Marston Green, Birmingham, West Midlands, England, United Kingdom
TXP
archive, and XDR implementation. Embed governance and risk management practices across the programme. Develop and maintain security reference architectures and patterns. Align with nationalcyber frameworks such as the NCSCCyber Assessment Framework (CAF). Drive secure-by-design principles across all technology workstreams. Collaborate with stakeholders to ensure effective incident response and business continuity planning. Collaborate with our Sales More ❯
migrating from on-prem to cloud solutions. Strong analytical skills for complex technical issues. Proven ability in designing cybersecurity systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under More ❯
migrating from on-prem to cloud solutions. Strong analytical skills for complex technical issues. Proven ability in designing cybersecurity systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
National Physical Laboratory
officials, industry leaders, and academic professionals, supporting UKTL leaders in coordinating meetings and briefings. As a trusted national capability, UKTL will collaborate with standards bodies like 3GPP, the NationalCyberSecurityCentre, the UK intelligence community, academia, Ofcom, and telecommunications service providers and vendors. What you could be doing for us: Managing the software development lifecycle of bespoke UKTL tools. More ❯
research and practical exploration Analyse and evaluate security threats and hazards to a system or service or processes. Use relevant external source of threat intelligence or advice (e.g. NationalCyberSecurityCentre) Combine different sources to create an enriched view of cyber threats and hazards Research and investigate common attack techniques and relate these to normal and observed digital system More ❯