frameworks and attack simulations Identify vulnerabilities and help prioritise remediation efforts Collaborate with internal teams to embed cyber security best practices Apply industry standards such as MITRE ATT&CK, NIST, OWASP, STRIDE, PASTA Produce strategic risk and threat reports for senior stakeholders Stay ahead of the curve with threat intelligence and geopolitical awareness Skills Experience with threat modelling, red teaming … vulnerability management or active defence Knowledge of TTPs, threat actor motivations, and cyber frameworks (e.g. NIST CSF, FAIR, ISO 27001) Ability to interpret and design Data Flow Diagrams (DFDs) and security controls Familiarity with Government Functional Standardsand compliance requirements Creative and analytical thinking to approach complex cyber security challenges A collaborative mindset with a willingness to mentor and share More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Longridge, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯