Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Reed
of IAM concepts including authentication, authorization, SSO, MFA, and directory services . Experience working in large-scale enterprise environments, preferably in regulated industries. Solid grasp of security frameworks (e.g., NIST, ISO 27001 ) and compliance requirements (e.g., GDPR ). Proficiency in scripting languages (e.g., PowerShell, JavaScript ) and integration protocols (e.g., LDAP, SAML, OAuth ). Excellent communication and stakeholder management skills. Desirable More ❯
interpreted by Information Technologyand business individuals Skills: Recognised qualifications include CISSP, CISM, CISA or equivalent ISO 27001 Lead Auditor/Lead Implementor or similar qualification Familiarity with the NIST Cybersecurity Framework is beneficial. Formal qualification in Information Security domain or equivalent experience desirable Cloud Security Controls Location – Manchester or London (hybrid) Start Date: ASAP Rate: £700 - £750pd (Inside IR35 More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
remotely, Willing and able to travel occasionally to client sites as required. Experience auditing public sector organisations or government bodies Familiarity with relevant standardsand frameworks (e.g. ISO 27001, NIST, COBIT) What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us More ❯
OCTAVE, MITRE ATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. • Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. • An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. • Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. • Familiar with the functions ofMore ❯
OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions ofMore ❯