Northern Ireland, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Norwich, Norfolk, East Anglia, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Brighton, East Sussex, South East, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Belfast, County Antrim, Northern Ireland, United Kingdom Hybrid/Remote Options
Anson Mccade
development lifecycle. Lead and mentor a small team of CyberSecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
Frontier Resourcing Ltd
communicate with senior stakeholders Familiarity with TOGAF or equivalent frameworks Ideally previous experience delivering into Central Government Essential: CISSP, CISM, or similar industry-recognised certification Desirable: CIISec Full Membership, NCSC CCP (Security Architecture), or relevant Chartership Why Join Work on impactful programmes securing critical national services Clear professional development pathways with support for certifications Flexible hybrid working and a supportive More ❯
Employment Type: Permanent, Part Time, Work From Home
Portsmouth, Hampshire, England, United Kingdom Hybrid/Remote Options
Franklin Fitch
security direction, and shaping service offerings. Key responsibilities: Deliver advanced security consultancy across Azure and AWS. Conduct posture assessments, gap analyses, and configuration reviews. Design secure architectures aligned with NCSC, CIS, and ISO 27001. Advise on governance, compliance (ISO 27001, Cyber Essentials Plus, NIST). Collaborate with SOC and engineering teams to strengthen detection and identity controls. You’ll need More ❯
youll be responsible for: Conducting security assurance activities across projects, products, and systems. Supporting risk assessments, security reviews, and compliance checks in line with organisational and government standards (e.g., NCSC, ISO 27001, JSP440). Producing clear, concise, and insightful security assurance reports for technical and non-technical stakeholders. Working closely with engineering, architecture, and risk management teams to ensure robust More ❯
ll be responsible for: Conducting security assurance activities across projects, products, and systems. Supporting risk assessments, security reviews, and compliance checks in line with organisational and government standards (e.g., NCSC, ISO 27001, JSP440). Producing clear, concise, and insightful security assurance reports for technical and non-technical stakeholders. Working closely with engineering, architecture, and risk management teams to ensure robust More ❯
on secure solution design and support teams throughout implementation SC Cleared Cloud Security Architect - Required Experience Active SC Clearance (essential) 5+ years' in cloud security architecture. Security Compliance (NIST, NCSC, GDPR etc.) Oracle Cloud Infrastructure (nice to have) Excellent stakeholder engagement & communication skills Interviews: November 2025 Start Date: December 2025 How to Apply: Apply to Gary Hargreaves at X4 Technology More ❯
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Dunfermline, Fife, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Tranent, East Lothian, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Edinburgh, Midlothian, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Livingston, West Lothian, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Motherwell, Lanarkshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Stirling, Stirlingshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Stow, Selkirkshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Torrance, Dunbartonshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Comrie, Perthshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Busby, Yorkshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Tillicoultry, Clackmannanshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Thornhill, Cardiff, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯