Lead architecture design, delivery assurance, and systems integration Provide strategic technical direction and mentorship Oversee technology roadmaps, supplier evaluation, and solution quality Drive compliance with security frameworks (e.g., GDPR, NCSC guidance) Contribute to design authorities and technical governance forums What Were Looking For Expert in application/integration architecture and systems assurance Strong understanding of architecture frameworks and delivery governance More ❯
Lead architecture design, delivery assurance, and systems integration Provide strategic technical direction and mentorship Oversee technology roadmaps, supplier evaluation, and solution quality Drive compliance with security frameworks (e.g., GDPR, NCSC guidance) Contribute to design authorities and technical governance forums What Were Looking For Proven leadership in designing & delivering large-scale, secure systems Expert in application/integration architecture and systems More ❯
Lead architecture design, delivery assurance, and systems integration Provide strategic technical direction and mentorship Oversee technology roadmaps, supplier evaluation, and solution quality Drive compliance with security frameworks (e.g., GDPR, NCSC guidance) Contribute to design authorities and technical governance forums What Were Looking For Proven leadership in designing & delivering large-scale, secure systems Expert in application/integration architecture and systems More ❯
Lead architecture design, delivery assurance, and systems integration Provide strategic technical direction and mentorship Oversee technology roadmaps, supplier evaluation, and solution quality Drive compliance with security frameworks (e.g., GDPR, NCSC guidance) Contribute to design authorities and technical governance forums What Were Looking For Proven leadership in designing & delivering large-scale, secure systems Expert in application/integration architecture and systems More ❯
of well-architected frameworks and vendor-endorsed best practices. Relevant cloud certifications at the expert/practitioner level. Knowledge of UK public sector technology guidance and frameworks, such as NCSC's Cyber Assessment Framework (CAF) and the Technology Code of Practice (TCoP). More ❯
of well-architected frameworks and vendor-endorsed best practices. Relevant cloud certifications at the expert/practitioner level. Knowledge of UK public sector technology guidance and frameworks, such as NCSC’s Cyber Assessment Framework (CAF) and the Technology Code of Practice (TCoP). #J-18808-Ljbffr More ❯
London, England, United Kingdom Hybrid / WFH Options
Stafforce Recruitment
institutions and businesses. You'll support senior colleagues, learn from their expertise, and contribute to projects involving cybersecurity frameworks such as IASME Cyber Essentials, Cyber Assurance, ISO 27001, NCSCCyber Assessment Framework (CAF), and NIST. What You'll Do: Assist in creating and delivering engaging bespoke cybersecurity awareness training to clients. Support the implementation of cybersecurity frameworks. … is a plus, but enthusiasm and a willingness to learn can outweigh lack of experience. Familiarity with or interest in cybersecurity frameworks (e.g., IASME Cyber Essentials, ISO 27001, NCSC CAF, NIST). Ex-Armed Forces personnel are strongly encouraged to apply - we're proud to hold the Bronze Armed Forces Covenant and value the discipline and skills you bring. More ❯
Basildon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
They are driven to help protect organisations against the rising threat of cyber-attacks in an ever-evolving digital world. The have become a known Microsoft Security Partner with NCSC status as well as several prestigious awards to their name. More importantly, they are a people focused organisation who recognise their success is all down to the employees who make More ❯
Chester, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
They are driven to help protect organisations against the rising threat of cyber-attacks in an ever-evolving digital world. The have become a known Microsoft Security Partner with NCSC status as well as several prestigious awards to their name. More importantly, they are a people focused organisation who recognise their success is all down to the employees who make More ❯
analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with industry standards such as ISO27001, NIS Directive , and NCSC's Cyber Assessment Framework (CAF) . Support long-term architectural planning, contributing to multi-year roadmaps and aligning solutions with regulatory and business strategy. What You'll Bring 3+ years More ❯
Leeds, England, United Kingdom Hybrid / WFH Options
Harvey Nash
analysis, and define security requirements for systems including remote access (VPNs) and secure OT-to-IT data exchange. Ensure compliance with industry standards such as ISO27001, NIS Directive , and NCSC’s Cyber Assessment Framework (CAF) . Support long-term architectural planning, contributing to multi-year roadmaps and aligning solutions with regulatory and business strategy. 🧠 What You’ll Bring 3+ years More ❯
London, England, United Kingdom Hybrid / WFH Options
Digital Preservation Coalition
virtualization technologies like VMware, and software technologies such as Apache, Docker, Hadoop, MySQL, and network services (DHCP, DNS, LDAP) is essential. Experience working within governance frameworks like the NationalCyberSecurityCentre guidance and the Government Digital Service Technology Code of Practice is desirable. You should have excellent analytical and problem-solving skills, a methodical approach, and strong decision-making More ❯
Excellent understanding of Layer 2/3 networking, including Ethernet, MPLS, and TCP/IP Experience with risk and vulnerability management frameworks Familiarity with security standards such as NIST, NCSC, or ISO27001 Diversity, Inclusion & Belonging We’re a Times Top 50 Employer for Gender Equality. We’re endorsed by WORK180 and we’re a partner of Diversifying . We have More ❯
Excellent understanding of Layer 2/3 networking, including Ethernet, MPLS, and TCP/IP Experience with risk and vulnerability management frameworks Familiarity with security standards such as NIST, NCSC, or ISO27001 Diversity, Inclusion & Belonging We're a Times Top 50 Employer for Gender Equality. We're endorsed by WORK180 and we're a partner of Diversifying. We have pledged More ❯
s most connected cyber ecosystem, with GCHQ's more than 70-year heritage in Cheltenham. Plexal delivers projects for key government departments and global tech companies including the NationalCyberSecurityCentre, Department for Science, Innovation and Technology, Foreign, Commonwealth and Development Office, Amazon Web Services and IBM. The NCSC For Startups alumni of over 60 companies has collectively raised More ❯
Regulation Framework, cross-HMGsecurity principles) into usable, department-specific tools and guidance. * Engagewith OGDs and cross-HMG forums to ensure our frameworks align with DSIT,Cabinet Office and NationalCyberSecurityCentre standards. * Establish and maintain secure-by-design and explainability guardrails for AI across theestate. * Provideenterprise-level architectural governance across AI pilots, ensuring reuse,integration and compliance. * Collaboratewith senior … cross-HMG security principles) into usable, department-specific tools and policies. Engage with OGDs and cross-HMG forums to ensure our frameworks align with DSIT, Cabinet Office and NationalCyberSecurityCentre standards. This type of cross-cutting AI governance skillset is niche and spans enterprise architecture, information assurance and applied AI ethics. We welcome applications from people with a More ❯
Regulation Framework, cross-HMGsecurity principles) into usable, department-specific tools and guidance. * Engagewith OGDs and cross-HMG forums to ensure our frameworks align with DSIT,Cabinet Office and NationalCyberSecurityCentre standards. * Establish and maintain secure-by-design and explainability guardrails for AI across theestate.* Provideenterprise-level architectural governance across AI pilots, ensuring reuse,integration and compliance.* Collaboratewith senior … cross-HMG security principles) into usable, department-specific tools and policies. Engage with OGDs and cross-HMG forums to ensure our frameworks align with DSIT, Cabinet Office and NationalCyberSecurityCentre standards.This type of cross-cutting AI governance skillset is niche and spans enterprise architecture, information assurance and applied AI ethics. We welcome applications from people with a wide More ❯
Regulation Framework, cross-HMGsecurity principles) into usable, department-specific tools and guidance. * Engagewith OGDs and cross-HMG forums to ensure our frameworks align with DSIT,Cabinet Office and NationalCyberSecurityCentre standards. * Establish and maintain secure-by-design and explainability guardrails for AI across theestate. * Provideenterprise-level architectural governance across AI pilots, ensuring reuse,integration and compliance. * Collaboratewith senior … cross-HMG security principles) into usable, department-specific tools and policies. Engage with OGDs and cross-HMG forums to ensure our frameworks align with DSIT, Cabinet Office and NationalCyberSecurityCentre standards. This type of cross-cutting AI governance skillset is niche and spans enterprise architecture, information assurance and applied AI ethics. We welcome applications from people with a More ❯
Ace Capital Partners 📍Presence already in EU amongst Goverments and public sector bodies The role: 📍End-to-end sales cycles with European public sector and defence 📍Own relationships within NCSC's, CIRTs, MOD's and CNI organisation 📍Can be based anywhere in EU. Remote role 📍Salary – Six figure base + double OTE Must have requirements: 📍7 years+ experience selling cyberMore ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
National Physical Laboratory
officials, industry leaders, and academic professionals, supporting UKTL leaders in coordinating meetings and briefings. As a trusted national capability, UKTL will collaborate with standards bodies like 3GPP, the NationalCyberSecurityCentre, the UK intelligence community, academia, Ofcom, and telecommunications service providers and vendors. What you could be doing for us: Managing the software development lifecycle of bespoke UKTL tools. More ❯
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
Sword Group
Active Directory & Entra ID identity services deployment and administration Microsoft 365 Intune for endpoint management deployment and administration Knowledge of relevant governance standards and frameworks (Azure Well Architected Framework, NCSCCyber Essentials, CIS Security Benchmarks etc) Virtual Desktop solutions (Cloud or on-premise) Other skills Excellent technical problem-solving skills and the ability to think strategically Ability to communicate complex More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Sword Group
Active Directory & Entra ID identity services deployment and administration Microsoft 365 Intune for endpoint management deployment and administration Knowledge of relevant governance standards and frameworks (Azure Well Architected Framework, NCSCCyber Essentials, CIS Security Benchmarks etc) Virtual Desktop solutions (Cloud or on-premise) Other skills Excellent technical problem-solving skills and the ability to think strategically Ability to communicate complex More ❯
knowledge of well-architected frameworks and vendor-endorsed best practices. Relevant certifications at the expert/practitioner level. Knowledge of UK public sector technology guidance and frameworks, such as NCSC's Cyber Assessment Framework (CAF) and the Technology Code of Practice (TCoP). More ❯
London, England, United Kingdom Hybrid / WFH Options
Wise
or building extensive testing suites for key platforms/services Experience with CI/CD pipelines and Distributed and Concurrent Systems Familiar with secure coding principles/guidelines (OWASP, NCSC etc.) and global frameworks around development security Experience in working for regulated firms and environments. Familiarity with risk & compliance frameworks and/or keen to the step into the risk More ❯
patching, and application deployments. OpManager Manage Engine Password Manager Windows Server OSes Windows 10 & 11 Desktop MS 365 Apps The ideal candidate will possess a solid understanding of CIS & NCSCsecurity best practices, along with expertise in Pen Testing and Vulnerability remediation. Requirements Strong technical skills in VMware, Veeam, HPE, SCCM, and more. Confidence in on-site client support in More ❯