Senior Information Systems Security Specialist - Berkshire (Hybrid) - Circa £75K **Security Clearance Required** We're seeking a Senior Information Systems Security Specialist to provide expert oversight, advice, and guidance on all aspects of information security. This is a fantastic opportunity to play a vital role in ensuring sensitive … classified information assets are managed with the highest level of assurance. Key Responsibilities: Deliver expert analysis of risks to information systems to support informed decision-making. Advise senior leadership and IT management on security strategies and best practices. Guide IT projects with timely and accurate technical security advice. … culture of safety, quality, and high professional standards. Your Day-to-Day Will Involve: Working with internal teams and suppliers to assess and mitigate information risks. Leading on informationassurance and staying up to date with HMG, MoD, and industry best practices. Supporting solution architects in applying More ❯
objectives as well as industry good practice (including Secure by Design aligned to UK Government principles) and regulatory requirements (including GovAssure and NCSC Cyber Assurance Framework). What you'll be doing: Develop and execute GRC strategies that align with business objectives and inform appropriate supporting business processes Drive … to adapt to new regulations, compliance requirements and business change Advise on and foster continuous improvement and effectiveness of GRC processes, driving improved management information to better allow appropriate prioritisation and risk based decisions Lead initiatives that build a culture of accountability and responsibility across engagements Enhance governance processes … Secure by Design) Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies More ❯
depth knowledge of cybersecurity compliance standards such as ISO, SOC, NIST, CMMC, EDRS, and ITAR. Certifications in (ISACA, CISM, CRISC, CISA, ITCA) . Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) . Information Systems Security Architecture Professional (ISSAP) . GIAC Security Leadership Certificate (GSLC) . … Information Systems Security Engineering Professional (ISSEP) . Informationassurance system architecture and engineer (IASAE) . It's a prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ASSESSMENT SCREENING: WITH A 30+ YEAR EXPERIENCE PSYCHOLOGIST: STAGE 2: PRE-SCREENING More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Logiq
capable Security Consultant to join the company within the Risk Management team within the Security Practice. Our consultants are engaged across Security Engineering and Assurance tasks, working on parallel projects and workstreams, and take the lead on day-to-day client interface. You will also be comfortable enhancing customer … understanding of the ISO 27000 series, NIST Cyber Security & Risk Management Frameworks, NCSC CAF, and other industry standards. Familiarity with NCSC guidance and legacy InformationAssurance (IA) standards. Experience with MOD security frameworks including JSP 604, JSP 440, JSP 902, and DEFCON 659A. Experience in business growth and … bid development is desirable. What We’re Looking for: Essential Certified Information System Security Professional (CISSP), Certified Information Security Manager (CISM), or another industry recognised cyber security certification. Desirable Full Membership of the Chartered Institute of Information Security (CIISec) - highly desirable. Chartered or Principal status via the More ❯
requirements whilst evidencing alignment to the target risk appetite. Own the design and be able to articulate and justify design recommendations at security architecture assurance gates Draft design documentation, options papers, risk assessments, stakeholder presentations and be able to effectively communicate these to both senior technical and non-technical … products and be able to position these in a coherent manner against the developing threat landscape and client risk appetite Ability to distil complex information and concepts into key discussion points that identifies a path to resolution rather than only the identification of challenges Contribute to the development of … transformational delivery engagements. Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the Information Security Management System. Deriving and delivering documented Information Security Management Plans which incorporate Regulatory, Legal and Compliance in relation to applicable security policies. More ❯
evaluating the secure high-level and low-level design of major products, services, and complex solutions Experience guiding effective decisions on risks, based on informationassurance risk assessment methodology Proficiency in applying security concepts to a technical level, including working with security tools, network security infrastructure technologies and … information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level Desirable skills: Knowledge of Secure by Design principles Experience with penetration … location and technical skills as assessed at interview. London based range: £63,248 to £79,133 National range: £59,634 to £75,618. Additional information: Hybrid working includes 40% in-office working (typically 2 days/week) This role requires SC clearance, a condition of which is to have More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
evaluating the secure high-level and low-level design of major products, services, and complex solutions Experience guiding effective decisions on risks, based on informationassurance risk assessment methodology Proficiency in applying security concepts to a technical level, including working with security tools, network security infrastructure technologies and … information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level Desirable skills: Knowledge of Secure by Design principles Experience with penetration … location and technical skills as assessed at interview. London based range: £63,248 to £79,133 National range: £59,634 to £75,618. Additional information: Hybrid working includes 40% in-office working (typically 2 days/week) This role requires SC clearance, a condition of which is to have More ❯
Darlington, County Durham, North East, United Kingdom Hybrid / WFH Options
Inspire People
evaluating the secure high-level and low-level design of major products, services, and complex solutions Experience guiding effective decisions on risks, based on informationassurance risk assessment methodology Proficiency in applying security concepts to a technical level, including working with security tools, network security infrastructure technologies and … information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level Desirable skills: Knowledge of Secure by Design principles Experience with penetration … location and technical skills as assessed at interview. London based range: £63,248 to £79,133 National range: £59,634 to £75,618. Additional information: Hybrid working includes 40% in-office working (typically 2 days/week) This role requires SC clearance, a condition of which is to have More ❯
Salford, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Inspire People
evaluating the secure high-level and low-level design of major products, services, and complex solutions Experience guiding effective decisions on risks, based on informationassurance risk assessment methodology Proficiency in applying security concepts to a technical level, including working with security tools, network security infrastructure technologies and … information security management frameworks (e.g., ISO 27001, NIST) Understanding of NCSC information security guidance and architecture patterns plus familiarity with SABSA/TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level Desirable skills: Knowledge of Secure by Design principles Experience with penetration … location and technical skills as assessed at interview. London based range: £63,248 to £79,133 National range: £59,634 to £75,618. Additional information: Hybrid working includes 40% in-office working (typically 2 days/week) This role requires SC clearance, a condition of which is to have More ❯
startup enhancing the formation to the early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization ROCKET FUEL MISSION INTELLIGENCE DIVISION … in C++ experience in an embedded environment is essential. Extensive experience in computer aided design CAD -and computer aided engineering CAE is essential. Certified Information Systems Security Professional (CISSP) Certified Cloud Security Professional (CCSP) Informationassurance system architecture and engineer (IASAE) Information Systems Security Engineering Professional … ISSEP) Information Systems Security Architecture Professional (ISSAP) is essential. It's prerequisite to be certified one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 3: PRE-SCREENING (verification checks & DV security clearance) STAGE More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (eg, ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
Darlington, County Durham, North East, United Kingdom Hybrid / WFH Options
Inspire People
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
statutory regulations governing the operation of the gateway system must be complied with. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization: ROCKET FUEL MISSION INTELLIGENCE DIVISION … lifecycle. Proven project leadership on complex software architectures and end-to-end development, including cross-functional collaboration in the USA, UK, and Europe. Certified Information Systems Security Professional (CISSP). Certified Cloud Security Professional (CCSP). Informationassurance system architecture and engineer (IASAE). Information Systems … Security Engineering Professional (ISSEP). Information Systems Security Architecture Professional (ISSAP) is essential. It's prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 3: PRE-SCREENING (verification More ❯
the design and iterate through the design cycle capturing the changes getting real-time feedback from very high levels of details. Generate detailed design information, hand that over to the procurement teams within the platform, collaborating with each other, interacting with all the participants engineers, manufacturing pipeline that will … experience. Extensive experience in computer aided design CAD -and computer aided engineering CAE is essential. Extensive experience with Optical communications and laser communications. Certified Information Systems Security Professional (CISSP) . Certified Cloud Security Professional (CCSP) . Informationassurance system architecture and engineer (IASAE) . Information Systems … Security Engineering Professional (ISSEP) . Information Systems Security Architecture Professional (ISSAP) is essential. It's prerequisite to be certified one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 3: PRE-SCREENING (verification checks More ❯
upskill other members of the team to establish a lasting and functioning capability.● Help public sector bodies understand, assess and act on the vulnerability information they receive. Help public sector bodies plan and prioritise how vulnerabilities are addressed to meet organisational objectives, using a risk-based approach. Help public … other members of the team. Professional qualifications/accreditations, Such as: Certified Cyber Professional (CCP), CREST Registered Technical Security Architect, BCS Practitioner Certificate in InformationAssurance Architecture, ISC(2) Information Systems Security Architecture Professional, ISO27001 Lead Implementer. More ❯
upskill other members of the team to establish a lasting and functioning capability.● Help public sector bodies understand, assess and act on the vulnerability information they receive. Help public sector bodies plan and prioritise how vulnerabilities are addressed to meet organisational objectives, using a risk-based approach. Help public … other members of the team. Professional qualifications/accreditations, Such as: Certified Cyber Professional (CCP), CREST Registered Technical Security Architect, BCS Practitioner Certificate in InformationAssurance Architecture, ISC(2) Information Systems Security Architecture Professional, ISO27001 Lead Implementer. More ❯
technologies Work out subtle security needs and understand the impact of decisions, balancing requirements and deciding between approaches Produce particular patterns and support quality assurance Act as the point of escalation for architects in lower-grade roles Lead the technical design of systems and services Drive 'secure by design … the development of patterns and principles Proven ability to lead decision-making within Architectural Review Boards and as a Technical Design Authority, based on informationassurance risk assessment methodology and governance Proficiency in applying security concepts to a technical level across multiple projects, including working with security tools … network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance More ❯
We are a startup enhancing the early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information and utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization: ROCKET FUEL MISSION INTELLIGENCE … or hardware control. JTAG Boundary Scan Testing. PCB Design Experience via Altium. FPGA and Embedded Design Experience. Experience in multi-core embedded controllers. Certified Information Systems Security Professional (CISSP) . Certified Cloud Security Professional (CCSP) . Informationassurance system architecture and engineer (IASAE) . Information Systems … Security Engineering Professional (ISSEP) . Information Systems Security Architecture Professional (ISSAP) is essential. It's a prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ABILITY TEST STAGE 2: COGNITIVE ASSESSMENT SCREENING WITH A 30+ YEARS EXPERIENCE PSYCHOLOGIST STAGE 3: PRE More ❯
a startup enhancing the formation of early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job. ENVIRONMENT: This position will operate in the following areas of the organization ROCKET FUEL MISSION INTELLIGENCE DIVISION … other disciplines such as Mechanics, AOCS , Propulsion, AIT and Optical ground station terminal operations. Preferably a degree in Hardware engineering design and physics. Certified Information Systems Security Professional (CISSP) . Certified Cloud Security Professional (CCSP) . Informationassurance system architecture and engineer (IASAE) . Information Systems … Security Engineering Professional (ISSEP) . Information Systems Security Architecture Professional (ISSAP) is essential. It's a prerequisite to be certified one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE 1: COGNITIVE ASSESSMENT SCREENING: WITH A 30yrs+ EXPERIENCE PSYCHOLOGIST: STAGE 2: PRE-SCREENING (verification checks & eDV security clearance) STAGE More ❯
a startup enhancing the formation of early stages of a product development project. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, as well as utilize necessary equipment to perform the job. ENVIRONMENT: This position will operate in the ROCKET FUEL MISSION INTELLIGENCE DIVISION , which focuses … Controller/Lead Space Station Engineer Executive level experience in the spectrum of IOMT (Internet of Military Things) and mathematical modeling of networks. Certified Information Security Manager (CISM) Certified Authorization Professional (CAP) Information Systems Security Architecture Professional (ISSAP) InformationAssurance System Architecture and Engineer (IASAE) It More ❯
with model deployment and inference. Executive-level experience in model development and training. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilize equipment necessary to perform the job, and move about the office. ENVIRONMENT: This position will operate in the regulatory engineering division, MULTIDOMAIN DEFENCE … in data engineering and big data technologies. Highly skilled with object-orientation and software development best practices. Offensive Security Certified Professional (OSCP) . Certified Information Security Manager (CISM) . Information Systems Security Architecture Professional (ISSAP) is essential. Certified Authorization Professional (CAP) . InformationAssurance System Architecture More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
慨正橡扯
had one or more of: Practical experience of ISO27001/27004/27005 or NIST Risk Management Framework (RMF); Knowledge of UK/NATO InformationAssurance/Accreditation frameworks; Knowledge of EASA/FAA Airworthiness Certification frameworks; Awareness of current crypto technologies, Key Management Systems & practical COMSEC; Chartered … Engineer status with a recognised body; Awarded or looking to achieve an NCSC Certified Cyber Professional (CCP) recognition; Awareness of Information Security (INFOSEC), Communications Security (COMSEC), Transmission Security (TRANSEC), Product Safety and their inter-relationship; Experience of producing and delivering training/awareness material within a corporate environment; Familiarity … able to offer custom working; however, some on-site working is expected. Security Clearance You must be eligible for full security clearance. For more information and guidance, please visit: Diversity Statement We are relentless about inclusion. We understand an inclusive environment is one that welcomes everyone as they are. More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Bmt Defence Services LTD
if you can demonstrate expertise in at least one of the following areas : Security governance, risk and compliance (GRC), aligned with HMG cybersecurity and informationassurance policies, standards, and guidance with experience in consultancy or supplier roles. Securing OT (Operational Technologies) with knowledge and understanding of challenges, particularly More ❯
outside of the UK) and declaration of being a British passport holder with no dual nationalism at the point of application. Note: The above information relates to a specific client requirement Accenture is a leading global professional services company, providing a broad range of services in strategy and consulting … a client-facing role, and will be willing to contribute to our internal Digital Transformation strategy and expertise. In addition to working closely with Informationassurance and pen test teams to validate effectiveness of security controls or define new security solutions in an agile, innovative and team centric … subordinates. Communicating effectively verbally and in writing, demonstrated through: Effectively explain complex technical solutions to a non-technical audience. Writing meaningfully to deliver clear information and guidance. Giving impactful presentations, articulating clearly key points. Critical thinking and problem solving within information technology. What's in it for you More ❯