Cambridgeshire, England, United Kingdom Hybrid/Remote Options
Sanderson
Assurance and Risks. Security related legislation (e.g. GDPR, PCI DSS, ICO requirements). Security Control Frameworks such as ISO 27001, NIST CSF and CIS Controls v8. HMG, NPSA and NCSCsecurity policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid/Remote Options
Sanderson Government and Defence
Assurance and Risks. Security related legislation (e.g. GDPR, PCI DSS, ICO requirements). Security Control Frameworks such as ISO 27001, NIST CSF and CIS Controls v8. HMG, NPSA and NCSCsecurity policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding More ❯
IL3/IL4/IL5, SCIF, air-gapped systems). Deep knowledge of: MOD and NATO security policies (JSPs, DEFCONs, STANAGs), NIST, CIS, ISO/IEC 27001 frameworks, UK NCSC principles and secure-by-design methodologies. Competent with cross-border IT operations, including data sovereignty, dual-use controls, and export classification. Strong track record of leading infrastructure, IT operations, and More ❯
Norwich, Norfolk, East Anglia, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Springfield, Essex, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Stevenage, Hertfordshire, England, United Kingdom Hybrid/Remote Options
MBDA
Coordinate crypto change windows (key loads/rollovers), support incident response related to crypto assets, and drive continuous improvement of crypto processes. Ensure that Key Material is ordered from NCSC/MoD and delivered/installed in a timely manner, avoiding any lapse of service (or derogation requests). Regular status review calls with our Crypto stakeholders (internal and external More ❯
Stevenage, Hertfordshire, South East, United Kingdom Hybrid/Remote Options
MBDA
Coordinate crypto change windows (key loads/rollovers), support incident response related to crypto assets, and drive continuous improvement of crypto processes. Ensure that Key Material is ordered from NCSC/MoD and delivered/installed in a timely manner, avoiding any lapse of service (or derogation requests). Regular status review calls with our Crypto stakeholders (internal and external More ❯
King's Lynn, Norfolk, England, United Kingdom Hybrid/Remote Options
Opus People Solutions
bi-monthly visits. Key Responsibilities: Assist in drafting, reviewing, and maintaining ICT policies, procedures, and technical standards to ensure compliance with relevant legislation, frameworks, and best practices (e.g., ITIL, NCSC guidance). Work with ICT management to ensure all documents are current, approved, and clearly communicated. Maintain an organised and accessible ICT documentation library, ensuring consistency of format, terminology, and … into clear, accessible documentation. Experience managing multiple documentation streams and maintaining version control. Desirable Knowledge & Skills: Experience in a local government or public sector ICT setting. Knowledge of ITIL, NCSCCyber Assessment Framework, or similar. Understanding of data protection, cybersecurity, and information governance requirements. Experience using documentation and asset management tools (e.g., SharePoint, CMDBs). What's in it More ❯