Qualifications: Minimum 5 years+ experience leading a Cyber Security Assurance function or similar such as Cyber Security Integration function, Cyber Security Engineering function with some experience in assurance testing techniques and methodologies. Bachelor's Degree in Cybersecurity, Computer Science, Information Systems, related field or equivalent training and …/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global InformationAssurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track record leading more »
in 2 home) Rapidly expanding, US backed, Service Business. Committed to delivering outstanding service and creating memorable service levels and experience. As the Information and Data Governance Specialist, you will lead data governance, data management, records management and records retention activities. This role involves cataloguing data, developing quality metrics … data flows between systems, with the aim of ensuring access to, and visibility of, data are appropriately permissioned across the business. Monitor and review information security practices internally and within our supply chain to mitigate risks and enhance data protection. Requirements: Proven experience in informationassurance, records … management, and data governance roles. Good understanding of information security standards and practices (e.g., ISO 27001, GDPR). Experience conducting security assessments and audits Knowledge of records retention principles, policies, and best practices. Proficiency in developing and implementing filing taxonomies and retention schedules. more »
Defining product security requirements, advising development teams on suitable implementation standards and techniques and overseeing product development activities. Liaison with Security Accreditors and Security Assurance Coordinators in support of security accreditation. Preparation of Protection Profiles, Security Targets and Evaluation Management Plans, and liaison with NCSC and commercial evaluation teams … discipline, and/or evidence of further professional study. Registered NCSC certified professional at senior level or above, or NCSC recognised qualification, e.g. ISC2Certified Information System Security Professional. Knowledge of UK/NATO InformationAssurance standards, procedures & systems, including Government Functional Standard GovS 007: Security, HMG IS1 more »
crawley, west sussex, south east england, United Kingdom
InfoSec People Ltd
Architecture Manager, Cyber Security Operations Manager, Cyber Security Governance, Risk and Compliance Manager, and Cyber Security Portfolio Manager. They will also support the wider Information Systems team, IT Service Providers and partners to implement and optimise cyber security technical assurance capabilities across four main services; Technical Security Compliance … Product Security Assurance, Vulnerability Management (VM), and Disaster Recovery and Business Continuity. Key responsibilities: Define and deliver the cyber security technical assurance strategy, setting out clear policies and technical standards, modelling best practices and measuring success against defined measurement metrics (KPIs). Manage the cyber security technical assurance … ensure the quality and timeliness of services and deliverables to meet our requirements, reviewing performance, driving improvements, optimisation and automation of the cyber security assurance capabilities across a variety of technologies and platforms. Ensure the IT estate is compliant with The Client's policies and technical standards to protect more »
Administer employee and contractor entry passes. Manage receipt and dispatch of all classified assets. Maintain classified asset register. Conduct classified asset musters. Manage the informationassurance profile of our IT infrastructure. Manage and maintain Cyber Essentials Plus certification. Ensure adherence to required security frameworks, protocols on site and more »
people in it. There will be a huge amount of autonomy to make important decisions. Key responsibilities: Develop and implement the cybersecurity assurance strategy, establishing clear policies and technical standards. Model best practices and track success using defined KPIs. Lead the cybersecurity technical assurance team, ensuring high-quality … and timely services and deliverables. Continuously review performance, drive improvements, and optimise and automate cybersecurity assurance capabilities across various technologies and platforms. Ensure the IT infrastructure adheres to policies and technical standards, safeguarding company assets by driving remediation actions and countermeasures to address identified weaknesses and vulnerabilities. Set up … and enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT more »
people in it. There will be a huge amount of autonomy to make important decisions. Key responsibilities: Develop and implement the cybersecurity assurance strategy, establishing clear policies and technical standards. Model best practices and track success using defined KPIs. Lead the cybersecurity technical assurance team, ensuring high-quality … and timely services and deliverables. Continuously review performance, drive improvements, and optimise and automate cybersecurity assurance capabilities across various technologies and platforms. Ensure the IT infrastructure adheres to policies and technical standards, safeguarding company assets by driving remediation actions and countermeasures to address identified weaknesses and vulnerabilities. Set up … and enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT more »
Romsey, Hampshire, South East, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited
InformationAssurance Consultant - Permanent - Romsey/Gloucester This opportunity will see you joining the Defence Security & InformationAssurance Team providing technical security architecture and Security Assurance Services to a wide range of defence clients. You will contribute to the development of security capabilities ranging from … Security & Assurance services to leading edge Vulnerability Management and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security … you have previous experience in: Supporting MOD projects following JSP 604 and JSP 440 methodology including Secure by Design (SbD). Delivery of security assurance services in support of Defence Digital, DE&S or Strategic Command. Co-ordination of security assurance activities such as ITHC/penetration testing. more »
Stevenage, Hertfordshire, South East, United Kingdom
Omega Resource Group
UK Procurement Department in the implementation of the Supply Chain Cyber Security Policy. Qualifications & Requirements – Systems Engineer Knowledge and understanding of MOD and Government information security policy, standards, and guidance. Experience in information security Risk Assessments, Risk Treatment Plans, and Risk Management and Accreditation Documents. Proven knowledge of … supply chain cyber security challenges Informationassurance experience across the Systems Engineering Development Lifecycle (preferred). Effective written and verbal communication skills, with the ability to adapt depending on the audience. Ability to discern key technical, commercial, and program influences from available information. Systems thinking and systems engineering more »
Stevenage, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Omega Resource Group
the MBDA UK Procurement Department in the implementation of the Supply Chain Cyber Security Policy Qualifications & Requirements Knowledge and understanding of MOD and Government information security policy, standards, and guidance. Experience in information security Risk Assessments, Risk Treatment Plans, and Risk Management and Accreditation Documents. Proven knowledge of … supply chain cyber security challenges, Cyber Essentials, DefCon 658, Def Stan 05-138, and Def Stan 05-139. (preferred) Informationassurance experience across the Systems Engineering Development Lifecycle (preferred). Effective written and verbal communication skills, with the ability to adapt depending on the audience. Ability to … discern key technical, commercial, and program influences from available information. Systems thinking and an understanding of systems engineering For more information on this role, please contact Angelika Zaucha by sending a copy of your CV to For details of other opportunities available within your chosen field please visit our more »