fulfilled. OT/IOT Security SME Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions More ❯
fulfilled. OT/IOT Security SME Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions More ❯
fulfilled. OT/IOT Security SME Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions More ❯
Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
remotely, Willing and able to travel occasionally to client sites as required. Experience auditing public sector organisations or government bodies Familiarity with relevant standardsand frameworks (e.g. ISO 27001, NIST, COBIT) What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us More ❯
developing intelligence-led detection content and operational playbooks would be a bonus. Skills You’ll Need: Advanced understanding of attacker tools, techniques, and procedures. Knowledge of security frameworks: OWASP, NIST, MITRE ATT&CK, Unified Kill Chain. Proficient in risk analysis and information systems best practices. Expertise in intelligence gathering and analysis tools, including OSINT. Strong knowledge of malware analysis, IOC More ❯
Job Description: Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT More ❯
Job Description: Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT More ❯
Job Description: Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions for asset discovery, OT More ❯
Investment Fund Salary: Up to £550p/d Duration : 6 month Location: London Responsibilities: Defined and executed the Privileged Access Management strategy, ensuring alignment with regulatory frameworks eg SOX, NIST Implemented and maintained secure access tools, integrating them with identity systems, monitoring platforms, and IT infrastructure. Automated account management processes, including credential updates, session tracking, and approval workflows. Conducted regular More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation
toolkit implementation Your Required Skills: Proven leadership in threat intelligence and vulnerability management Strong knowledge of threat actor TTPs, IoCs, and threat hunting methodologies Familiarity with TIPs, security frameworks (NIST, ISO), and OT/ICS environments Excellent stakeholder engagement skills across corporate and operational domains Ability to communicate technical controls to senior leadership Experience influencing security culture and behaviour within More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
toolkit implementation Your Required Skills: Proven leadership in threat intelligence and vulnerability management Strong knowledge of threat actor TTPs, IoCs, and threat hunting methodologies Familiarity with TIPs, security frameworks (NIST, ISO), and OT/ICS environments Excellent stakeholder engagement skills across corporate and operational domains Ability to communicate technical controls to senior leadership Experience influencing security culture and behaviour within More ❯
SR2 | Socially Responsible Recruitment | Certified B Corporation™
toolkit implementation Your Required Skills: Proven leadership in threat intelligence and vulnerability management Strong knowledge of threat actor TTPs, IoCs, and threat hunting methodologies Familiarity with TIPs, security frameworks (NIST, ISO), and OT/ICS environments Excellent stakeholder engagement skills across corporate and operational domains Ability to communicate technical controls to senior leadership Experience influencing security culture and behaviour within More ❯
watford, hertfordshire, east anglia, united kingdom
SR2 | Socially Responsible Recruitment | Certified B Corporation™
toolkit implementation Your Required Skills: Proven leadership in threat intelligence and vulnerability management Strong knowledge of threat actor TTPs, IoCs, and threat hunting methodologies Familiarity with TIPs, security frameworks (NIST, ISO), and OT/ICS environments Excellent stakeholder engagement skills across corporate and operational domains Ability to communicate technical controls to senior leadership Experience influencing security culture and behaviour within More ❯
security is embedded throughout the delivery lifecycle. This role is fully on-site in Basingstoke and will suit someone with a strong background in Secure by Design principles andNIST methodologies, who thrives in fast-paced, collaborative environments. Key Responsibilities: Lead the integration of security controls into infrastructure designs and solutions Act as the security subject matter expert across Scrum More ❯
engineering teams to deliver robust, secure solutions. Responsibilities • Design, develop, and maintain secure system architectures for MOD platforms, applications, and networks • Ensure alignment with relevant standardsand frameworks including NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance • Produce and maintain security documentation including Security Architecture Documents, Security Risk Assessments and Security Management Plans … understanding of systems engineering principles and secure development lifecycles • Experience developing artefacts to support MOD security assurance • Hands-on knowledge of risk management frameworks (e.g. HMG IS1/IS2, NIST RMF) • Excellent communication skills, both written and verbal – able to present to technical and non-technical stakeholders Certifications • Certified Information Systems Security Professional (CISSP) • Certified Information Security Manager (CISM) • SABSA More ❯
Strategic Thinking - able to translate technical risks into business outcomes and align security initiatives with client goals and budgets. Strong Governance Mindset - experienced in managing frameworks (Cyber Essentials, ISO27001, NIST) and embedding them into MSP operations and client environments. Risk Communication - skilled at presenting complex security issues clearly to non-technical stakeholders, both internally and at client leadership level. Technical … best practice, even when it means shifting established ways of working. Person Specification: Minimum 5+ years in IT security or MSP environment. Strong knowledge of Cyber Essentials, ISO27001, or NIST frameworks. Experience with patch/vulnerability management governance. Ability to communicate technical risks in business language. Proven ability to run client-facing reviews or presentations. Desirable CISSP, CISM, or equivalent More ❯
Tower Hamlets, London, United Kingdom Hybrid / WFH Options
Exponential-e
Significant experience in a pre-sales environment with the ability to talk confidently about technical solutions Clear understanding of cyber security best practices referencing the standards, i.e. NCSC, CIS, NIST, etc Excellent presentation skills the ability to articulate technical concepts to a non-technical audience What we offer: Work from home contract Work on the delivery of critical national infrastructure More ❯
Duties process into a business Experience of working in a collaborative manner with auditors, compliance and other key business stakeholders A strong understanding of framework for example ISO 27001, NIST or similar governance models Knowledge and understanding and experience of PAM More ❯
Duties process into a business Experience of working in a collaborative manner with auditors, compliance and other key business stakeholders A strong understanding of framework for example ISO 27001, NIST or similar governance models Knowledge and understanding and experience of PAM More ❯
tech expertise/25% pragmatic decision making On boarding external PMs to the fund Strong experience in one OO language, preference for python Strong SQL skills Experience with NIST frameworks Possessing one security qualification such as CISSP/CISA Please reply ASAP with CV if interested. 5 days a week in office Scope AT acts as an employment agency for More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
to agreed timescales, following through to completion Support the creation, implementation and maintenance of information security policies andstandards, in accordance with ISO 27001 other relevant frameworks andstandards (NIST CSF, IEC 62443, CIS, GDPR etc.) Maintain the department’s information security procedures, including but not limited to information security incident response and business continuity management, conducting tabletop exercises to … information security management and/or security awareness. In-depth expert knowledge of industry standard frameworks and best practices – ISO 27001: 2022, ISO 27002:2022, ISO 27005, ISO 31000, NISTand their practical application in a corporate environment to ensure all elements of integrity, availability and confidentiality are adhered to. Extensive experience conducting information security risk assessments, reporting risks Experience More ❯