of JSP processes Supporting the Development and maintenance of our Information Security Management System (ISMS) to best support the Company’s activities, including RiskManagementandAccreditation Document Sets (RMADS) and Company Security Policies. You will be a strong communicator working with all levels of the business from Junior Security Analysts to Senior Information Security Manager to put policies andMore ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
/physical security controls within the risk/cost/benefit space. Security Documentationmanagement to include - but not limited to - review and update of related IA documents including RMADS, Security Cases, SyOPs, Business Impact Assessments, Data Protection Impact Assessments, Risk Registers, DART/Oculus entries, Risk Balance Cases, Information Asset Owner forms, Supplier Assurance Questionnaires. Experienced in relevant Security More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incident response and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. Identify and mitigate security risks in solution architectures. Create security documentation (e.g., RMADS, Security Assurance Documents). Support incident response and remediation efforts for security breaches. Provide security guidance and training to teams across the organization. Key Skills & Experience: Strong knowledge of security More ❯
deliverables to meet the needs of Navy Digital customers, as well as key MoD and RN stakeholders, including: High and low-level security requirements. RiskManagement & Accreditation Document Set (RMADS). Legal and regulatory artefacts applicable to the MoD e.g., Data Privacy Impact Assessments (DPIA). Risk Balance and Security Cases. The provision of security support enables the rapid development More ❯
of IT/security experience in the Defence Sector Demonstrable experience of one or more of the following areas: MoD Security GRC/Assurance Processes: Secure by Design andRMADs/Risk Assessment Cloud security architecture documentation, s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting More ❯
In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, riskmanagement, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery More ❯
In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, riskmanagement, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery More ❯
swindon, wiltshire, south west england, united kingdom
Ncounter Technology Recruitment
In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, riskmanagement, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery More ❯
security strategy and delivery across mission-critical ICT systems. Key Responsibilities: Lead cyber security services across large-scale, complex Defence programmes Shape and manage cyber strategy, risk, and compliance (RMADS, JSP604, JSP440, SbD) Provide expert guidance on PKI, identity management, SIEM, vulnerability scanning, and cryptography Oversee incident response and security service delivery in ITIL-aligned environments Influence suppliers and stakeholders More ❯
Experience Required: Developed Vetting (DV Clearance) and ability to work onsite 4-5 days p/w in Hampshire Demonstrable experience aligning site implementations with business security policies andRMADS, based on SAC advice. Strong ability to conduct hardware and software tests, utilising SMEs and external resources as required. Knowledge of ICT infrastructure, including cabling, equipment, hardware, and software. Proven More ❯
Experience Required: Developed Vetting (DV Clearance) and ability to work onsite 4-5 days p/w in Hampshire Demonstrable experience aligning site implementations with business security policies andRMADS, based on SAC advice. Strong ability to conduct hardware and software tests, utilising SMEs and external resources as required. Knowledge of ICT infrastructure, including cabling, equipment, hardware, and software. Proven More ❯