secure architectures, incorporating identity, access management, encryption, and network security. Conduct cloud security assessments and gap analyses for UK-based organisations. Advise on compliance with UK regulations (e.g. GDPR, NCSC Cloud Security Principles, ISO 27001). Develop and enforce cloud security policies, procedures, and governance models. Lead threat modelling, risk assessments, and vulnerability management initiatives. Configure and manage security tools More ❯
of the UKs most sensitive programmes. What Youll Do Design & implement secure cloud architectures (IAM, encryption, VPC). Lead risk assessments, gap analyses & threat modelling. Advise on compliance (GDPR, NCSC Principles, ISO 27001). Configure cloud-native security tools & integrate with SIEM (Splunk, Chronicle). Embed security in CI/CD pipelines with DevOps teams. Support incident response & recovery for More ❯
Trowbridge, England, United Kingdom Hybrid / WFH Options
NexGen Associates
and feedback analysis Governance and compliance Work in line with ITIL and ITSM processes Support risk management and compliance reporting Help maintain relevant accreditations such as Cyber Essentials and NCSC Cloud Security Principles Requirements for the role: No formal qualifications required but relevant experience in Business or IT is essential ITIL Foundation preferred and will be supported if not already More ❯
Trowbridge, cardiff, united kingdom Hybrid / WFH Options
NexGen Associates
and feedback analysis Governance and compliance Work in line with ITIL and ITSM processes Support risk management and compliance reporting Help maintain relevant accreditations such as Cyber Essentials and NCSC Cloud Security Principles Requirements for the role: No formal qualifications required but relevant experience in Business or IT is essential ITIL Foundation preferred and will be supported if not already More ❯
Chippenham, England, United Kingdom Hybrid / WFH Options
Logiq
System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP 440, JSP 902, and DEFCON 659A. More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
Logiq
System Hardening, Cryptographic Controls (PKI, Data at Rest/In Transit), Protective Monitoring, and Security Auditing. Strong understanding of the ISO 27000 series, NIST CyberSecurity & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy Information Assurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP 440, JSP 902, and DEFCON 659A. More ❯
federation, and certificate management capabilities across highly assured platforms. You’ll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical, scalable solutions to complex mission systems. Key Responsibilities: • Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities … GCP) environments • Knowledge of certificate auto-enrolment, key management, and hardware security modules (HSMs) • Familiarity with relevant standards and policies such as X.509, RFC5280, TLS, FIPS 140-3, and NCSC or NIST identity guidance • Background delivering within high-assurance, disconnected, or restricted network environments This contract offers the chance to take technical ownership of critical design elements within a secure More ❯
swindon, wiltshire, south west england, united kingdom
Ncounter LTD
authentication, federation, and certificate management capabilities across highly assured platforms. Youll take a leading role in shaping resilient architectures within secure, air-gapped environments, ensuring compliance with MOD and NCSC principles while delivering practical, scalable solutions to complex mission systems. Key Responsibilities: Define and deliver enterprise-grade PKI and trust infrastructures covering Root/Issuing CAs, Registration Authorities, Validation Authorities … GCP) environments Knowledge of certificate auto-enrolment, key management, and hardware security modules (HSMs) Familiarity with relevant standards and policies such as X.509, RFC5280, TLS, FIPS 140-3, and NCSC or NIST identity guidance Background delivering within high-assurance, disconnected, or restricted network environments This contract offers the chance to take technical ownership of critical design elements within a secure More ❯