Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
of incident response workflows, timelines, and action items for continuous improvement. Compliance and Risk Management: Ensure all incident response activities align with industry standards, regulations, and best practices (e.g., NIST, ISO 27001, GDPR, HIPAA). Work with legal and compliance teams to manage incidents within the scope of data privacy laws and regulations. Your Profile Essential skills/knowledge/ More ❯
Profile: Proven senior leadership experience in information, cyber, or data security. CISSP, CISM, or CISA certified (or equivalent). Track record of delivering security programs aligned to ISO 27001, NIST, PCI DSS, and Cyber Essentials Plus. Hands-on experience with cloud platforms (Azure, AWS), on-premise networks, and hybrid architectures. Strong experience in Zero Trust security models. Experienced in security More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
equivalent. Experience in or supporting the higher education sector. Strong understanding of multi-tenant SaaS security. Knowledge of DevSecOps and integrating security in CI/CD pipelines. Familiarity with NIST, CIS Controls, OWASP, and other security frameworks. Awareness of global data protection and multi-jurisdictional privacy requirements. Experience supporting enterprise sales cycles with security expertise and assurance. Benefits: 25 days More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
MOD/GDS Secure by Design Principles Supplier Chain Assurance and Risks. Security related legislation (e.g. GDPR, PCI DSS, ICO requirements). Security Control Frameworks such as ISO 27001, NIST CSF and CIS Controls v8. HMG, NPSA and NCSC security policies, standardsand guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
MOD/GDS Secure by Design Principles Supplier Chain Assurance and Risks. Security related legislation (e.g. GDPR, PCI DSS, ICO requirements). Security Control Frameworks such as ISO 27001, NIST CSF and CIS Controls v8. HMG, NPSA and NCSC security policies, standardsand guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). More ❯
as CyberArk, BeyondTrust, or Delinea Strong understanding of Active Directory, LDAP, and authentication protocols Experience with scripting (PowerShell, Python) for automation and reporting Familiarity with compliance frameworks (ISO 27001, NIST, GDPR) Excellent problem-solving, communication, and documentation skills Desirable Skills/Experience: Although not essential, the following skills are desired by the client: Preferred Qualifications Relevant certifications (e.g., CyberArk Defender More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Talent
CEH, CASP+, or SIEM-specific training. Strong knowledge of SIEM, SOAR, EDR, IDS/IPS, NAC, DLP, and related security technologies. Familiarity with frameworks such as MITRE ATT&CK, NIST, CIS, and ISO/IEC 27001/27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensic analysis More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Talent
CEH, CASP+, or SIEM-specific training. Strong knowledge of SIEM, SOAR, EDR, IDS/IPS, NAC, DLP, and related security technologies. Familiarity with frameworks such as MITRE ATT&CK, NIST, CIS, and ISO/IEC 27001/27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensic analysis More ❯
london (city of london), south east england, united kingdom
Persistent Systems
or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security architect or solution designer role. Familiarity with industry standardsand frameworks such as NIST, ISO 27001, TOGAF. Strong documentation skills with experience writing SDDs, architecture diagrams, and technical specifications. Certifications such as CISSP, SABSA, TOGAF, CCSP, or AWS/Azure Security are a plus. More ❯
and experience: Strong expertise in defining, delivering, and supporting robust, resilient, and secure enterprise infrastructure. Experience with IT audits and compliance frameworks such as CIS, PCI DSS, Cyber Essentials, NIST, ISO 27001. An understanding of network security and compliance in regulated environments. Strong networking knowledge (LAN, WAN, DNS, DHCP, VPN, TCP/IP). Proficiency in firewall and load balancer More ❯
or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security architect or solution designer role. Familiarity with industry standardsand frameworks such as NIST, ISO 27001, TOGAF. Strong documentation skills with experience writing SDDs, architecture diagrams, and technical specifications. Certifications such as CISSP, SABSA, TOGAF, CCSP, or AWS/Azure Security are a plus. More ❯
or related field (master’s preferred). Experience in cybersecurity with 3+ years in a security architect or solution designer role. Familiarity with industry standardsand frameworks such as NIST, ISO 27001, TOGAF. Strong documentation skills with experience writing SDDs, architecture diagrams, and technical specifications. Certifications such as CISSP, SABSA, TOGAF, CCSP, or AWS/Azure Security are a plus. More ❯
hands-on security engineering and resilience experience: Hands-on experience in disaster recovery, failover testing, and IT operational resilience. Solid knowledge of business continuity and security frameworks (ISO27001, ISO22301, NIST etc). Proficiency with infrastructure tooling and at least one scripting language (PowerShell or Python preferred). Experience with Nutanix, VMware, Commvault, and hybrid cloud platforms Azure (preferred), AWS or More ❯
Caldecotte, Milton Keynes, Buckinghamshire, England, United Kingdom
Connells Group HQ
and compliance roles. Strong understanding of security best practices, standards, and control frameworks. Knowledge of GRC principles, security auditing, and compliance validation. Experience with security frameworks and regulations (ISO27001, NIST, PCI, GDPR). Excellent communication skills, able to translate technical concepts for diverse audiences. Strong relationship-building and stakeholder management skills. Desirable: Experience in the real estate sector is desirable. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
practices. Experience with security assessment and risk management methodologies. Proficiency in cloud security, particularly with Azure security tools and services. Knowledge of security standardsand frameworks (e.g., ISO 27001, NIST, CIS). Familiarity with security technologies such as firewalls, web proxies/remote access solutions. Experience with ZTNA, CTI, threat modelling is beneficial. Bachelor’s degree in information security, Computer More ❯
IPS. Strong experience working with advanced penetration test and audit tools notably Kali Linux. Knowledge and experience working with at least one of the IT security frameworks such as NIST 800 series/ISO27001/CIS control suites. Offensive Security mindset. Proven excellent customer service skills. Sound relationship management and communication skills. Excellent working knowledge of core Microsoft products; Word More ❯
scanning to operations. Strong interpersonal and communication skills, with the ability to influence and engage stakeholders across technical and non-technical domains. Familiarity with cyber security frameworks such as NIST, ISO-27001, ISF SOGP, and ISMS. Professional certifications such as CISSP, CCSP, TOGAF, or SABSA (advantageous). You bring a collaborative spirit, a proactive approach to risk management, and the More ❯
security controls within cloud-based infrastructure (e.g Azure, AWS, GCP). This may include design, configuration, or protective monitoring. You have experience working with security control frameworks e.g. ISO27001, NIST, CAF or others. You have demonstrable continuous personal development with relevant certifications and accreditations. You have strong interpersonal skills You have UK security clearance at SC or above or are More ❯
from day-to-day operations to major transformation projects. Main responsibilities: Leading security assurance, assessments, and advisory for IT and business projects (both Cloud and On-Prem), aligned to NIST 800-53 standards. Partnering with security architecture and other teams to define and embed security patterns and controls. Developing non-functional security requirements and guiding their integration into solution designs. More ❯
and deployment plans from a security perspective. Compliance & Governance Assist with the implementation of security policies andstandards in Azure. Ensure project deliverables meet compliance frameworks (e.g., ISO 27001, NIST, CIS, GDPR). Support audits and evidence collection for Azure resources. Required Skills & Experience Strong background in a Security Analyst or Cybersecurity project role. Hands-on experience with Azure security More ❯
Strong analytical skills with the ability to interpret technical and procedural evidence. Ability to work collaboratively within a multidisciplinary team. Familiarity with security frameworks andstandards (e.g., ISO 27001, NIST, CIS Controls). Attention to detail and commitment to producing high-quality documentation. What's in it for You Remote/Hybrid working. Career Development: Continuous learning and professional growth. More ❯
security role. Hands-on experience with the Microsoft Security Stack and other leading security tools. Familiarity with network and application firewalls. Working knowledge of security frameworks such as ISO27001, NIST, SOC2, and Cyber Essentials Plus. Experience with Privileged Access Management tools (e.g., CyberArk, Entra, SailPoint). Ability to quickly learn and adapt to new security tools and technologies. Please be More ❯