and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identity management, cloud security, network defence, vulnerabilitymanagement, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers and … delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable, and … Committed to continuous improvement and professional development. Can-do attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
and frameworks (e.g. NIST, ISO 27001, CIS). Experience working with DevOps tools and practices (e.g. JIRA, Confluence, Azure DevOps). Familiarity with enterprise security domains such as identity management, cloud security, network defence, vulnerabilitymanagement, or security operations. Demonstrated ability to work within structured governance and change control frameworks . Experience managing third-party suppliers and … delivery partners. Strong knowledge of project delivery methodologies : PRINCE2 , APM PMQ , Agile/Scrum , or Hybrid delivery models. Understanding of ITIL and service management principles. Experience applying Change Management and Lean Six Sigma techniques is beneficial. Skills & Attributes Excellent leadership, stakeholder management, and communication skills. Strong analytical, problem-solving, and decision-making capabilities. Highly organized, adaptable, and … Committed to continuous improvement and professional development. “Can-do” attitude with strong ownership and accountability. Qualifications Degree in Information Technology, Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note More ❯
Penwortham, Lancashire, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's and Vulnerability Management. - Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. - Detailed knowledge of the More ❯
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
and detailed experience of technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's and Vulnerability Management. - Analytical background, comfortable analysing and interpreting large and complex data sets and articulating the story behind any observations along with providing conclusions and recommendations. - Detailed knowledge of the More ❯
DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. • Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS … DFD) and trust boundaries and is able to create one using information provided about an environment. • Familiar with the functions of relevant authorities e.g. NCSC, NPSA. • An understanding of VulnerabilityManagement, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Experience looking for: • All internal based projects. Backlog of tasks to … work through. • Mitre ATT&CK framework used a lot • Research and understand the tech stacks • Understanding of risk management • Conduct gap analysis • Industry experience or industry-based certifications could be useful • IT degree could be useful • Understand data flow diagrams, pick it up and run with it. More ❯
DREAD, STRIDE-LM, OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS … DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions of relevant authorities e.g. NCSC, NPSA. An understanding of VulnerabilityManagement, Red Teaming, and Breach and Attack Simulation or experience of working within an Active Defence discipline. Security Requirements: SC This role will require you to hold or More ❯