSS ️ Certifications such as CISSP, CISM, or More ❯
license management, quality inspections, and certification processes like FRACAS/CAP and corrective actions. Our architecture emphasizes business process alignment and compliance with cybersecurity standards including NISTSP800-171, CMMC, ITAR . We aim to develop BNN , a generative AI model that provides detailed insights into operational and analytical processes, ensuring compliance with DFARS and More ❯
like FRACAS/CAP and corrective actions. Our architecture emphasizes not only functionality but also aligns with business processes and government policies, including cybersecurity standards like NISTSP800-171, CMMC, and ITAR compliance. We aim to leverage Generative AI models to analyze data, identify knowledge gaps, and maintain operational and regulatory compliance, especially with DFARS More ❯
Job Title: Security Governance Lead – NIST & Archer Expertise Location: London About the Role: Albany Beck is seeking a highly skilled Security Governance Lead to support a key financial services client in advancing its information security governance capabilities. This role requires deep expertise in NIST frameworks and Archer GRC, as well as strong leadership in centralising security … stakeholder engagement. Required Experience and Skills: Proven experience in a security governance or risk management leadership role within the financial services or consulting industry. Strong working knowledge of NIST frameworks (e.g., NIST CSF, NIST800-53). Hands-on experience with RSA Archer GRC platform, particularly in managing controls, risks, and compliance More ❯
Job Title: Security Governance Lead – NIST & Archer Expertise Location: London About the Role: Albany Beck is seeking a highly skilled Security Governance Lead to support a key financial services client in advancing its information security governance capabilities. This role requires deep expertise in NIST frameworks and Archer GRC, as well as strong leadership in centralising security … stakeholder engagement. Required Experience and Skills: Proven experience in a security governance or risk management leadership role within the financial services or consulting industry. Strong working knowledge of NIST frameworks (e.g., NIST CSF, NIST800-53). Hands-on experience with RSA Archer GRC platform, particularly in managing controls, risks, and compliance More ❯