networks. Align solutions with frameworks such as NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain documentation: Security Architecture Documents, Risk Assessments, and Security Management Plans. Lead and support design reviews and assurance gates. Liaise with MOD, NCSC, and Information Assurance teams to support accreditation and assurance. Collaborate with … DEF STANs). Proven background in Secure by Design and security compliance (ISO 27001, CE/CE+). Experience producing security artefacts for MOD assurance. Working knowledge of riskmanagement frameworks (HMG IS1/IS2, NIST RMF). Excellent communication skills confident engaging with technical and non-technical stakeholders. Must hold ACTIVE SC Clearance applicants without current clearance More ❯
standards and frameworks including; NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance Produce and maintain security documentation including; Security Architecture Documents, Security Risk Assessments, and Security Management Plans Lead and support secure design reviews and contribute to engineering assurance gates Liaise with security stakeholders (MOD, NCSC etc.), Information Assurance teams, and … compliances (e.g. ISO 27001, CE/CE+) Solid understanding of systems engineering principles and secure development lifecycles Experience developing artefacts to support MOD security assurance Hands-on knowledge of riskmanagement frameworks (e.g. HMG IS1/IS2, NIST RMF) Excellent communication skills, both written and verbal – able to present to technical and non-technical stakeholders Certified Information Systems More ❯
the Cyber Resilience Manager, you'll work across technical and governance functions to ensure ongoing protection against an evolving threat landscape, while supporting incident response, architecture design, compliance, and risk management. Key Responsibilities Design and maintain enterprise-wide cloud security architectures aligned to business objectives and compliance requirements Implement security controls across infrastructure, applications, and cloud platforms Conduct riskMore ❯