and analytical solutions Working knowledge of cloud orchestration and containerisation technologies, such as Docker and Kubernetes Working knowledge of DevOps, CI/CD and Infrastructure-as-Code Understanding of NCSC Cloud Security Principles and its practical implementations Aker Systems Attributes At Aker we work as a team, we are collaborative, hardworking, open, and delivery obsessed. There is no blame culture More ❯
/CD) Familiarity with scripting languages like PowerShell, YAML, JSON Hands-on with application security tools and DevSecOps processes Understanding of frameworks and standards like OWASP, NIST SSDF, ISO27001, NCSC Experience with threat modelling, risk assessments, and secure design reviews Confident owning security strategy and tooling across complex product landscapes A strong communicator - able to engage with engineers and execs More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Akkodis
/CD) Familiarity with scripting languages like PowerShell, YAML, JSON Hands-on with application security tools and DevSecOps processes Understanding of frameworks and standards like OWASP, NIST SSDF, ISO27001, NCSC Experience with threat modelling, risk assessments, and secure design reviews Confident owning security strategy and tooling across complex product landscapes A strong communicator - able to engage with engineers and execs More ❯
Smart energy and metering Oil and gas Water Civil Nuclear Transport (including aviation, rail, maritime, road and autonomous vehicles) Wider critical infrastructure Security standards relating to the sector, including: NCSC NIS Guidance and CAF ISO 27001 and ISO 27005 NERC CIP ISA-99/IEC 62443 NIST CSF. Additional information Please note that the interview stages may be subject to More ❯
TW75QD, Syon, Greater London, United Kingdom Hybrid/Remote Options
Sky
and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver More ❯
whom we are able to develop deep understanding and partnership to collaborate with. Building on a track-record of success such as that demonstrated with recent projects with the NCSC (), this role has an emphasis on supporting our clients in both local and central government, as well as select private sector clients where appropriate. Previous experience in supporting the public More ❯
/365 breach response line; initiating and leading CMT calls; appointing IT forensics firms; engaging PR consultants; advising on notification obligations; notifying and liaising with criminal authorities (e.g. NCA, NCSC); project managing the incident response; appointing foreign counsel and coordinating multi-jurisdictional incidents; engaging credit monitoring and notification service providers; applying for injunctions; and submitting takedown requests. Regulatory: managing regulatory More ❯
than 25 countries. Every day, we work across time zones, cultures, and languages to protect clients that range from household brands to nationally significant infrastructure.We’re one of the NCSC CIR-enhanced capabilities in the UK (https://schemes/cyber-incident-response/information-for-buyers), meaning our team is trusted to respond to the nation’s most More ❯
london, south east england, united kingdom Hybrid/Remote Options
Bridewell
to a position of mature cybersecurity & resilience, sometimes from a starting point of minimal security maturity. Supporting clients to implement frameworks, standards, and guidance, including ISA/IEC62443, NCSC CAF, NIST SP 800-82, ISO 27001, HSE OG86. Helping clients to understand their attack vectors that could be exploitable by threats. Designing secure OT network architectures and perimeter defences. … and approaches within OT environments. Understanding of the different priorities of cybersecurity in OT & IT. Knowledge of cybersecurity frameworks, including but not limited to ISA/IEC62443, NCSC CAF, NIST SP 800-82, HSE OG86, ISO 27001. Awareness and understanding of the OT security threat landscape. Ability to understand and articulate the impacts of cybersecurity events in More ❯