and automation Experience with CI/CD pipeline security and Infrastructure-as-Code (Terraform, ARM, etc.) Familiarity with compliance standards such as ISO 27001, NIST, and CIS Benchmarks Excellent communication and stakeholder management skills Contract Details: Day rate: £550 Outside IR35 6-month initial term Based in London with flexible More ❯
and automation Experience with CI/CD pipeline security and Infrastructure-as-Code (Terraform, ARM, etc.) Familiarity with compliance standards such as ISO 27001, NIST, and CIS Benchmarks Excellent communication and stakeholder management skills Contract Details: Day rate: £550 Outside IR35 6-month initial term Based in London with flexible More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Premier Group
and automation Experience with CI/CD pipeline security and Infrastructure-as-Code (Terraform, ARM, etc.) Familiarity with compliance standards such as ISO 27001, NIST, and CIS Benchmarks Excellent communication and stakeholder management skills Contract Details: Day rate: £550 Outside IR35 6-month initial term Based in London with flexible More ❯
slough, south east england, United Kingdom Hybrid / WFH Options
Premier Group
and automation Experience with CI/CD pipeline security and Infrastructure-as-Code (Terraform, ARM, etc.) Familiarity with compliance standards such as ISO 27001, NIST, and CIS Benchmarks Excellent communication and stakeholder management skills Contract Details: Day rate: £550 Outside IR35 6-month initial term Based in London with flexible More ❯
A solid understanding of data security principles and mechanisms, including encryption and masking and familiarity with major security standardsand frameworks (e.g., ISO 27001, NIST, OWASP). Any experience with programming languages like Python, Go, or Java would be a distinct advantage. More ❯
Evaluate and recommend security tools, services and configurations to strengthen cloud security posture. Ensure compliance with security standardsand frameworks such as ISO 27001, NIST, CIS, GDPR and others. Lead threat modelling, risk assessments, and security reviews for GCP infrastructure and applications. Define and enforce Identity and Access Management (IAM More ❯
detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS More ❯
detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS More ❯
detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS More ❯
detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS More ❯
and preparing security reports. Requirements: Degree qualified in Computer Science or similar. Extensive relevant experience in cybersecurity including knowledge of: frameworks andstandards (ISO27001, NIST); security tools and technologies (firewalls, IDS/IPS); regulatory requirements (GDPR, HIPAA); cloud and general internet security. Good communication skills and ability to work well More ❯
and insource CIRT capabilities Driving continuous improvement through post-incident reviews and threat landscape analysis Ensuring compliance with regulatory requirements and frameworks (e.g. GDPR, NIST, PCI-DSS, MITRE ATT&CK) Requirements 5–10 years of experience in Security Operations, CIRT, or senior SOC roles Strong leadership capability or experience managing More ❯
and insource CIRT capabilities Driving continuous improvement through post-incident reviews and threat landscape analysis Ensuring compliance with regulatory requirements and frameworks (e.g. GDPR, NIST, PCI-DSS, MITRE ATT&CK) Requirements 5–10 years of experience in Security Operations, CIRT, or senior SOC roles Strong leadership capability or experience managing More ❯
and insource CIRT capabilities Driving continuous improvement through post-incident reviews and threat landscape analysis Ensuring compliance with regulatory requirements and frameworks (e.g. GDPR, NIST, PCI-DSS, MITRE ATT&CK) Requirements 5–10 years of experience in Security Operations, CIRT, or senior SOC roles Strong leadership capability or experience managing More ❯
and insource CIRT capabilities Driving continuous improvement through post-incident reviews and threat landscape analysis Ensuring compliance with regulatory requirements and frameworks (e.g. GDPR, NIST, PCI-DSS, MITRE ATT&CK) Requirements 5–10 years of experience in Security Operations, CIRT, or senior SOC roles Strong leadership capability or experience managing More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom
Eteam Workforce Limited
detection systems, including rules engines, threat modelling, and risk assessment. Knowledge of emerging cybersecurity threats and vulnerabilities, as well as industry standards like FIDO, NIST 800-63, or ISO 27001. Understanding of Agile and Scrum methodologies, including backlog management, sprint planning, and iterative development. Familiarity with cloud platforms like AWS More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯
risk strategy, appetite, and framework. What we're looking for: Practical knowledge of various information security and risk frameworks andstandards such as ISO27001, NIST, Cyber Essentials. GRC experience is essential (risk awareness, identification, articulation and mitigation). Whilst this role won't see you utilising technical cyber security tools More ❯