from on-prem to cloud solutions. Strong analytical skills for complex technical issues. Proven ability in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. More ❯
from on-prem to cloud solutions. Strong analytical skills for complex technical issues. Proven ability in designing cyber security systems and governance. Familiar with tools and frameworks (e.g. NCSC, NIST, MITRE, GDPR, PCI DSS). Deep understanding of security controls (e.g. firewalls, SIEM, SOC, DLP). Proficient in leading and coordinating incident response. Effective at managing multiple priorities under pressure. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Michael Page
criteria: Experience in designing and implementing security solutions, preferably in a government or public sector environment. Working knowledge of security standardsand frameworks, including Secure by Design, ISO 27001, NIST or similar Strong analytical and problem-solving skills, with a focus on innovation and efficiency. Strong communication skills, with the ability to convey complex technical concepts to non-technical stakeholders. More ❯
models and maximise billable utilisation. Client Delivery and Governance Define and govern delivery standards across client accounts, ensuring alignment with enterprise security policies, regulatory requirements, and industry frameworks (e.g., NIST, ISO 27001). Lead the strategic integration of security practices into client delivery, embedding security controls and governance into account management workflows. Oversee the implementation and optimisation of security services More ❯
respond quickly to changing priorities. Able to interpret & present data and information in the appropriate format for different audiences. Knowledge and understanding of Information Security Frameworks andstandards (FFIEC, NIST, ISO, DORA etc.) Ability to work as part of a team or solo. Excellent Communication skills, especially written English Strong stakeholder management The ability to foster and grow relationships, constructive More ❯
respond quickly to changing priorities. Able to interpret & present data and information in the appropriate format for different audiences. Knowledge and understanding of Information Security Frameworks andstandards (FFIEC, NIST, ISO, DORA etc.) Ability to work as part of a team or solo. Excellent Communication skills, especially written English Strong stakeholder management The ability to foster and grow relationships, constructive More ❯
Ability to lead technical conversations, influence customer decisions, and deliver trusted advisory services Existing SC clearance or eligibility to apply Desirable Skills & Certifications Familiarity with industry security frameworks (e.g., NIST, ISO 27001, CIS Controls) Cloud security experience across major hyperscalers More ❯
in ISO 27001 implementation as a minimum, but preferably also experience in ISOs 27701/22301/9001 A strong understanding of information security and data privacy frameworks like NIST Cybersecurity Framework (CSF), GDPR, CIS or similar. Experience of certification body audits. Should have good experience and knowledge of Cyber/Information Security Governance, Risk Management, and Compliance. ISO Consultant More ❯
security risk/issue management-related processes and services. Experience in Risk Management aligned to certification requirements (ISO27001, ISO31000 or similar) required Knowledge of relevant security/governance frameworks (NIST CSF, ISO27001, CobiT, ) required Experience in service build up a plus Security Governance/Risk Management certification (CISSP, CGEIT, CISM, CRISC ) is a plus Qualified individuals with a disability may More ❯
Drive innovation and thought leadership within the Practice by defining standards, sharing knowledge, and mentoring peers Influence customer outcomes through expert knowledge of DevSecOps tools and compliance frameworks like NIST, CIS, SOC 2, and PCI DSS You'll travel to client sites across the UK, working directly with business and technical stakeholders to drive real business value What you'll More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
statements to technical and non-technical audiences at various hierarchical levels Deep knowledge of common information security management frameworks andstandards, such as ISO/IEC 27001/27002, NIST 800-53, and the NIST Cybersecurity Framework Soft skills: collaboration, teamwork, persuasion, attention to detail, time management, prioritization, resourcefulness Advanced proficiency with MS Office products, primarily MS Word, Excel, PowerPoint More ❯
Birmingham, West Midlands, England, United Kingdom Hybrid / WFH Options
Robert Walters
assets by working collaboratively with colleagues across multiple departments. Your day-to-day responsibilities will include supporting policy development in line with leading frameworks such as ISO 27001 or NIST, overseeing vulnerability management activities alongside IT professionals, conducting architectural reviews for new projects, and helping drive continuous improvement in technical controls. You will also be instrumental in managing third party … proven experience on protecting sensitive data within regulated environments. Your background should include hands-on involvement with risk assessments, policy development aligned with industry standards like ISO 27001 or NIST, vulnerability management activities spanning identification through remediation, and direct participation in incident response processes. Demonstrable experience applying risk assessment methodologies to identify vulnerabilities and recommend effective mitigations is highly valued. … Recognised information security frameworks such as ISO 27001 or NIST ensures you can contribute meaningfully to policy development. A solid understanding of core security technologies-including firewalls, intrusion detection systems, endpoint protection platforms-and their practical application is important. Experience supporting vulnerability management processes from identification through remediation demonstrates your ability to manage risk proactively. Proficiency in evaluating technical controls More ❯