architectures to mitigate risks posed by emerging technologies and business practices. Advising clients on information assurance, architectural issues, and risks. Supporting the development of RiskManagementAccreditation Document Sets (RMADS). Scoping security testing activities, explaining findings, and recommending remedial actions to stakeholders. Investigating security incidents. Promoting security awareness within project teams and the organization. Candidate requirements: HMG Security Policy More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
/physical security controls within the risk/cost/benefit space. Security Documentationmanagement to include - but not limited to - review and update of related IA documents including RMADS, Security Cases, SyOPs, Business Impact Assessments, Data Protection Impact Assessments, Risk Registers, DART/Oculus entries, Risk Balance Cases, Information Asset Owner forms, Supplier Assurance Questionnaires. Experienced in relevant Security More ❯
Warrington, Cheshire, United Kingdom Hybrid / WFH Options
Babcock Mission Critical Services España SA
/physical security controls within the risk/cost/benefit space. Security Documentationmanagement to include - but not limited to - review and update of related IA documents including RMADS, Security Cases, SyOPs, Business Impact Assessments, Data Protection Impact Assessments, Risk Registers, DART/Oculus entries, Risk Balance Cases, Information Asset Owner forms, Supplier Assurance Questionnaires. Experienced in relevant Security More ❯
of JSP processes Supporting the Development and maintenance of our Information Security Management System (ISMS) to best support the Company’s activities, including RiskManagementandAccreditation Document Sets (RMADS) and Company Security Policies. You will be a strong communicator working with all levels of the business from Junior Security Analysts to Senior Information Security Manager to put policies andMore ❯
deliverables to meet the needs of Navy Digital customers, as well as key MoD and RN stakeholders, including: High and low-level security requirements. RiskManagement & Accreditation Document Set (RMADS). Legal and regulatory artefacts applicable to the MoD e.g., Data Privacy Impact Assessments (DPIA). Risk Balance and Security Cases. The provision of security support enables the rapid development More ❯
of IT/security experience in the Defence Sector Demonstrable experience of one or more of the following areas: MoD Security GRC/Assurance Processes: Secure by Design andRMADs/Risk Assessment Cloud security architecture documentation, s ecurity controls mapping and c ompliance checking automation MoD Cyber Operations: SOC tool evaluation support, SIEM use case development, Metrics and reporting More ❯
working, strong progression path ✔ Full benefits inc. private healthcare, bonus + unlimited training resources ✔ SC Clearance required CORE SKILLS & EXPERIENCE: • Strong knowledge of MOD Cyber/GRC practices – e.g. RMADS, Secure by Design • Experience working with Defence Primes or directly with MOD clients • Security assessments, risk frameworks, and technical assurance • Cyber vulnerability investigation and reporting • Cloud security knowledge, including architecture More ❯
In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, riskmanagement, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery More ❯
swindon, wiltshire, south west england, united kingdom
Ncounter Technology Recruitment
In-depth understanding of the current security landscape and cyber security consulting principles. Strong experience managing cyber security strategy, riskmanagement, and compliance in alignment with security policies (e.g. RMADS, JSP604, JSP440, SbD). Expertise in Public Key Infrastructure (PKI), identity managementand federation, firewalls, SIEM, vulnerability scanning, and cryptography. Experience overseeing incident response, vulnerability management, and security service delivery More ❯