cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: • Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI’s overall cyber security risk posture. • Operational Security: Assist … in incident response testing, data management, and coordination of cyber security with physical and personnel security teams. • Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. • Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud More ❯
cyber security team. This role offers the opportunity to work across a broad stakeholder base within the UK and Europe, contributing to essential cyber risk management and operational security initiatives. Key Responsibilities As a Cyber Security Operations Analyst, you will play a key role in supporting riskanalysis, security policy implementation, and the Secure by Design framework across Operational Technology (OT) and Information Technology (IT). You will contribute to: * Risk Management: Conduct riskanalysis and interpret first-line operational outputs to support VPI's overall cyber security risk posture. * Operational Security: Assist … in incident response testing, data management, and coordination of cyber security with physical and personnel security teams. * Human Risk Management: Develop cyber security awareness materials, manage phishing protection programmes, and handle external threat intelligence. * Software Development & Cloud Security: Support the integration of security policies into DevOps processes and cloud More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
engagement for all projects ensuring that the department's security design standards are adhered to. This challenging role incorporates aspects of security architecture, cyber risk management and cyber security policy. As a Principal Security Architect, you will also provide an 'out-reach' to advise on security requirements and solutions … for exploiting emerging technologies and support the development of architectures, patterns and approaches to support their safe use in accordance with the department's risk appetites. At all times your goal is to help ensure delivery of systems that meet the desired business outcomes with security decisions and controls … being proportionate to the risk appetite. You will build effective partnerships with diverse teams across multiple locations and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (National Cyber Security More ❯
and execute verification plans, protocols, and reports. Ensure all system verification activities comply with regulatory standards (e.g., FDA, ISO 13485, IEC 62304). Conduct riskanalysis and ensure risk management activities are current and comprehensive. Developing Test Procedures Design and develop test cases and procedures based on … and issues to stakeholders effectively. Maintaining Documentation Keep thorough records of all verification activities and results. Ensure traceability of verification activities to requirements and risk management documentation. Education A Bachelor's or Master's degree in Engineering (Biomedical, Electrical, Mechanical, Software, or a related field). Experience More ❯
someone with a solid technical background who is willing to take on a broader remit and take ownership of security auditing, policy enforcement, and risk mitigation across a group of companies. PRINCIPLE ACCOUNTABILITIES Monitor security threats and vulnerabilities, proactively identifying and mitigating risks Lead incident response efforts, investigating security … understanding of cloud security (AWS, Azure, Google Cloud), network security, and endpoint protection Hands-on experience with SIEM tools, intrusion detection, firewalls, and threat analysis Knowledge of identity and access management (IAM), zero-trust architectures, and encryption techniques Experience conducting vulnerability assessments, and riskanalysis Strong analytical More ❯
operations. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … stakeholder engagement skills, with the ability to liaise confidently across engineering, programme delivery, assurance, and regulatory audiences. Ability to produce high-quality documentation, including risk assessments, technical guidance, assurance artefacts, and audit-ready deliverables. Familiarity with UK cybersecurity regulations and sector guidance, including the NIS Regulations, CNI expectations, and More ❯
systems. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … evidence preparation, control mapping, and client/regulator interaction. Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments. Proven track record in delivering cybersecurity outcomes within More ❯
systems. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … evidence preparation, control mapping, and client/regulator interaction. Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments. Proven track record in delivering cybersecurity outcomes within More ❯
systems. Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to … OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threat modelling, riskanalysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/IT systems … evidence preparation, control mapping, and client/regulator interaction. Understanding supply chain security considerations, including software and hardware assurance, secure procurement, and third-party risk management. Experience Experience in cybersecurity roles, focused on operational technology (OT), control systems, or industrial environments. Proven track record in delivering cybersecurity outcomes within More ❯
Area Commuter Rail project and will support other projects as the need arises. We'll look to you for system and sub-system cybersecurity risk analyses, design, and assurance activities. Specifically: Analysis of project security needs against applicable standards and regulations to identify target security levels and risk … another industrial sector. Knowledge of IACS security standards and a working knowledge of information security standards such as ISO2700x, NIST etc. Familiarity with security risk management and IACS reference security architectures. A relevant cybersecurity certification. On a more personal level, you will also need to be: Adaptable and open More ❯
focused on the power plants, delivering security improvements across sites. Support power station sites in the operation of the Information Security Management System (ISMS) (risk analyses, audits, selection and monitoring of measures, effectiveness checks, etc.) Convert security requirements into processes, technical documentation and work instructions. Conducting site cyber riskMore ❯