senior management, highlighting key trends and any actions required. Ensure that the training and awareness framework is aligned with relevant frameworks, standardsand regulations (e.g., NIS2, GDPR, ISO 27001, NIST, etc.). Leverage tools and technologies to enhance delivery and management of the cyber security training and awareness programme. The Person (Essentials) A Bachelor's or Master's degree in More ❯
coding experience in any language (even personal projects count!); familiarity with PHP and Python is a plus. Experience of cybersecurity concepts (attack vectors, kill chain) Experience of compliance understanding (NIST, ISO, custom policies) Customer/stakeholder engagement (technical project management, consulting) Why Join Us? Nucleus is a fast-growing startup where we recognize and reward performance and encourage sustainable working More ❯
identifying security issues in existing system designs or products, including recommending sensible mitigations that balance cost, risk and usability. Knowledge of security standardsand regulations (e.g. NCSC, ISO, SoC, NIST, PCI, GDPR). Experience in application architecture, software development and/or infrastructure architecture. Experience testing the security of software and infrastructure using appropriate security tools. Experience with Continuous Security More ❯
history reviews and thorough evaluations of supplier policies and procedures, current security controls, third party pen testing reports, vulnerability management reports, and information security reports such as SOC2 Reports, NIST or ISO 27001 reports, PCI DSS etc). Manage relationships with large third-party suppliers involved in transformative, high-impact projects and Business as usual activities. This included facilitating collaboration … to responsible teams. Review the daily threat intelligence report generated by TI reporting tools Ensure that third-party risk management practices adhere to relevant regulations (e.g., GDPR, ISO 27001, NIST, etc.). Establish procedures for responding to third-party risk incidents, ensuring minimal impact on business operations working closely with the security operations lead and business continuity lead. Develop andMore ❯