clearance, or is willing to undergo the security vetting process; Strong academics, including a minimum of 2.1 degree or equivalent experience Familiarity with information security frameworks such as ISO27001, NIST etc; Willingness to operate as part of an 'on-call roster', travelling to assist our UK and EMEA clients when required in an incident management capacity; Connect to your business More ❯
security events and incidents by leading investigations, coordinating remediation efforts, and driving improvements after incidents. Maintain ongoing compliance with relevant security and data privacy standards (e.g., GDPR, ISO 27001, NIST, CCPA) through diligent documentation, effective policies, and audit preparedness. Work collaboratively with global IT, Cloud, and Security Operations Centre teams to protect company systems and efficiently tackle any emerging challenges. … cloud environments. Bachelor's degree in Computer Science, Information Technology, or Information Security , or equivalent practical experience. Familiarity with key security frameworks andstandards such as PCI, ISO 27001, NIST, and CIS, along with experience supporting audits and compliance initiatives. Strong understanding of networking protocols, systems architecture , and secure key management (e.g., PCI digital keys, security access modules). Hands More ❯
Procurement teams Awareness of information security related law and regulations such as GDPR and NIS Regulations. Worked with or awareness of cyber security frameworks and standards. I.e. NCSC CAF, NIST, ISO 2700x series, CIS. Certifications such as CRISK/CISM/COMPTIA Security+ - However certification’s are not a substitute for real world experience. Experience of interpreting policies, procedures, standardsMore ❯
Preston, Lancashire, England, United Kingdom Hybrid / WFH Options
Nextech
with sales, delivery, and support teams. Desirable: * Certifications from Microsoft, VMware, Cisco, Fortinet, Veeam, or Ubiquiti.* Hands-on Azure architecture and migration experience.* Familiarity with security frameworks (Cyber Essentials, NIST, CIS).* Understanding of modern networking (SD-WAN, SASE, ZTNA).* Experience within an MSP or consultancy environment . Why You'll Love Working Here: * Work on diverse, cutting-edge More ❯
teams etc. Awareness of information security related law and regulations such as GDPR and NIS Regulations. Worked with or awareness of cyber security frameworks and standards. I.e. NCSC CAF, NIST, ISO 2700x series, CIS. Certifications such as CRISK/CISM/COMPTIA Security+ - However certification’s are not a substitute for real world experience. Experience of interpreting policies, procedures, standardsMore ❯
preston, lancashire, north west england, united kingdom
Apply Recruitment
teams etc. Awareness of information security related law and regulations such as GDPR and NIS Regulations. Worked with or awareness of cyber security frameworks and standards. I.e. NCSC CAF, NIST, ISO 2700x series, CIS. Certifications such as CRISK/CISM/COMPTIA Security+ - However certification’s are not a substitute for real world experience. Experience of interpreting policies, procedures, standardsMore ❯
work closely with both internal and external stakeholders across Legal, Risk & Audit, Procurement, and IT to embed strong governance and maintain alignment with leading standards such as ISO 27001, NIST CSF, and GDPR. The position combines both strategic oversight and hands-on delivery, providing clear visibility of risks and driving measurable improvements in security maturity. This role is majority onsite … PCI-DSS environment Develop, maintain, and evolve the cyber governance and compliance framework. Define and manage information and cyber security policies, standards, and procedures. Ensure alignment with ISO 27001, NIST CSF, GDPR, and other relevant regulations. Partner with internal teams to integrate governance and compliance into daily operations. Support policy reviews, updates, and communication across business units. Risk Management & Assurance More ❯
OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions ofMore ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
a good experience working within IT/OT in an operational or corporate environment with a good knowledge of control frameworks such as ISO27001, ITIL (Information Technology Infrastructure Library), NIST, SABSA and IEC 62443 and cyber kill chain. You ll have a good knowledge of Risk Management Methodologies such as ISO27005 and IRAM2/security frameworks NIST/NIS CAF More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
address any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring … and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication andMore ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
address any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring … and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication andMore ❯
Longridge, Lancashire, United Kingdom Hybrid / WFH Options
Sky
address any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring … and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication andMore ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
address any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring … and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication andMore ❯
and experiences An understanding of threat modelling frameworks and processes e.g. PASTA, OWASP Threat Dragon, DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007 Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA More ❯