and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetration testing, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain independence and objectivity in More ❯
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
MOD, HMG, and NCSC frameworks and accreditations. Engage with national authorities (e.g., NCSC) to support accreditations and assurance. Oversee security testing activities (e.g., ITHC, vulnerability assessments). Maintain security risk records, support audits, and provide regular reporting. Promote a culture of high standards in information assurance and risk management. More ❯
and staying up to date with HMG, MoD, and industry best practices. Supporting solution architects in applying secure design principles and ensuring compliance. Overseeing vulnerability assessments and coordinating formal system accreditations. Acting as a key interface with government technical authorities. What We're Looking For: Essential: Certified Information Systems More ❯
with internal teams and clients to deliver exceptional IT services. - Bootstrap the new IT arm, actively engaging in hands-on tasks as needed. - Conduct vulnerability assessments and manage incident response and monitoring. - Set up and configure consoles and development kits (Sony, Microsoft, Nintendo) with multiple network connections. - Negotiate SLAs More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Identify, manage, and mitigate security vulnerabilities in the delivery of your project(s) to minimise the risks, including use of IT Health Check and Vulnerability Assessments as required. Advise managers and produce recommendations for the implementation of security controls Assess the performance and effectiveness of security elements as directed More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Get Staffed Online Recruitment
for their client's entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme. Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
Shenley Brook End, Buckinghamshire, United Kingdom
Fortis Cyber Security
for our client s entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme. Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
for their client's entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme. Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
responsible for our clients entire certification journey from understanding their requirements/vulnerabilities, assessing their compliance against the Cyber Essentials scheme requirements, completing remote vulnerability scans and workstation assessments, all the way through to conducting CE audits and authoring/presenting final reports. Additionally, you will also be involved … the potential to lead/evolve into IT Security, Penetration Testing, and Information Governance specialisations. Key Responsibilities: Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems, and controls to ensure compliance to the Cyber Essentials Scheme Conduct in-depth vulnerability assessments … to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on implementing and enhancing cybersecurity controls to become compliant to CE. More ❯
efficacy of the security features and tools. Provide an interface between client and the National Technical Authority (NCSC). Oversee IT Health Check and Vulnerability Assessments by approving scope of tests and overall testing programme Record and track assessments of information capability and projects supporting reviews and audits as … necessary. Provide technical risk assessment analysis. Develop the professionalism of Information Risk Management within the business. Attend project Security Working Groups and manage when appropriate. Due to the nature and urgency of this post, candidates holding or who have held high level Developed Vetting clearance in the past are More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
RSM
team. Working alongside our experienced team of specialists, you'll be delivering offensive security services including digital footprint reconnaissance, social engineering, penetration testing and vulnerability assessments to high profile clients across all industries. The purpose of this role is to deliver our offensive security services including digital footprint reconnaissance … social engineering, vulnerability assessments, penetration testing, threat modelling, cyber-attack simulation exercises, and more to high profile clients across all industries. You'll benefit from ongoing coaching, career mentoring, and be supported by our career pathway. You will have an opportunity to continue to develop market leading skills across More ❯