Liverpool, Merseyside, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
remotely, Willing and able to travel occasionally to client sites as required. Experience auditing public sector organisations or government bodies Familiarity with relevant standardsand frameworks (e.g. ISO 27001, NIST, COBIT) What you need to do now If you're interested in this role, click 'apply now' to forward an up-to-date copy of your CV, or call us More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
continuity teams to embed cyber risk Improve processes, tools, and methodologies What we’re looking for Strong knowledge of cyber risk and enterprise risk registers Familiarity with frameworks like NIST, ISO 27001 or NCSC CAF Confident presenting to technical and exec audiences Skilled with reporting tools (Excel, Power BI, GRC platforms) Organised, proactive, and a clear communicator What’s on More ❯
work closely with both internal and external stakeholders across Legal, Risk & Audit, Procurement, and IT to embed strong governance and maintain alignment with leading standards such as ISO 27001, NIST CSF, and GDPR. The position combines both strategic oversight and hands-on delivery, providing clear visibility of risks and driving measurable improvements in security maturity. This role is majority onsite … PCI-DSS environment Develop, maintain, and evolve the cyber governance and compliance framework. Define and manage information and cyber security policies, standards, and procedures. Ensure alignment with ISO 27001, NIST CSF, GDPR, and other relevant regulations. Partner with internal teams to integrate governance and compliance into daily operations. Support policy reviews, updates, and communication across business units. Risk Management & Assurance More ❯
Thorpe, Yorkshire, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Shadwell, Leeds, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Manor Park, Cheshire, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Barnes, north east england, united kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
northumberland, north east england, united kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Busby, Yorkshire, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Crook of Devon, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
stirling, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
alva, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
cupar, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
dunblane, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
kirkcaldy, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
auchterarder, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
perth, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
forgandenny, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
crieff, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
tillicoultry, north east scotland, united kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯