Central London, London, United Kingdom Hybrid / WFH Options
Velocity Talent Ltd
Location: London / Greater London / Home-based with regular travel Reports To: Certification Manager / Head of Audit and Compliance Department: Information Security Certification About Us We are a UKAS-accredited certification body delivering independent audit and certification services across multiple management system standards, including ISO 9001, ISO … in or around London to join our expanding audit team. Youll lead and conduct Information Security Management System (ISMS) audits in line with ISO/IEC 27001:2022 , ISO 17021 , and UKAS requirements. Key Responsibilities Plan, conduct, and report Stage 1, Stage 2, surveillance, and recertification … audits for ISO 27001. Assess client ISMS implementations for conformity and effectiveness against ISO/IEC 27001:2022. Lead audits independently or as part of a multi-standard team (e.g. ISO 9001, ISO 22301, ISOMore ❯
Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst 2-3 Days onsite - Crawley 6-9 Month duration Reporting line: The Analyst will report to the Cyber Security Response Manager and work within the Information Systems directorate, based in the Crawley office. Job purpose: The role of an Incident Response (CSIRT) / SOC Level … contained and eradicated. Cyber Crisis Testing: Participate in cyber-attack simulations and scenario exercises to test resilience and improve preparedness. Reporting: Develop and improve reporting dashboards and security / performance metrics to drive continuous improvement in security operations. Security Tools Support: Support the implementation, maintenance, and configuration of security tools and systems for prevention, detection, and response. Audit … environments. SOC-specific training, qualifications, or a degree in Computer Science, Cybersecurity, IT, or a related subject. Ideally hold recognised security qualifications such as CISSP, AZ-500, GIAC / GCIA / GCIH, CASP+, CEH, or SIEM certifications. Strong knowledge of log correlation, analysis, forensics, and chain of custody requirements. Familiarity with regulatory frameworks (NCSC CAF, ISOMore ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT) / SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC / GCIA / GCIH, AZ-500, CEH, CASP+, or SIEM-specific training. Strong knowledge of SIEM, SOAR, EDR, IDS / IPS, NAC, DLP, and related security … technologies. Familiarity with frameworks such as MITRE ATT&CK, NIST, CIS, and ISO/IEC 27001 / 27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensic analysis, red-team exercises, and crisis simulation activities. Desirable More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
Morson Edge
Incident Response (CSIRT) / SOC Level 3 Analyst Location: Crawley (Hybrid) Department: Information Systems Type: Contract | Full-time Outside IR35 About the Role My client is seeking an experienced Incident Response (CSIRT) / Security Operations Centre (SOC) Level 3 Analyst to join their Information Systems directorate, based in Crawley. In this critical role, you'll respond … incident response and advanced threat hunting. A degree in Computer Science, Cybersecurity, IT, or a related discipline, or equivalent professional experience. Industry-recognised certifications such as CISSP, GIAC / GCIA / GCIH, AZ-500, CEH, CASP+, or SIEM-specific training. Strong knowledge of SIEM, SOAR, EDR, IDS / IPS, NAC, DLP, and related security … technologies. Familiarity with frameworks such as MITRE ATT&CK, NIST, CIS, and ISO/IEC 27001 / 27002. Hands-on experience with tools such as FortiSIEM, Q-Radar, Microsoft Defender, Darktrace, Microsoft Sentinel, or similar platforms. Experience in forensic analysis, red-team exercises, and crisis simulation activities. Desirable More ❯
affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23 / 09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST … or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001 / 2, ISO27005 / 31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further More ❯
affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23 / 09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST … or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001 / 2, ISO27005 / 31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further More ❯
affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23 / 09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST … or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001 / 2, ISO27005 / 31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further More ❯
affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23 / 09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST … or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001 / 2, ISO27005 / 31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further More ❯
affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23 / 09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST … or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001 / 2, ISO27005 / 31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further! Product Security Architect Permanent role Based in Bristol More ❯
affecting products Your skillset may include: Knowledge of HMG standards (including MOD-specific JSP, Def Stan 05-138, Def Stan 05-139) An understanding of MOD ISN 23 / 09 Secure by Design Knowledge of security frameworks, such as ISO/IEC 27001, NIST 800-30, NIST … or OWASP Working with risk management frameworks and methodologies (e.g., ISO 27001 / 2, ISO27005 / 31000, NIST 800-30, NIST 800-53) If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further! Product Security Architect Permanent role Based in Bristol More ❯
Person Specification Qualifications Essential ITIL v3 Service Management Qualification Educated to degree level or equivalent Formal certification (ISACA: Certified Information Security Manager (CISM). CISSP, or CRISC) and / or formal training in information security standards and best practice (e.g.: ISO 27001 / 2, COBIT), or equivalent work experience demonstrating understanding of … the same. Experience Essential Extensive experience of developing and delivering an Information Security service to a large complex organisation using confidential and / or sensitive information Desirable IT experience gained in both and Acute and Community setting Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such … any previous criminal convictions. Employer details Employer name Royal Berkshire NHS Foundation Trust Address Royal Berkshire Hospital Princes House, London Road Reading RG1 5UZ Employer's website https: // www.royalberkshire.nhs.uk /More ❯
program, organisational structures, and capabilities Possess a deep technical knowledge in Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response / Next Gen Protection and Response (EDR / XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and … / or analysis and investigations, ideally in complex environments, with security event correlations across a variety of sources i.e. cloud, network, endpoint, logs Ability to perform detailed assessments, identify areas for improvement and make recommendations to transform an organisation's cyber security operations and capabilities to better protect, detect and rapidly respond to modern threats Demonstrated experience in … security operations capabilities such as improvements in asset visibility, threat detection capabilities, automation techniques, case management, enablement of compliance and regulatory requirements Experience in conducting threat hunting and / or compromise assessments to identify active or dormant indicators of compromise (IoCs) or evidence of unknown threats within an organisations digital environment Relevant industry certifications including GIAC Defensible Security More ❯
program, organisational structures, and capabilities Possess a deep technical knowledge in Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response / Next Gen Protection and Response (EDR / XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and … / or analysis and investigations, ideally in complex environments, with security event correlations across a variety of sources i.e. cloud, network, endpoint, logs Ability to perform detailed assessments, identify areas for improvement and make recommendations to transform an organisation's cyber security operations and capabilities to better protect, detect and rapidly respond to modern threats Demonstrated experience in … security operations capabilities such as improvements in asset visibility, threat detection capabilities, automation techniques, case management, enablement of compliance and regulatory requirements Experience in conducting threat hunting and / or compromise assessments to identify active or dormant indicators of compromise (IoCs) or evidence of unknown threats within an organisations digital environment Relevant industry certifications including GIAC Defensible Security More ❯
program, organisational structures, and capabilities Possess a deep technical knowledge in Security Incident and Event Management (SIEM) platforms, Security Orchestration and Response (SOAR) technologies, Endpoint Protection and Response / Next Gen Protection and Response (EDR / XDR) tools, Next GenFirewalls, Threat Intelligence and Hunting platforms Defensive Security Skills (desired) : Experience in security operations design, engineering and … / or analysis and investigations, ideally in complex environments, with security event correlations across a variety of sources i.e. cloud, network, endpoint, logs Ability to perform detailed assessments, identify areas for improvement and make recommendations to transform an organisation's cyber security operations and capabilities to better protect, detect and rapidly respond to modern threats Demonstrated experience in … security operations capabilities such as improvements in asset visibility, threat detection capabilities, automation techniques, case management, enablement of compliance and regulatory requirements Experience in conducting threat hunting and / or compromise assessments to identify active or dormant indicators of compromise (IoCs) or evidence of unknown threats within an organisations digital environment Relevant industry certifications including GIAC Defensible Security More ❯
threat modelling, risk assessments, and recommend effective security controls following "Secure by Design" principles Develop security documentation, reference architectures, and governance frameworks aligned with NIST, NCSC, and ISO standards Collaborate with stakeholders across all defence lines to ensure regulatory, privacy, and risk compliance Mentor junior consultants and support the growth of the Security Practice through knowledge … KPIs, and compliance measures What you'll bring: Knowledge of frameworks such as NIST CSF, NIST 800-53, and NCSC CAF Strong understanding of networking, cloud security (AWS / Azure), IAM, and vulnerability management Familiarity with ISO 27001 /27002 and related standards Awareness of modern threats, malware, and security More ❯
Hemel Hempstead, Hertfordshire, England, United Kingdom
Sopra Steria
bring: Proficient in using SIEM technologies such as Splunk, Sentinel, and QRadar. Thorough grasp of security standard methodologies and protocols, for instance ISO 27001 /27002, PCI DSS. Familiarity with security frameworks such as NIST, ISO, and CIS. Experience with programming languages such as Python, PowerShell, and regex. More ❯
and resolve customer issues. Adept in Windows, Linux, and MAC operating systems. Experience or demonstrated knowledge of threat detection and incident response. Bachelor's degree in Technology and / or Cybersecurity or relevant experience. *Bonus Points:* Incident Management and CSIRT operation Change Management Malicious Code: Detection and Response Audit, Logging, and Monitoring Controls (SIEM, UEBA, MDR / … across multiple teams to resolve customer issues and requests Demonstrated experience as a security advisor or consultant Knowledge of the following frameworks: ISO 27001 / 2, NIST Cyber Security Framework, CIS Critical Security, PCI DSS, Cloud Controls Matrix and MITRE Att&ck a plus. *Benefits Of Working At CrowdStrike:* Remote-friendly and flexible work … other characteristic protected by law. We base all employment decisions--including recruitment, selection, training, compensation, benefits, discipline, promotions, transfers, lay-offs, return from lay-off, terminations and social / recreational programs--on valid job requirements. If you need assistance accessing or reviewing the information on this website or need help submitting an application for employment or requesting an More ❯
system security engineering, ideally in defence, space, or critical infrastructure Familiarity with MOD, NCSC, and ISO standards (e.g. ISO 27001 / 2, NIST 800-series, JSP 604) Competence in requirements engineering and systems thinking Practical experience with security in software and / or system development environments Effective communication … system architectures or satellite communications DevSecOps awareness or experience with security automation Benefits: Annual Company Bonus 25 Days holiday not including bank holidays with the option to buy / sell up to 5 days Competitive pension contribution Continuous professional development including incentives Access to online Udemy training facility Flexible working arrangements Bike to work scheme Electric car scheme More ❯
system security engineering, ideally in defence, space, or critical infrastructure Familiarity with MOD, NCSC, and ISO standards (e.g. ISO 27001 / 2, NIST 800-series, JSP 604) Competence in requirements engineering and systems thinking Practical experience with security in software and / or system development environments Effective communication … system architectures or satellite communications DevSecOps awareness or experience with security automation Benefits: Annual Company Bonus 25 Days holiday not including bank holidays with the option to buy / sell up to 5 days Competitive pension contribution Continuous professional development including incentives Access to online Udemy training facility Flexible working arrangements Bike to work scheme Electric car scheme More ❯
Key Responsibilities . Define and implement security capabilities and governance across the platform. . Ensure compliance with the National Law Enforcement Data Portfolio Integrated Management System (IMS) (ISO27001 / 2 ISO27005 BS10008). Ensure compatibility with the Cross-Government Secure by Design (SbD) Strategy throughout the lifecycle of the cloud systems. . Embed security requirements and stage gates More ❯
Governance policies. Person Specification Qualifications Masters level degree or equivalent experience in a related subject Formal certification (ISACA: Certified Information Security Manager (CISM). CISSP, or CRISC) and / or formal training in information security standards and best practice (e.g.: ISO 27001 / 2, COBIT), or equivalent work experience demonstrating understanding of More ❯
Brighton, Sussex, United Kingdom Hybrid / WFH Options
McCabe & Barton
Monitor and review technology control effectiveness and follow up on remediation actions Evaluate compliance against internal standards, regulatory expectations and recognised industry frameworks (such as NIST and ISO) Assist with supplier due diligence and third-party technology risk assessments Support elements of the operational resilience programme and technology incident review activity Prepare clear, concise reporting and … teams Naturally inquisitive with the ability to break down detail and provide clear conclusions Comfortable working across several workstreams at once Knowledge of ISO27002, NIST, PCI DSS, UK GDPR or cloud environments (such as Azure) would be advantageous This role would suit someone who enjoys detail, enjoys engaging with people and wants to More ❯
Brighton, East Sussex, South East, United Kingdom Hybrid / WFH Options
McCabe & Barton
Monitor and review technology control effectiveness and follow up on remediation actions Evaluate compliance against internal standards, regulatory expectations and recognised industry frameworks (such as NIST and ISO) Assist with supplier due diligence and third-party technology risk assessments Support elements of the operational resilience programme and technology incident review activity Prepare clear, concise reporting and … teams Naturally inquisitive with the ability to break down detail and provide clear conclusions Comfortable working across several workstreams at once Knowledge of ISO27002, NIST, PCI DSS, UK GDPR or cloud environments (such as Azure) would be advantageous This role would suit someone who enjoys detail, enjoys engaging with people and wants to More ❯
Northampton, Northamptonshire, East Midlands, United Kingdom Hybrid / WFH Options
McCabe & Barton
Monitor and review technology control effectiveness and follow up on remediation actions Evaluate compliance against internal standards, regulatory expectations and recognised industry frameworks (such as NIST and ISO) Assist with supplier due diligence and third-party technology risk assessments Support elements of the operational resilience programme and technology incident review activity Prepare clear, concise reporting and … teams Naturally inquisitive with the ability to break down detail and provide clear conclusions Comfortable working across several workstreams at once Knowledge of ISO27002, NIST, PCI DSS, UK GDPR or cloud environments (such as Azure) would be advantageous This role would suit someone who enjoys detail, enjoys engaging with people and wants to More ❯
London, Elephant & Castle, United Kingdom Hybrid / WFH Options
The Bridge IT Recruitment
be very occasional meetings in Westminster and active SC Clearance is essential. The key skills required for this AWS Security Product Owner role are: Compliance with (IMS) (ISO27001 / 2 ISO27005 BS10008) Technical Security Lead for Product Team Define and implement security capabilities and governance across the platform If you do have the relevant experience for this AWS More ❯