cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Contribute to the production and review of assurance artefacts, including security cases, risk registers, control implementation … operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/ More ❯
Immingham, Lincolnshire, North East, United Kingdom Hybrid / WFH Options
Rullion Limited
Responsibilities Lead cyber risk assessment activities across IT and OT environments, correlating outputs into strategic risk tracking. Manage the cyber security risk toolkit , including threatmodelling, attack trees, and scenario-based exercises. Develop and implement cyber security policies, processes, and staff training aligned with Secure by Design principles. … Oversee first-line security operations , including outsourced 24/7 SOC management . Define and manage cyber threat intelligence requirements . Provide cyber risk consultancy for business development projects, ensuring regulatory compliance. Contribute to supply chain risk management , assessing supplier security risks. Act as Deputy NIS Reporting Officer (NRO More ❯
systems.Define cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms.Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards.Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to the client's … of operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures.Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures.Demonstrated ability to define, implement, and assure security controls across complex OT/IT More ❯
cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to the client … operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/ More ❯
cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to the client … operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/ More ❯
cybersecurity requirements within the client's environment, including rail-specific systems, legacy OT, and modern industrial platforms. Support developing and delivering security risk assessments, threat models, and control frameworks following the relevant standards. Provide expertise on OT protocols, SCADA systems, field devices, and network architecture relevant to the client … operational technology (OT) environments, including SCADA systems, field devices, industrial protocols, and control network architectures. Firm grounding in cybersecurity principles for critical infrastructure, including threatmodelling, risk analysis, defence-in-depth, and zero-trust architectures. Demonstrated ability to define, implement, and assure security controls across complex OT/ More ❯
complex infrastructure environments A strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as ThreatModelling, Incident Response, Penetration Testing (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able More ❯
optimize scalable, secure, and compliant software solutions for medical devices and connected health applications. Ensure adherence to IEC 62304, FDA, and cybersecurity regulations, addressing threat modeling, secure coding practices, and risk management. Work with cross-functional teams to architect cloud solutions, ensuring performance, scalability, security, and compliance. Implement cloud … Compliance Ensure secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT and networking concepts. Confident writing SIEM queries and performing threat-hunting. Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports … clients. Assisting with training and support for our junior analysts. Proactively suggesting improvements for existing SIEM alarms and developing new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real-time visibility for clients and stakeholders. Onboarding new clients, including More ❯
Derby, Derbyshire, United Kingdom Hybrid / WFH Options
risual Limited
and maintain strong relationships with clients, becoming a trusted advisor. Strong understanding of foundational IT and networking concepts Confident writing SIEM queries and performing threat-hunting Excellent communication skills, both written and oral, to a range of audiences, including senior management. Responsibilities Compiling and presenting high quality monthly reports … clients. Assisting with training and support for our junior analysts Proactively suggesting improvements for existing SIEM alarms and develop new use-cases based on threat intelligence and client threat models. Creating and improving SOC dashboards to give real time visibility for clients and stakeholders Onboarding new clients, including More ❯