priorities and requirements Experience of Secure Software Development Lifecycle processes and methodologies Knowledge and experience of applying best practice for solution security (e.g., OWASP, NCSC cloud security principles) Strong understanding and practical experience of performing security threat modelling and articulating risk profiles Deep understanding of security concepts and demonstrated application more »
security, endpoint/infrastructure security Up-to-date understanding of, and ensuring compliance to, security standards and regulations including GDS Technology Code of Practice, NCSCCyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability more »
and private cloud, containerisation and integrated third party service providers. Implementing other security standards such as ISO27001, NIST, NIS-D/NIS 2/NCSC CAF. Conducting cybersecurity risk assessments and managing risk management activities. Working with both technical teams and board members. Conducting cybersecurity assessments and gap more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
software. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
the Public Sector. Experience as a Security Architect within a consulting role. Strong proficiency in security best standards and frameworks such as ISO, NIST, NCSC, PCI-DSS etc. Exceptional communication and relationship-building skills with a focus on client satisfaction. UK national, possessing an active DV security clearance. If you more »
and make sound decisions on security-related issues. High standards of personal integrity and trustworthiness. Professional certifications and memberships (e.g., CISSP, ISO27000, CISM, CEH, NCSC, CCP) are highly desirable. ISMS Lead Auditor or ISMS Lead Implementer qualifications are advantageous. Strong background in IT operations, including computer operations, system programming, networking more »
or working towards Certified Information Security Manager (CISM) or SANS GICSP or equivalent information security practitioner level certifications. Familiarity with cloud security principles and NCSC Secure by Design principles. Experience working in a team structure with examples of managing different types of stakeholder relationships across a corporate structure. Experience working more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Reed Technology
or working towards Certified Information Security Manager (CISM) or SANS GICSP or equivalent information security practitioner level certifications. Familiarity with cloud security principles and NCSC Secure by Design principles. Experience working in a team structure with examples of managing different types of stakeholder relationships across a corporate structure. Experience working more »
who deliver a wide range of cybersecurity services to private and public sectors. A CREST CHECK accredited security business on multiple Crown Supplier NCSC frameworks, they now require 2 additional BDM's to drive their security services growth. The Role? As a new Business Development Manager you will sell more »
Barrow-In-Furness, Cumbria, North West, United Kingdom
Reed Technology
configuration and management Security best practices and experience conforming to standards such as: ISO27001:2022 Framework OWASP NIST CSF PCI DSS 4.0 SOC-2 NCSC Best Practices more »
Rugby, Warwickshire, West Midlands, United Kingdom
Upbeat Ideas UK Ltd
UK site (subject to COVID regulations and customer requirements). Security Clearance level Restrictions apply. Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps to cybersecurity, MOD CyberSecurity Directives. Any relevant Cybersecurity certifications (SANS, ISACA, ISC2, SSCP, CISSP, GIAC, CISA, CISM) Quickly able to more »
City of London, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
National Policy level or production of organisational policies for CISO/CIO. Experience working with UK or other International Government departments, ideally the UK NCSC or foreign equivalents. Client side consulting, including stakeholder engagement and the ability to communicate insights and concepts to others (including briefing skills and report writing more »
UK site (subject to COVID regulations and customer requirements). Security Clearance level Restrictions apply. Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps to cybersecurity, MOD CyberSecurity Directives. Any relevant Cybersecurity certifications (SANS, ISACA, ISC2, SSCP, CISSP, GIAC, CISA, CISM) Quickly able to more »
ordinator: Relevant IT security experience. Writing of accreditation security case (RMADS). Experience and knowledge of Government IA Policy, including JSP440, JSP604, DIANS and NCSC IA guidance. Experience of close working relationships with Accreditation Authorities in the UK, as well as leading Security Working Groups as a way of managing more »
mindset of developing secure systems and act as a subject matter expert in cybersecurity. Experience in working with MOD e.g., CyDR, JSP 604, or NCSC Cybersecurity Assessment Framework, or HMG, or commercial defence and security environments would be an added benefit. Skills and Qualifications Significant experience working in a securitymore »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
network and security technologies; developing requirements for network and cloud security designs as well as hardware & software. Possess awareness and understanding of HMG and NCSCSecurity policies, standards and guidance. Passionate in cyber security. Able to deliver training to end users. Motivated, self-directed and able to work in large more »
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom Hybrid / WFH Options
Reed Technology
information security standards domain. Experience working with external audit and certification organisations. Familiarity with the ISO27001 standard and knowledge of the NIS regulation and NCSCcyber assurance framework (CAF). Understanding of digitalisation in a regulated environment and experience managing complex projects. Knowledge of system development life cycle methodologies (e.g. more »
business online. As a trusted and independent national capability, the UKTL will interact at the intersection of standards bodies, such as 3GPP, the NationalCyberSecurityCentre and the wider UK intelligence community, academia, Ofcom,as well as Communications Service Providers and telecommunication equipment vendors. Successful Applicants must be able more »
information models Experience of working in a Regulated environment. Experience and Skills: A good understanding of ICT and business architecture. A good understanding of NCSC architectural approach. Ability to interpret business requirements and technical ICT documents into architectural diagrams and documents. Good communication skills across all levels of the business more »
Manchester, Greater Manchester, United Kingdom Hybrid / WFH Options
Anson McCade
inclusive teams.Cyber Security:Experience in architecting secure, cloud-based (AWS) applications, including CI/CD.Familiar with Zero Trust Architecture, SBD, OWASP, NIST, CIS, and NCSC baselines.Strong foundation across the cybersecurity technology stack.Desirable:Prior experience working in agile delivery teams.Familiarity with the GDS Service Manual.About the Client:Our client is at more »
Key skills & Experience required: A degree or higher-level qualification in Computing science or a related subject Experience in security and data protection eg NCSC best practices and GDPR Experience in up to date programming principles such as SOLID, DRY and YAGNI Experience in developing software solutions using technologies such more »