of delivering security solutions for large-scale infrastructure, transformation or integration programmes Practical knowledge and understanding of industry security frameworks and guidance such as NIST CSF, NIST 800-53, NCSC CAF and other NCSC guidelines Good knowledge of networking (switching, routing, firewalls) Experience with the design concepts associated with adoption of Cloud platforms (AWS and/or Microsoft Azure) An More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
involves ensuring compliance with security standards, managing incidents, and collaborating with internal and external stakeholders. Key Responsibilities : Lead and manage the CyberSecurity Operations team. Ensure compliance with security standards (ISO27001, NCSC CAF). Manage security incidents and vulnerabilities. Collaborate with third-party suppliers and internal teams. Provide expert advice on security technologies and processes. Requirements : Proven team leadership experience.Strong … inquiries and establish the team as the primary resource for advice. Efficiently manage the workload of personnel, ensuring timely completion of tasks and continuous improvement. Ensure continued compliance with NCSC, DHSC Cyber Assessment Framework, and HM Government Cybersecurity strategy. Develop, maintain, and promote security procedures and standards in line with NHSBSA requirements. Implement, monitor, and report on agreed service … compliance with the NationalCyberSecurityCentre (NCSC) an the Department of Health and Social Care (DHSC) Cyber Assessment Framework (CAF)and continued adherence to HM Government Cybersecurity strategy and NCSC standards and best practice. 7. Supports the strategic direction of the Cybersecurity operation function by the development, maintenance, promotion and stewardship of Security Procedures and Standards, in More ❯
tools Experience with Qualys or enterprise Vulnerability Management and Compliance toolsets. Security legislation and regulatory frameworks exposure and awareness • Industry best practices such as OWASP, Cybersecurity framework and NCSC guidance • Information Security Management System (Infrastructure Security Operations and Incident Management). • NIST CyberSecurity Framework • ISO 27001 - Information Security Management System (ISMS) • CIS - Center of Internet Security (CybersecurityMore ❯
risk programs to align with internal business objectives as well as industry good practice (including Secure by Design aligned to UK Government principles) and regulatory requirements (including GovAssure and NCSCCyber Assurance Framework). What you'll be doing: Develop and execute GRC strategies that align with business objectives and inform appropriate supporting business processes Drive pragmatic and creative solutions … decisions Lead initiatives that build a culture of accountability and responsibility across engagements Enhance governance processes and advise on how best to evidence alignment with regulatory requirements (such as NCSC CAF) and industry good practice (including Secure by Design) Providing security expertise across security standards and accreditations, measure and control the effectiveness of the security controls framework and maintain the … Relevant certifications such as CISSP, CISM, CCSP, CISA, CRISC or equivalent experience Expertise and practical knowledge and understanding of industry security frameworks and guidance such as NIST 800-53, NCSC CAF GovAssure, NIST CSF, DORA and NCSC guidelines Good knowledge and understanding of CyberSecurity domains, including; network and cloud security, security operations, vulnerability management, Third Party supplier Risk Management More ❯
role Proven track record in delivering security solutions for large-scale infrastructure, transformation, or integration projects Practical knowledge of industry security frameworks such as NIST CSF, NIST 800-53, NCSC CAF, and other guidelines Good understanding of networking (switching, routing, firewalls) Experience with Cloud platforms (AWS and/or Microsoft Azure), including native security features and best practices Deep knowledge More ❯
of delivering security solutions for large-scale infrastructure, transformation or integration programmes Practical knowledge and understanding of industry security frameworks and guidance such as NIST CSF, NIST 800-53, NCSC CAF and other NCSC guidelines Good knowledge of networking (switching, routing, firewalls) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good … of delivering security solutions for large-scale infrastructure, transformation or integration programmes Practical knowledge and understanding of industry security frameworks and guidance such as NIST CSF, NIST 800-53, NCSC CAF and other NCSC guidelines Good knowledge of networking (switching, routing, firewalls) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good More ❯
Model and Defence Standards e.g. forthcoming changes to Def Stan 05-138. Have a NIST Cybersecurity Professional certification. Be a Certified Cloud Security Professional (CCSP). Have a NCSC Certified Cyber Professional (CCP) Information System Security Manager and/or Security & Information Risk Advisor certification or background. Have a Certified Information Systems Security Professional (CISSP) certification or background. Have More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
It would be nice if you had: Excellent understanding of the engineering lifecycle and key gate review activities. Knowledge of current Crypto technologies,Key ManagementSystems & practicalCOMSECimplementations and MOD/NCSC standards. Knowledge or experience of ARP4754A/ARP4761 and its interrelationship with security. Security Clearance You must be eligible for full security clearance. For more information and guidance please visit … including Defence, Telecommunications, Energy and Finance to help secure national infrastructure and commerce in the UK and beyond. Our Practice is certified by the UK NationalCyberSecurityCentre (NCSC) in the provision of advice and guidance to our customers. At Leonardo UK, we believe that a diverse and inclusive work environment unlocks our people's full potential and drives More ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Leonardo
It would be nice if you had: Excellent understanding of the engineering lifecycle and key gate review activities. Knowledge of current Crypto technologies,Key ManagementSystems & practicalCOMSECimplementations and MOD/NCSC standards. Knowledge or experience of ARP4754A/ARP4761 and its interrelationship with security. Security Clearance : Life at Leonardo With a company funded benefits package, a commitment to learning and development More ❯
advise where necessary Experience in software security design review Strong knowledge of Agile, DevSecOps, System Engineer and or equivalent Knowledge of security standards and secure development principles such as NCSC Secure Development & Deployment Guidance, OWASP, NIST Secure Software Development Framework (SSDF - 800-218), Microsoft Azure Secure Development best practices, ISO27001 Experience with Azure cloud infrastructure, particularly Azure PaaS service Experience More ❯
advise where necessary Experience in software security design review Strong knowledge of Agile, DevSecOps, System Engineer and or equivalent Knowledge of security standards and secure development principles such as NCSC Secure Development & Deployment Guidance, OWASP, NIST Secure Software Development Framework (SSDF - 800-218), Microsoft Azure Secure Development best practices, ISO27001 Experience with Azure cloud infrastructure, particularly Azure PaaS service Experience More ❯
and analytical solutions Working knowledge of cloud orchestration and containerisation technologies, such as Docker and Kubernetes Working knowledge of DevOps, CI/CD and Infrastructure-as-Code Understanding of NCSC Cloud Security Principles and its practical implementations Aker Systems Attributes At Aker we work as a team, we are collaborative, hardworking, open, and delivery obsessed. There is no blame culture More ❯
and analyse the security logs and alerts generated by these technologies and take appropriate actions. CyberSecurity Frameworks : Working knowledge of Cyber Essentials, ISO27001:2022, CSA Cloud Controls Matrix, NCSC CAF and GDPR, is important to ensure that data is being managed. Programming and scripting: Proficient programming and scripting skills to automate security tasks, develop custom security scripts and tools More ❯
and analyse the security logs and alerts generated by these technologies and take appropriate actions. CyberSecurity Frameworks : Working knowledge of Cyber Essentials, ISO27001:2022, CSA Cloud Controls Matrix, NCSC CAF and GDPR, is important to ensure that data is being managed. Programming and scripting: Proficient programming and scripting skills to automate security tasks, develop custom security scripts and tools More ❯
London, England, United Kingdom Hybrid / WFH Options
Circle Group
technical stakeholders. Experience delivering assessments under the CHECK scheme (e.g., as a CHECK Team Member/Leader) - desirable Knowledge of UK public sector security and data protection standards (e.g., NCSC, Cyber Essentials Plus) - desirable Threat modelling and secure design practices - desirable Role/Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated … secure code practices. Provide expert input on cloud security (AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with company and NCSC guidelines. If you are interested in the above role, please click Apply Now and send a CV for quick review. As a member of the Disability Confident Scheme, Circle and More ❯
London, England, United Kingdom Hybrid / WFH Options
Gespreksleider Jacobs
and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (NationalCyberSecurityCentre ) guidelines and to guide and mentor others throughout DBT. Main responsibilities You will: Interact with senior stakeholders across the department and influence a wide, diverse group of stakeholders … penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance and architecture patterns alongside familiarity with architecture methodologies such as SABSA and TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Gespreksleider Jacobs
and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (NationalCyberSecurityCentre ) guidelines and to guide and mentor others throughout DBT. Main responsibilities You will: Interact with senior stakeholders across the department and influence a wide, diverse group of stakeholders … penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance and architecture patterns alongside familiarity with architecture methodologies such as SABSA and TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level More ❯
Darlington, England, United Kingdom Hybrid / WFH Options
Gespreksleider Jacobs
and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (NationalCyberSecurityCentre ) guidelines and to guide and mentor others throughout DBT. Main responsibilities You will: Interact with senior stakeholders across the department and influence a wide, diverse group of stakeholders … penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance and architecture patterns alongside familiarity with architecture methodologies such as SABSA and TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Gespreksleider Jacobs
and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (NationalCyberSecurityCentre ) guidelines and to guide and mentor others throughout DBT. Main responsibilities You will: Interact with senior stakeholders across the department and influence a wide, diverse group of stakeholders … penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance and architecture patterns alongside familiarity with architecture methodologies such as SABSA and TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Gespreksleider Jacobs
and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (NationalCyberSecurityCentre ) guidelines and to guide and mentor others throughout DBT. Main responsibilities You will: Interact with senior stakeholders across the department and influence a wide, diverse group of stakeholders … penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance and architecture patterns alongside familiarity with architecture methodologies such as SABSA and TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Gespreksleider Jacobs
and technologies and effectively communicate security and risk implications across technical and non-technical stakeholders. You will manage the Security Architecture team, covering critical review architecture referencing NCSC (NationalCyberSecurityCentre ) guidelines and to guide and mentor others throughout DBT. Main responsibilities You will: Interact with senior stakeholders across the department and influence a wide, diverse group of stakeholders … penetration testing and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and emerging technologies Strong understanding of NCSC information security guidance and architecture patterns alongside familiarity with architecture methodologies such as SABSA and TOGAF Excellent communication skills, with the ability to apply security concepts to a technical level More ❯
the secure design, assessment, and assurance of device and end point secure solutions , as part of a key Machinery of Government initiative, Developer Device Solution , aligned with government and NCSCsecurity principles. We are seeking applications from candidates with: Security architecture experience in the EUC space. Proven experience designing and delivering cybersecurity architecture in Central Government or regulated environments. … for CI/CD and DevOps pipelines (e.g., Github, Gitlab, Azure DevOps, Jenkins). Understanding of End point Detection and Response (EDR), SIEM, MDM, & policy enforcement tools. Familiarity with NCSC Cloud Security Principles and Government Security Classifications. Experience with Zero Trust models and secure identity architectures. Security Clearance. Advantageous skills include CISSP, CISM, SABA; experience with Intune, Workspace One, Jamf More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
portfolio worth hundreds of millions of pounds. Working with product owners, delivery managers and enterprise architects, you will ensure every new or changed service conforms to Home Office and NCSC standards while enabling rapid, user centred delivery. You will analyse emerging threats, advise on proportional mitigations, and produce or tailor reference patterns covering identity, network segmentation, container security, data protection More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Cyber UK
cyber risk, cyber maturity, security architecture, cyber transformation and regulatory compliance for cyber. Experience of various recognised cybersecurity relevant standards and regulations, such as NIST CSF, CRI2.0, ISO27001, NCSC CAF, GDPR and NIS2 or equivalent. Experience working in a variety of environments or organisational contexts to develop cyber strategy and manage cyber risk. Desire to work with large organisations More ❯
London, England, United Kingdom Hybrid / WFH Options
JN Bank UK
to ensure our customers receive an excellent service seven days a week. Duties & Responsibilities: · Develop, implement, and maintain information security policies, procedures, and standards aligned with industry best practices (NCSC recommendations, UK DPA, ISO 27001, PCI DSS, NIST etc.). · Lead and support risk assessments, vulnerability scans, and security audits. · Manage day-to-day security operations, including monitoring, incident detection More ❯