Thornhill, Cardiff, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Blackwood, Gwent, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Bridgend, Mid Glamorgan, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Response Consultancy services. Assist in designing and maintaining incident response plans and playbooks tailored to client environments. Support and facilitate cyber incident exercises and simulations, aligned with Bridewell's NCSC CIE assurance framework. Act as a supporting incident coordinator during active incidents, helping manage stakeholder communications and documentation. Assess clients' incident response capabilities and documentation against regulatory requirements and industry More ❯
and develop secure architectures for MOD platforms, systems, and networks. Align solutions with frameworks such as NIST SP 800-53, ISO 27001, JSP 440, DEF STAN 05-138, and NCSC guidance. Produce and maintain documentation: Security Architecture Documents, Risk Assessments, and Security Management Plans. Lead and support design reviews and assurance gates. Liaise with MOD, NCSC, and Information Assurance teams More ❯