log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
warrington, cheshire, north west england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
oxford district, south east england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
portsmouth, hampshire, south east england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
swindon, wiltshire, south west england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
south west london, south east england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
kingston upon hull, east yorkshire, yorkshire and the humber, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
crawley, west sussex, south east england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
bolton, greater manchester, north west england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
newcastle-upon-tyne, tyne and wear, north east england, United Kingdom
Pentest People
log analysis of Networking, Windows, Mac and Linux and Cloud. Understanding of evidence collection process based on priority. Strong understanding of incident response following NIST 800-61 guidelines incorporating containment, eradication and recovery phases. Experience with digital forensics and investigations, including evidence collection and chain-of-custody protocols. Should have More ❯
cybersecurity projects to ensure timely delivery within budget. Perform or coordinate security assessments, penetration tests, and vulnerability scans. Ensure compliance with frameworks like COBIT, NIST, ISO, PCI, GDPR, HIPAA, etc. Provide internal support for security issues within SLAs. Evaluate and implement CIS controls as needed. Contribute to cybersecurity strategic planning … change management policies. Qualifications Bachelor's degree required; advanced degree highly desirable. Minimum 5 years experience in Information Security. Proficiency in security frameworks like NIST, implementing and auditing security measures. Knowledge of Cisco networking, firewalls, VPN, DLP, IDS/IPS, SIEM, and related technologies. Experience with identity access management solutions … SAML, OAuth. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Ability to analyze and recommend security improvements. Desired Qualifications Certifications like CISSP, NIST CSF, CCSP, CEH. Knowledge of cloud security (AWS, GCP, Azure). Experience managing Cisco ELA products, Splunk, SolarWinds, Varonis, Darktrace. Experience in HIPAA/FDA More ❯
Enhancement: Contribute to the development and refinement of enterprise security architecture methodologies, such as TOGAF and SABSA and Framework adoption such as those in NIST 2.0. Security Tooling Roadmaps: Create detailed roadmaps for security tooling, incorporating vendor investment tracking, horizon scanning, and global threat landscape changes, and communicate … Attack Surface Management. Cloud Security & Risk applied to all service and deployment ISO standards including 27001, 27002, 27005, 270017, 27018, 22301 andNIST CSF 2.0. Technical Security within one or many of the following domains: Identity and Access Management: Expertise in PAM … Control). Microsoft Cybersecurity Expert incl. M365 Security, Azure Security, Identity & Access Management and Security Operations. AWS Security. NIST Cybersecurity Professional (NCSP) Practitioner. ISO27001. Vendor Qualifications - Cisco, VMware, Fortinet, Checkpoint etc. Chartered membership in professional security bodies. More ❯
security assessments across cloud (AWS, Azure) and SaaS platforms to identify risks and ensure compliance with internal policies and industry standards (ISO 27001, CIS, NIST). Manage and enforce Identity and Access Management (IAM) controls, including conditional access, MFA policies, role-based access control (RBAC), and least-privilege enforcement across … Security Services. Strong background in cloud security (AWS/Azure), including the shared responsibility model. Familiarity with compliance frameworks (ISO 27001, GDPR, SOC 2, NIST). Hands-on experience with EDR tools (CrowdStrike, Defender for Endpoint) and SIEM/SOAR platforms. Basic scripting for automation and reporting using PowerShell or More ❯
of cybersecurity frameworks for ICS/OT environments Strong understanding of OT network communication protocols and industrial networking topologies. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication … or NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Plan) frameworks Understanding of general cybersecurity frameworks (ISO IEC 27001/27002, ISO 15408, NIST Cybersecurity Framework (CSF), NIST SP800-53), and Guide to Industrial Control Systems (ICS) Security (NIST SP800-82) A working knowledge of industrial control systems (e.g. More ❯
of cybersecurity frameworks for ICS/OT environments Strong understanding of OT network communication protocols and industrial networking topologies. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication … or NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Plan) frameworks Understanding of general cybersecurity frameworks (ISO IEC 27001/27002, ISO 15408, NIST Cybersecurity Framework (CSF), NIST SP800-53), and Guide to Industrial Control Systems (ICS) Security (NIST SP800-82) A working knowledge of industrial control systems (e.g. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Vantage Data Centers
of cybersecurity frameworks for ICS/OT environments Strong understanding of OT network communication protocols and industrial networking topologies. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication … or NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Plan) frameworks Understanding of general cybersecurity frameworks (ISO IEC 27001/27002, ISO 15408, NIST Cybersecurity Framework (CSF), NIST SP800-53), and Guide to Industrial Control Systems (ICS) Security (NIST SP800-82) A working knowledge of industrial control systems (e.g. More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Vantage Data Centers
of cybersecurity frameworks for ICS/OT environments Strong understanding of OT network communication protocols and industrial networking topologies. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication 800-61 Revision 2, Computer Security Incident Handling Guide. Familiarity with NIST (NationalInstituteofStandardsandTechnology) Special Publication … or NERC CIP (North American Electric Reliability Corporation Critical Infrastructure Plan) frameworks Understanding of general cybersecurity frameworks (ISO IEC 27001/27002, ISO 15408, NIST Cybersecurity Framework (CSF), NIST SP800-53), and Guide to Industrial Control Systems (ICS) Security (NIST SP800-82) A working knowledge of industrial control systems (e.g. More ❯
of delivering security solutions for large-scale infrastructure, transformation or integration programmes Practical knowledge and understanding of industry security frameworks and guidance such as NIST CSF, NIST 800-53, NCSC CAF and other NCSC guidelines Good knowledge of networking (switching, routing, firewalls) Experience with the design concepts associated with adoption More ❯
third-party technology providers, and support incident response and investigations. Experience: Cyber Security Knowledge – Solid understanding of cyber/information security frameworks such as NISTand ISO/IEC 27002:2022 Strong Communication Skills – Ability to translate technical concepts into accessible language for a variety of stakeholders Threat Awareness – Good More ❯
third-party technology providers, and support incident response and investigations. Experience: Cyber Security Knowledge – Solid understanding of cyber/information security frameworks such as NISTand ISO/IEC 27002:2022 Strong Communication Skills – Ability to translate technical concepts into accessible language for a variety of stakeholders Threat Awareness – Good More ❯
is paramount, considering the future security landscape too. You’ll lead and ensure compliance with a range of international security frameworks such as ISO27001, NISTand CMMC which are vital this company. Building relationships and engaging with stakeholders at all levels, you’ll understand business processes to ensure security solutions More ❯
third-party technology providers, and support incident response and investigations. Experience: Cyber Security Knowledge – Solid understanding of cyber/information security frameworks such as NISTand ISO/IEC 27002:2022 Strong Communication Skills – Ability to translate technical concepts into accessible language for a variety of stakeholders Threat Awareness – Good More ❯
third-party technology providers, and support incident response and investigations. Experience: Cyber Security Knowledge – Solid understanding of cyber/information security frameworks such as NISTand ISO/IEC 27002:2022 Strong Communication Skills – Ability to translate technical concepts into accessible language for a variety of stakeholders Threat Awareness – Good More ❯
third-party technology providers, and support incident response and investigations. Experience: Cyber Security Knowledge – Solid understanding of cyber/information security frameworks such as NISTand ISO/IEC 27002:2022 Strong Communication Skills – Ability to translate technical concepts into accessible language for a variety of stakeholders Threat Awareness – Good More ❯