Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
incidents. What We're Looking For : Proven experience as a Security Architect or similar role in the engineering sector. Strong knowledge of security frameworks, standards, and best practises (e.g., NIST, ISO 27001). Proficiency in security tools and technologies (e.g., firewalls, intrusion detection systems). Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
incidents. What We're Looking For : Proven experience as a Security Architect or similar role in the engineering sector. Strong knowledge of security frameworks, standards, and best practises (e.g., NIST, ISO 27001). Proficiency in security tools and technologies (e.g., firewalls, intrusion detection systems). Excellent analytical and problem-solving skills. Ability to communicate complex security concepts to non-technical More ❯
security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusion detection systems, encryption, and other security technologies and industry standardsand frameworks such as NIST, ISO 27001, and IEC 62443. Effective communication skills so that you can explain complex security concepts to non-technical stakeholders and for collaborating with other IT and engineering professionals andMore ❯
security, application security, identity management, cloud security, and endpoint security including knowledge of firewalls, intrusion detection systems, encryption, and other security technologies and industry standardsand frameworks such as NIST, ISO 27001, and IEC 62443. * Effective communication skills so that you can explain complex security concepts to non-technical stakeholders and for collaborating with other IT and engineering professionals andMore ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
and frameworks . Provide advisory guidance to cross-functional teams during AI/ML system design and deployment. Contribute to regulatory compliance efforts (EU AI Act, GDPR, ISO 27001, NIST AI RMF, etc.). Support incident response teams in handling AI/ML-related security events. Your Profile Wed love to hear from you if you have: Strong experience as More ❯
security architecture and engineering within Defence or Critical National Infrastructure. Knowledge of risk management methodologies and security assurance. Desirable Skills Experience with IEC/ISA 62443 standards. Familiarity with NIST 800-82, ISO 27001, and Defence Security standards (e.g., JSPs). Previous MOD/Defence and or Nuclear experience. Due to the nature and urgency of the role, candidates are More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
Bash, PowerShell). Previous experience in defence, government, or secure environments. Desirable Skills Industry-recognised network certifications (e.g. CCNA, CCNP, JNCIP, CompTIA Network+). Exposure to security frameworks (ISO27001, NIST, MOD standards) If you are interested in this role or wish to apply, please feel free to reply to this advert with your CV or call me on (phone number More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
/ML systems and pipelines . Ensure solutions comply with European financial services regulations (GDPR, PSD2, DORA, NIS2) as well as emerging AI governance frameworks (e.g., EU AI Act, NIST AI RMF). Integrate security into DevSecOps and MLOps pipelines , including CI/CD and infrastructure-as-code environments. Drive adoption of Zero Trust principles, encryption standards, IAM policies, and … Management (IAM) Network and Application Security Data Protection & Encryption Kubernetes, Containers, and DevSecOps/MLOps practices SIEM, logging, and monitoring Zero Trust architectures Skilled in applying frameworks such as NIST CSF, ISO 27001, PCI DSS, CSA CCM, NIST AI RMF . Hands-on with tools for vulnerability management, secrets management, CSPM, and CWPP . Relevant certifications strongly preferred (CISSP, CCSP More ❯