LYNK has partnered with a UK-based CyberSecurity and Managed Services provider to recruit a Business Development Manager. They have offices in the North of England as well as in the Central belt of Scotland, and they are looking for someone with an established network in areas across the North of England, Scotland or beyond. This role would be More ❯
paisley, central scotland, united kingdom Hybrid / WFH Options
Summer-Browning Associates Ltd
Summer-Browning Associates are currently supporting our Central Government client who are seeking a CyberSecurity Advisor on an initial 8 contract Service Location: Glasgow (Hybrid) Essential Skills Experience of cybersecurity analysis and assessment, including threat identification, risk assessment, evaluation of technical controls, and assessment against industry standards Experience of engaging, advising and influencing at all levels of an More ❯
Eaglesham, Renfrewshire, United Kingdom Hybrid / WFH Options
Sky
GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication and organisational skills. Team overview CyberSecurity Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber-attacks is one of our top priorities. Our CyberSecurity team helps the More ❯
Renfrew, Renfrewshire, United Kingdom Hybrid / WFH Options
Sky
GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication and organisational skills. Team overview CyberSecurity Our products, platforms and technologies are constantly evolving that's why keeping Sky safe from cyber-attacks is one of our top priorities. Our CyberSecurity team helps the More ❯
principles to challenging business situations. Develop and implement comprehensive management strategies. Guide teams and foster a culture of security within the organisation. Conduct thorough risk assessment and identify potential cybersecurity weaknesses in projects. Articulate security controls, policies and procedures in a language which the Business can understand. Navigate stakeholders and foster strong stakeholder relationships at all levels. Cyber Strategy More ❯