experience may compensate for lack of formal education. Certifications such as CISSP, CISM, expert level Azure, or similar are a plus. Familiarity with security frameworks (ISO 27001, SOC 2, NIST, FedRAMP). Competencies Advanced knowledge of cyber security. Excellent leadership, communication, and cross-functional collaboration and mentoring skills. More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Snc-Lavalin
technologies (e.g., data mesh, AI/ML) to enhance architecture.Champion data security, privacy, and compliance:• Implement data classification, encryption, and access control standards.• Ensure compliance with GDPR, ISO 27001, NIST, SOC 2, and sector-specific frameworks.• Develop secure data integration architectures and monitor sensitive data flows.• Lead security assessments and contribute to incident response planning.• Promote a security-by-design More ❯
clearance, or is willing to undergo the security vetting process; Strong academics, including a minimum of 2.1 degree or equivalent experience Familiarity with information security frameworks such as ISO27001, NIST etc; Willingness to operate as part of an 'on-call roster', travelling to assist our UK and EMEA clients when required in an incident management capacity; Connect to your business More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen Group
Candidate The ideal candidate will possess the following: Strong understanding of IT, Security, and operational resilience in large organisations Proven experience with information security controls andstandards (e.g. COBIT, NIST, ISO 27001/2) Demonstrable knowledge of Enterprise Risk Management in a technical setting Experience delivering assurance activities, including control testing Excellent communication, influencing and negotiation skills Ability to manage More ❯
and network protocols (TCP/IP, DNS, HTTP/S). Understanding of industrial protocols (e.g., Serial, Modbus, HART). Proficiency in industry regulations including IEC 62443, ISO 27001, NIST, OWASP. Proficiency in incorporating DevSecOps strategies; Experience with Azure DevOps is a positive attribute. Self directed and motivated in a team orientated environment Preferred Qualifications That Set You Apart: Experience More ❯
. Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, Understanding of industrial protocols (e.g., Serial, Modbus, HART). Knowledge of industry standards : IEC 62443, ISO 27001, NIST, OWASP. Experience implementing DevSecOps best practices ; Azure DevOps experience is a plus. Self-directed and motivated in a team orientated environment More ❯
Windows, and network protocols (TCP/IP, DNS, HTTP/S). Understanding of industrial protocols (e.g., Serial, Modbus, HART). Knowledge of industry standards : IEC 62443, ISO 27001, NIST, OWASP. Experience implementing DevSecOps best practices ; Azure DevOps experience is a plus. Self-directed and motivated in a team orientated environment More ❯
Familiarity with Linux, Windows, RTOS and network protocols (TCP/IP, DNS, Understanding of industrial protocols (e.g., Serial, Modbus, HART) Knowledge of industry standards : IEC 62443, ISO 27001, NIST, OWASP Experience implementing DevSecOps best practices ; Azure DevOps experience is a plus Self-directed and motivated in a team orientated environment More ❯
Linux, Windows, RTOS and network protocols (TCP/IP, DNS, HTTP/S) Understanding of industrial protocols (e.g., Serial, Modbus, HART) Knowledge of industry standards : IEC 62443, ISO 27001, NIST, OWASP Experience implementing DevSecOps best practices ; Azure DevOps experience is a plus Self-directed and motivated in a team orientated environment More ❯
. Familiarity with Linux, Windows, and network protocols (TCP/IP, DNS, Understanding of industrial protocols (e.g., Serial, Modbus, HART). Knowledge of industry standards : IEC 62443, ISO 27001, NIST, OWASP. Experience implementing DevSecOps best practices ; Azure DevOps experience is a plus Self-directed and motivated in a team orientated environment More ❯
Windows, and network protocols (TCP/IP, DNS, HTTP/S). Understanding of industrial protocols (e.g., Serial, Modbus, HART). Knowledge of industry standards : IEC 62443, ISO 27001, NIST, OWASP. Experience implementing DevSecOps best practices ; Azure DevOps experience is a plus Self-directed and motivated in a team orientated environment More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Cathcart Technology
and applications. ** Evaluate projects and initiatives for security risks, recommending appropriate mitigation and controls. ** Develop and maintain security frameworks andstandards aligned to recognised best practice (e.g. ISO 27001, NIST, CIS). ** Ensure compliance with client and regulatory security obligations across all platforms and services. ** Collaborate with IT, Security Operations, and Risk teams to ensure security requirements are embedded throughout … in information security architecture and governance across enterprise environments. ** Expertise with Azure and Microsoft 365 security tooling and cloud security principles. ** Strong understanding of frameworks such as ISO 27001, NIST, and the Well Architected Framework. ** Experience with technologies such as SIEM, DLP, IAM, EDR, WAF, and SASE. ** Ability to communicate complex technical concepts to both technical and non technical audiences. More ❯
consistency, compliance, and maturity across global operations. This is a key leadership role for a strategic yet hands-on cyber risk professional with strong knowledge of frameworks such as NIST, ISO 27001, CPMI-IOSCO, and the CRI Cyber Risk Profile. What you’ll do Lead and develop a global GRC team, ensuring effective cyber risk management and governance practices. Maintain … to simplify complexity for executive audiences. Highly organised, documentation-focused, and detail-oriented. Certifications: CISM (essential), CRISC, ISO 27001 Lead Implementer/Auditor, CISSP or CGEIT (advantageous), DORA/NIST CSF training desirable. Join a forward-thinking organisation on a global transformation journey — shaping the next generation of cyber resilience and governance. More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple Resourcing
awareness, and the confidence to engage at every level. Ideally, youll have: Strong experience in cybersecurity risk management or GRC roles A solid understanding of industry frameworks such as NIST CSF, NIST 800-53, or SOC 2 Hands-on involvement in audit or certification readiness programmes Excellent communication skills with the ability to translate security risk into business value This More ❯
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Livingston, West Lothian, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Tranent, East Lothian, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Stirling, Stirlingshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Motherwell, Lanarkshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Dunfermline, Fife, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Comrie, Perthshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Lauder, Berwickshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Lennoxtown, Dunbartonshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Muirkirk, Ayrshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯