Leeds, England, United Kingdom Hybrid / WFH Options
AppCheck Ltd
Enterprise customers in a B2B SaaS context. Experience of working with B2C SaaS/reseller networks. Knowledge & Skills: An understanding of compliance frameworks such as GDPR, ISO 27001, SOC, NIST, HIPAA, etc and how they shape requirements. Knowledge of SQL (preferably DuckDB) for data analysis. An understanding of the current state and capabilities of LLMs for assessing AI opportunities. An More ❯
cloud providers such as AWS Ability to understand and develop coding languages such as Terraform, Python & KQL (or similar) Recognised cyber security certifications or qualifications (desirable). Experience with NIST (or similar) security framework(s). What we offer: We believe that all the people who work with us should feel valued for the part they play. It's one More ❯
CI/CD pipelines to employee devices to cloud configurations. You'll thrive here if you have: 4+ years in cybersecurity or technical security roles Familiarity with frameworks like NIST, ISO 27001, or CIS Controls Working knowledge of networking, OS (Windows/macOS), and security protocols Experience with tools like Splunk, CrowdStrike, Nessus, Palo Alto, Wireshark Basic cloud security knowledge More ❯
design, development, deployment, and support phases. Qualifications 7+ years in IT security, with a focus on product and cyber security design Strong understanding of industry standardsand frameworks (e.g., NIST 800-53, NIST CSF, NIST 800-171, IEC 62443, ISO 27001) Proficiency in network, application, and database security architecture Hands-on experience with vulnerability testing and threat analysis In-depth More ❯
you will help our clients: Security Architecture: Translate business, data protection and security requirements into practical and well-structured architectural designs, utilizing industry best practices and security frameworks (e.g., NIST, ISO 27001, CIS). Develop and maintain secure architectural patterns andstandards, with a solid working knowledge of cloud security (AWS, Azure, GCP). Apply risk-based and threat-based … information security, data protection, and security architecture roles, with a focus on cloud security, and compliance. Strong understanding of security governance, risk, and compliance frameworks such as ISO 27001, NIST 800-53/CSF, NIS/NIS2, DORA, UK CNI/OT/IIOT compliance. Hands-on experience building credibility with external stakeholders through technical presentations, audits, or compliance reporting More ❯
win plans. Maintain and update security policies, procedures, and incident response plans. Deliver security awareness training and advise clients on best practices. Support audits and compliance initiatives (ISO 27001, NIST, GDPR, etc.). Work cross-functionally with internal and external teams, including partner engagements. Research emerging threats and recommend security framework enhancements. Mentor and support junior security team members. What … and KQL. Proven skills in threat detection, incident response, and forensic analysis. Knowledge of SOAR tools (especially Palo Alto XSOAR or similar). Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting/automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. More ❯
assessments and ensure remediation plans are executed effectively. Maintain relevant security certifications such as Cyber Essentials/Plus and support the business in aligning with broader security frameworks (e.g., NIST CSF, CIS Controls). Awareness & Security Culture Lead internal training, briefings and onboarding sessions to build awareness and support for secure behaviours across the organisation. Act as a security advocate … to cyber incidents. Familiar with automating tasks with Python or similar programming languages, as well as using SQL to query data at scale. Knowledge of security frameworks such as NIST CSF, CIS Controls, and Cyber Essentials, with working knowledge of ISO 27001 beneficial but not essential. Understanding of UK data protection law and its practical application within a security programme. More ❯
and certification processes like FRACAS/CAP and corrective actions. Our architecture emphasizes not only functionality but also aligns with business processes and government policies, including cybersecurity standards like NIST SP 800-171, CMMC, and ITAR compliance. We aim to leverage Generative AI models to analyze data, identify knowledge gaps, and maintain operational and regulatory compliance, especially with DFARS andMore ❯
Gartner analysts have many years of experience and enjoy solving puzzles. Subject matter expertise and hands-on experience in enterprise security architecture and architecture frameworks such as SABSA andNIST CSF. Experience with applying security architecture end-end; from business analysis to technical component selection. Subject matter expertise in cloud security, with the ability to demonstrate understanding of the business More ❯
Woking, Surrey, England, United Kingdom Hybrid / WFH Options
Michael Page Technology
Collaborate with the cybersecurity function to secure infrastructure against threats targeting critical national infrastructure, including OT (Operational Technology) environments. * Ensure compliance with maritime, data protection, and operational standards including NIST, and local port authority requirements. * Lead business continuity and disaster recovery planning with specific emphasis on safeguarding terminal and cargo operations. Budgeting & Resource Management * Manage operational and capital budgets for More ❯
Remote Access technologies and networking products. Experience in assessing controls based on COBIT or other leading technology risk management and governance control framework. Experience in assessing controls based on NIST, SANS, ISO27000 or other leading cyber security framework. Very good presentation and report writing skills. Producing draft reports that require minimal changes. Qualifications: University degree in a technology related discipline More ❯
and know how to influence/negotiate technical outcomes with 3rd parties, including conflict resolution due to changing priorities. Experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standardsof Good Practice (SoGP) and ISACA's Control Objectives for Information and related Technology (COBIT) frameworks. Actively More ❯
access management in alignment with defence-grade standards Security Assurance & Compliance Ensure commission controls comply with MOD policies (eg JSP 440/JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access More ❯
access management in alignment with defence-grade standards Security Assurance & Compliance Ensure commission controls comply with MOD policies (e.g. JSP 440/JSP 604) and security frameworks such as NIST, ISO 27005, STIGs, and UK Functional Standard 007 Vulnerability Assessment & Access Review Support regular access reviews, entitlement audits, and role certification; identify and remediate potential vulnerabilities in provisioning and access More ❯
policies, standards, and procedures, etc.).Knowledge and/or experience in applying systems security policies andstandards in engineering cyber-physical systems such as the Risk Management Framework (RMF), NIST SP (Apply online only), DO-326, and DoDI 5000.83.Excellent communications skills: able to influence without authority and describe complex ideas simply and succinctly to non-technical people.We are an equal More ❯
repudiation and privacy. Excellent communication skills to technical, business and non-technical audiences at all levels, presenting with excellent written and verbal skills. Knowledge of leading standards such as NISTand topics such as Security Controls, Risk Management, Cloud technologies and Zero Trust Architecture. Desirable Criteria Ideally, you will also have experience of: Leading multi-disciplinary security teams and building More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
repudiation and privacy. Excellent communication skills to technical, business and non-technical audiences at all levels, presenting with excellent written and verbal skills. Knowledge of leading standards such as NISTand topics such as Security Controls, Risk Management, Cloud technologies and Zero Trust Architecture. Desirable Criteria Ideally, you will also have experience of: Leading multi-disciplinary security teams and building More ❯
for client and UiPath field. What you'll bring Proven experience in cybersecurity leadership; prior CISO/CSO experience is a strong plus. Deep knowledge of security frameworks (e.g., NIST, ISO 27001) and compliance standards (e.g., GDPR, HIPAA, PCI-DSS). Strong expertise in secure SDLC, and application security tooling (SAST, DAST, SCA). Excellent communication skills with the ability More ❯
Cloud engineering experience with security tooling and cloud workload protection Skilled in DevOps, AWS, Infrastructure as Code (Terraform), and scripting (Python, Bash) Knowledge of secure engineering standards (OWASP, CIS, NIST) and Agile/DevOps practices Experienced with CSPM, CNAPP, security incident response, and SIEM tools Ability to evaluate and recommend new security technologies Clear communicator focused on enhancing developer experience More ❯
of automation testing in an Agile Software environment Close familiarity with some or all of: Network management and optimisation Postgresql Database management and optimisation With common security frameworks CIS, NIST, OWASP Familiarity with Public Cloud Services like AWS GCP Azure Familiarity with co-located physical infrastructure (we're currently hybrid) Solid understanding of Continuous Integration (CI) and Continuous Deployment (CD More ❯
in ISO 27001 implementation as a minimum, but preferably also experience in ISOs 27701/22301/9001 A strong understanding of information security and data privacy frameworks like NIST Cybersecurity Framework (CSF), GDPR, CIS or similar. Experience of certification body audits. Should have good experience and knowledge of Cyber/Information Security Governance, Risk Management, and Compliance. ISO Consultant More ❯
Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever Brazil
Find out more about our commitment to equity, diversity, and inclusion on our website . Unilever's Cyber Security team is a global, product-led function aligned to the NIST Cyber Security Framework. We deliver capabilities across governance, protection, detection, response, and recovery to safeguard our people, operations, and digital assets. Operating alongside our Technologyand Data teams, Cyber Security More ❯
track record of using tools such as Snyk, Trivy, Checkov, OPA/Gatekeeper/OWASP ZAP, or similar to enforce pipeline and platform security. Familiarity with compliance requirements (e.g., NIST, ISO 27001, CIS Benchmarks) and their implementation via code. Ability to lead and mentor teams on secure coding, threat modelling, and secure architecture patterns. Experience with monitoring, logging, and security More ❯
/GRC role Professional certifications including but not limited to CISSP, CCSP, CISM, CRISC, CISA, CDPSE. Experience in auditing and implementing security standards such as ISO 27001/2, NIST CSF, and others. Exceptional verbal, written communication, and presentation skills. Ability to articulate technical requirements to non-technical audiences. Proven self-management skills and ability to work on multiple assignments More ❯
with police forces across the UK. NPPV3 Clearance is essential, and you must be based in the UK. Key Skills and Experience: Extensive experience applying standards such as ISO27001 , NIST , JSP440/JSP604 , and NCSC guidance Proven background in information risk management , governance , and security assurance Experience leading or contributing to risk assessments , audits , and security documentation Strong knowledge ofMore ❯