Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
AJ Bell
working with firewalls is highly advantageous Awareness of Cloud security solutions andstandards is highly advantageous Experience working within recognised Information Security frameworks and best practices such as ISO27001, NIST etc. Experience in an Information Security role gained in a financial services or e-commerce environment is preferred Ability to challenge approach, strategy and implementation to ensure Information Security is More ❯
and ensure that new technologies are sufficiently secure and protected Collaborate with other teams to ensure compliance with internal security policies and external regulations (e.g., ISO 27001, PCI-DSS, NIST, GDPR) Skills & Experiences: Required Experience and Qualities 5+ years hands-on experience in cybersecurity roles (ideally with a background in Infrastructure) Strong experience with Microsoft Sentinel: rule creation, threat hunting … of Microsoft Defender suite (for Endpoint, Identity, Cloud, etc) Ideally, knowledge of AWS security stack would be including GuardDuty, CloudWatch and SecurityHub Familiarity with industry frameworks: MITRE ATT&CK, NIST, CIS benchmark, PCI-DSS Excellent incident responder with a passion for problem-solving Strong sense of ownership, able to independently drive engineering projects Always learning, keeping up-to-date with More ❯
clearance, or is willing to undergo the security vetting process; Strong academics, including a minimum of 2.1 degree or equivalent experience Familiarity with information security frameworks such as ISO27001, NIST etc; Willingness to operate as part of an 'on-call roster', travelling to assist our UK and EMEA clients when required in an incident management capacity; Connect to your business More ❯
Drive innovation and thought leadership within the Practice by defining standards, sharing knowledge, and mentoring peers Influence customer outcomes through expert knowledge of DevSecOps tools and compliance frameworks like NIST, CIS, SOC 2, and PCI DSS You'll travel to client sites across the UK, working directly with business and technical stakeholders to drive real business value What you'll More ❯
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
cyber security controls, designing solutions that enable defence in depth and services with security controls embedded. Significant experience of implementing enterprise security tooling and platforms in line with the NIST cyber security framework or equivalent, and CIS security controls. Influential and able to lead investigative work into problems and opportunities in existing processes, driving the collection of information and creation More ❯
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
cyber security controls, designing solutions that enable defence in depth and services with security controls embedded. Significant experience of implementing enterprise security tooling and platforms in line with the NIST cyber security framework or equivalent, and CIS security controls. Influential and able to lead investigative work into problems and opportunities in existing processes, driving the collection of information and creation More ❯
preston, lancashire, north west england, united kingdom Hybrid / WFH Options
DWP Digital
cyber security controls, designing solutions that enable defence in depth and services with security controls embedded. Significant experience of implementing enterprise security tooling and platforms in line with the NIST cyber security framework or equivalent, and CIS security controls. Influential and able to lead investigative work into problems and opportunities in existing processes, driving the collection of information and creation More ❯
maintain company systems and their security. Liaise with global Security Operations Centre colleagues to resolve any issues. Ensure compliance with relevant regulations, standards, and frameworks (e.g., GDPR, ISO 27001, NIST) Review and update security program documentation. Support customer relations and requirements per commercial agreements. Develop, implement, and maintain security policies, processes, procedures and guidelines. Assist with internal and external audits … sensitive information with sound judgement. Understanding of PKI. Desirable: Bachelor's degree in Computer Science, IT or Information Security. Compliance exposure with relevant security frameworks andstandards (PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetration testing experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. More ❯
OCTAVE, MITRE ATT&CK. • Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. • An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. • Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. • An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. • Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. • Familiar with the functions ofMore ❯
OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions ofMore ❯
OCTAVE, MITRE ATT&CK. Up to date knowledge of cyber security threats, threat actor motivation and capability, and relevant threat group TTPs. An understanding of risk management frameworks e.g. NIST, FAIR, Orange Book, and an understanding of Government Functional Standards e.g. GovS 007. Knowledge of security control (and maturity) frameworks e.g. NIST (e.g. CSMA, CSF), CIS, ISO 27000 series, CSA … Cloud Controls Matrix, NCSC CAF, and an understanding of the types and functions of security controls. An understanding of hypothetical attack paths, familiarity with NIST CSF tools and able to use it for gap analysis. Understands Data Flow Diagrams (DFD) and trust boundaries and is able to create one using information provided about an environment. Familiar with the functions ofMore ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
IT Process Improvement and Maturity Lead IT Process Improvement and Maturity Lead - IT Maturity Assessments, Maturity Models, IT Security Function, CMMI, COBIT, NIST, ITIL, ISO 27001, Resource Management - Hybrid (Preston) - to £57k + excellent pension and bonus My client has an urgent need for an IT Process Improvement and Maturity Lead to play a key role in ensuring that its … working with teams with conflicting priorities - Experience of resource management and financial estimating planning for IT project work - Working knowledge of any maturity models, standards or frameworks (CMMI, COBIT, NIST, ITIL, ISO 27001) would be ideal The role will also involve managing and reporting on KPIs for the IT and Security function, recommending improvements/changes to these KPIs andMore ❯
blackburn, lancashire, north west england, united kingdom
Essential Recruitment
IT Process Improvement and Maturity Lead IT Process Improvement and Maturity Lead - IT Maturity Assessments, Maturity Models, IT Security Function, CMMI, COBIT, NIST, ITIL, ISO 27001, Resource Management - Hybrid (Preston) - to £57k + excellent pension and bonus My client has an urgent need for an IT Process Improvement and Maturity Lead to play a key role in ensuring that its … working with teams with conflicting priorities - Experience of resource management and financial estimating planning for IT project work - Working knowledge of any maturity models, standards or frameworks (CMMI, COBIT, NIST, ITIL, ISO 27001) would be ideal The role will also involve managing and reporting on KPIs for the IT and Security function, recommending improvements/changes to these KPIs andMore ❯