Poole, Dorset, South West, United Kingdom Hybrid / WFH Options
FT Recruitment
efforts are truly appreciated. To be considered for this role youll have the following skills and experience: - Previous experience in a similar role - Working knowledge of Cyber Essentials, ISO27001, NIST etc. - Ability to review & audit IT Infrastructure security processes - Review and revise Data Protection policies and provide staff training - Take ownership of Identity and Access systems and controls - Knowledge ofMore ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
starting individual with strong technical knowledge across on-prem and cloud environments, and ideally experience in areas such as: Network security, IAM, SIEM, and threat detection Compliance frameworks (e.g. NIST, ISO 27001, CIS Controls) Security automation and scripting Producing security artefacts and documentation Experience within Operational Technology/IoT-rich environments would be an added bonus If this sounds like More ❯
align with the client's risk profile and operational needs. Guide clients in developing and improving their incident response processes, including playbook creation and alignment with security frameworks like NISTand ISO 27001. Regularly review and optimise SIEM configurations to reduce false positives, improve detection accuracy, and adapt to evolving threat landscapes. Advisory & Compliance: Advise clients on aligning SIEM deployments … years of experience in SIEM consulting, SOC, or security operations roles with a focus on threat detection and response. Strong understanding of threat detection methodologies, security frameworks (e.g., NIST, ISO 27001), and compliance requirements. Experience with SIEM design and architecture, data ingestion, log management, and custom dashboard creation. Familiarity with cloud-native security solutions and knowledge of security practices in More ❯
Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this More ❯
Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this More ❯
Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this More ❯
Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this More ❯
Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23/09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST 800-53 or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001/2, ISO27005/31000, NIST 800-30, NIST 800-53) If this More ❯
and CISM qualifications. Experience required: Security assurance, working with JSP440, JSP604/453. Security accreditation. Implementation of Secure by Design. Implementing security standardsand frameworks, such as ISO 27001, NIST 800 and CAF. Conducting Cyber Security risk assessments and managing risk management activities. Experience of working within highly classified environments, implementing, and ensuring compliance with Above Secret requirements and controls. … platforms, and SaaS. Working as a Security Assurance Co-Ordinator Working with various technical teams. Conducting Cyber Security assessments and gap analysis against various frameworks. Qualifications they look For: NIST Foundation/Practitioner CISM CRISC CISSP CISMP Senior Security Consultant – DV Cleared – up to £75,000 + bonus - Corsham - On-Site 2 days per week More ❯
collaborative team of infrastructure and DevOps engineers Build secure, scalable infrastructure (Windows/Linux, VMs, containers) Drive CI/CD, automation, and Infrastructure as Code practices Ensure compliance with NIST, NCSC, CIS, JSP, and ISO 27001 Oversee backup, DR, and business continuity strategies Maintain strong cyber hygiene and proactively manage vulnerabilities Create documentation and a knowledge-sharing culture Work cross … hands-on expertise with strategic oversight. Essential Experience & Skills: Proven experience in secure IT infrastructure & DevOps leadership Strong technical background in systems administration & automation Solid grasp of compliance frameworks (NIST, NCSC, JSP) Excellent communication and stakeholder management Tech Stack You'll Work With: OS: Windows Server, Hardened Linux Containers/Orchestration: Docker, Kubernetes, Portainer DevOps Tools: Jenkins, Artifactory, Jira, Azure More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
a good experience working within IT/OT in an operational or corporate environment with a good knowledge of control frameworks such as ISO27001, ITIL (Information Technology Infrastructure Library), NIST, SABSA and IEC 62443 and cyber kill chain. You ll have a good knowledge of Risk Management Methodologies such as ISO27005 and IRAM2/security frameworks NIST/NIS CAF More ❯
Edmonton, Cornwall, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Cranham, Gloucestershire, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Brixton, Devon, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Stamford Hill, Cornwall, United Kingdom Hybrid / WFH Options
Sky
audits and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and … Azure AD, GSuite, LDAP). Deep understanding of legacy and modern authentication protocols, access controls, and identity lifecycle management. Strong security awareness and familiarity with standards such as ISO27001, NIST, and CIS, with experience conducting audits and implementing controls. Solid grasp of Web APIs including SOAP, REST, and GraphQL, and their role in IAM integrations. Excellent communication, organisational, and stakeholder More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
Sky's privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and … Expertise in cross platform scripting (Powershell, bash etc.). Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have experience with threat modelling methodologies e.g., STRIDE. Have a good understanding of Access Controls More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid / WFH Options
Sky
address any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring … and cloud directory services (LDAP, Azure AD, GSuite etc.) Be a subject matter expert on both legacy and modern authentication protocols. Have excellent security awareness including standards e.g., IS027001, NISTand CIS. Have a good understanding of Web APIs including SOAP, REST and GraphQL architectures. Have a good understanding of Access Controls and Identity Lifecycle management. Have excellent communication andMore ❯