within Azure DevOps for infrastructure automation. Integrate security and compliance checks into DevOps workflows. Collaborate with architecture, platform, and security teams to ensure alignment with governance and compliance frameworks (NCSC, CIS Benchmarks, ISO27001). Produce clear documentation and support knowledge transfer across teams. Skills & Experience Proven hands-on experience with Terraform (advanced modules, state management, remote backends). Strong background More ❯
JSP 440, DEF STAN 05-138, andNCSC guidance Produce security documentation, risk assessments, and management plans Lead secure design reviews and support engineering assurance gates Liaise with MOD,NCSC, Information Assurance teams, and other stakeholders Stay up to date with evolving threat landscapes and proposemitigations About you Minimum 6years' experience incyber security architecture within defence, aerospace, or critical national infrastructure More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
assure policy compliance Support investigations and coordinate stakeholder engagement Ensure legal and data privacy compliance during incidents Engage with government agencies and industry bodies Participate in forums (e.g. DWI, NCSC, Local Resilience Forums) Contribute to GRC metrics, KPIs, KRIs, and reporting Align work with business priorities and challenge inefficiencies Take ownership of customer issues and act on feedback Make informed More ❯
HPC security, including controls and classifications in classified environments. Active DV or eDV clearance; UKIC or reservist background highly desirable. Strong understanding of central government security processes (e.g., JSPs, NCSC guidance). Experience conducting TVRA and managing security incidents in fast-paced settings. Ability to engage and influence senior stakeholders across government and defence. Desirable Skills Experience with Akamai Edge More ❯
government frameworks. Key Responsibilities: Design, develop, and maintain secure architectures for MOD platforms, applications, and networks Ensure compliance with standards and frameworks (NIST, ISO 27001, JSP 440, DEF STAN, NCSC) Produce and maintain security artefacts, including risk assessments and management plans Lead secure design reviews and support engineering assurance gates Required Skills: Active SC 6+ years in cybersecurity architecture More ❯
The role involves working closely with stakeholders to ensure systems meet security and compliance requirements. Key Skills: Proven experience in cybersecurity architecture within secure environments Strong understanding of NCSC principles, risk management Secure by design experience Ability to produce HLD/LLD and security documentation Stakeholder engagement and technical leadership More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Opus Recruitment Solutions Ltd
The role involves working closely with stakeholders to ensure systems meet security and compliance requirements. Key Skills: Proven experience in cybersecurity architecture within secure environments Strong understanding of NCSC principles, risk management Secure by design experience Ability to produce HLD/LLD and security documentation Stakeholder engagement and technical leadership More ❯
Lichfield, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
IO Associates
assurance roles (DITSO/WARP). Desired Skills * Broad knowledge of HMG CyberSecurity and Assurance policy and guidance. * Experience working with CCF, CAF, and NIST frameworks. * Familiarity with NCSC best practice and guidance. This is an excellent opportunity for an experienced Information Security Officer to play a pivotal role within the Defence sector, offering flexibility, autonomy, and the chance More ❯
particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate More ❯
particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate More ❯
Employment Type: Contract
Rate: £600.0 - £800.0 per day + up to £800 per day (Inside IR35)
particular Azure and/or AWS. Ability to effectively communicate SOC value to stakeholders through clear and efficient reporting. Clear knowledge of current cybersecurity threats and trends. Familiarity with NCSC CAF, ONR SyAPs, and ISO27001 frameworks. Nice to have: Experience in complex, regulated environments, especially Critical National Infrastructure (CNI). Awareness of SOAR platforms and automation in incident response. Immediate More ❯
will be able to demonstrate a knowledge of the following: Evidence of experience in developing and deploying Cross Domain Solutions, design, use, testing and assurance. Sound understanding of the NCSC patterns and guidance for safely importing and exporting data. Ability to assess the product marketplace for products which meet requirements of the functional components of the solution. Ability to convey More ❯
will be able to demonstrate a knowledge of the following: Evidence of experience in developing and deploying Cross Domain Solutions, design, use, testing and assurance. Sound understanding of the NCSC patterns and guidance for safely importing and exporting data. Ability to assess the product marketplace for products which meet requirements of the functional components of the solution. Ability to convey More ❯
will be able to demonstrate a knowledge of the following: Evidence of experience in developing and deploying Cross Domain Solutions, design, use, testing and assurance. Sound understanding of the NCSC patterns and guidance for safely importing and exporting data. Ability to assess the product marketplace for products which meet requirements of the functional components of the solution. Ability to convey More ❯
develop, and maintain secure system architectures for MOD platforms and networks. Ensure alignment with standards including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain security documentation such as Security Architecture Documents, Risk Assessments, and Management Plans. Lead secure design reviews and contribute to engineering assurance gates. Liaise with MOD, NCSCMore ❯
develop, and maintain secure system architectures for MOD platforms and networks. Ensure alignment with standards including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain security documentation such as Security Architecture Documents, Risk Assessments, and Management Plans. Lead secure design reviews and contribute to engineering assurance gates. Liaise with MOD, NCSCMore ❯
Ollama on bare metal/private cloud Infrastructure: Air-gapped Kubernetes, local container registries Desirable Skills - Experience with defence/government IT security protocols - Knowledge of CIS benchmarks and NCSC guidelines - Familiarity with cross-domain solutions and data diodes - Understanding of classification marking and handling procedures More ❯
system architectures for MOD platforms, applications, and networks • Ensure alignment with relevant standards and frameworks including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance • Produce and maintain security documentation including Security Architecture Documents, Security Risk Assessments and Security Management Plans • Lead and support secure design reviews and contribute to engineering assurance gates • Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes • Collaborate with engineering and development teams to ensure security requirements are met from the outset • Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Skill Set Essential • Proven experience in cybersecurity architecture within a defence, aerospace More ❯
system architectures for MOD platforms, applications, and networks Ensure alignment with relevant standards and frameworks including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including Security Architecture Documents, Security Risk Assessments and Security Management Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes Collaborate with engineering and development teams to ensure security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Skill Set Essential Proven experience (6+) years in cybersecurity architecture within a More ❯
system architectures for MOD platforms, applications, and networks Ensure alignment with relevant standards and frameworks including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including Security Architecture Documents, Security Risk Assessments and Security Management Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise … with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and other stakeholders to support security assurance processes Collaborate with engineering and development teams to ensure security requirements are met from the outset Keep up to date of evolving threat landscapes and propose mitigations aligned with system requirements Skill Set Essential Proven experience (6+) years in cybersecurity architecture within a More ❯
aligning security controls to ISO 27001, NIST CSF, ONR, and UK Gov standards Gap Analysis and Compliance: Produce audit-ready evidence, manage ONR requirements, and ensure ongoing alignment with NCSC and NPSA guidance Cloud Security Architecture: Secure and optimise Azure and M365 environments across IaaS, PaaS, and SaaS services Microsoft Security Stack: Deliver and support enterprise use of Defender, Purview … alliances), providing clear reporting and advice to senior management and regulatory bodies Health Checks and Testing: Scope and coordinate ITHC (IT Health Checks) and vulnerability management programmes to meet NCSC and regulatory expectations Policy and Documentation: Author and maintain security policies, standards, and Integrated Management System (IMS) documentation Knowledge, Skills and Experience - Essential - Established cybersecurity credentials with demonstrable experience More ❯
City of London, Clerkenwell, Greater London, United Kingdom Hybrid / WFH Options
Morson Talent
aligning security controls to ISO 27001, NIST CSF, ONR, and UK Gov standards Gap Analysis and Compliance: Produce audit-ready evidence, manage ONR requirements, and ensure ongoing alignment with NCSC and NPSA guidance Cloud Security Architecture: Secure and optimise Azure and M365 environments across IaaS, PaaS, and SaaS services Microsoft Security Stack: Deliver and support enterprise use of Defender, Purview … alliances), providing clear reporting and advice to senior management and regulatory bodies Health Checks and Testing: Scope and coordinate ITHC (IT Health Checks) and vulnerability management programmes to meet NCSC and regulatory expectations Policy and Documentation: Author and maintain security policies, standards, and Integrated Management System (IMS) documentation Knowledge, Skills and Experience - Essential - Established cybersecurity credentials with demonstrable experience More ❯