identify owners and track through to completion. The successful It Risk Management Specialist will have: Technology Knowledge: Work towards a detailed understanding ofTechnologyand cyber risk frameworks (e.g. NIST/ISO27001/COBIT/ITIL). SSSDLC Expertise: Understanding of the Secure Software/System Development Lifecycle, including secure design, development, testing, and deployment practices. Process Documentation: Experience in More ❯
+, or similar). Experience in Cyber Security (Security Operations, Risk Mitigation, Incident Management, Vulnerability Management, or similar disciplines). Experience in Compliance and Governance (ISO (phone number removed), NIST, GDPR, Cyber Essentials, or similar frameworks). Can build and develop strategic business relationships. 5+ years Technical Information Technology background/experience. Effective communication with people at all levels. What More ❯
years in a client-facing advisory or consulting capacity. Proven experience delivering crisis tabletop exercises and facilitating executive-level crisis discussions. Strong understanding of cyber incident response frameworks (e.g., NIST, ISO 22301, ISO 27035) and business continuity principles. Excellent communication and presentation skills with experience speaking at conferences or industry events. Familiarity with cyber crisis management technologies and their integration More ❯
Design of security infrastructure and tools to support a SOC's mission of monitoring, detecting, analysing, and responding to cyber threats. Knowledge of the following policies and processes (required): NIST NCSC SOC Guidance NCSC CAF (CNI) Nice to have: MoD JSP 440 MoD JSP 503 MoD JSP 45 This is an excellent opportunity to work on a significant project. If More ❯
certification, and be compliant with DORA, NIS 2, GDPR, etc. Requirements: * ISO 27001 Lead Implementer or Auditor certification * Strong knowledge of frameworks like ISO 27001/27002, CAF, eCAF, NIST, GDPR * Client and stakeholder management The client is looking for someone with direct experience with utility providers or experience working with providers via Third-Party suppliers. If you're interested More ❯
certification, and be compliant with DORA, NIS 2, GDPR, etc. Requirements: ISO 27001 Lead Implementer or Auditor certification Strong knowledge of frameworks like ISO 27001/27002, CAF, eCAF, NIST, GDPR Client and stakeholder management The client is looking for someone with direct experience with utility providers or experience working with providers via Third-Party suppliers. If you're interested More ❯
threat monitoring, detection, and response using cloud-native security solutions such as Microsoft Defender, Sentinel, and SIEM platforms. Ensure compliance with cloud security frameworks and regulatory requirements (ISO 27001, NIST, GDPR, SOC2, FCA). Conduct regular security risk assessments, penetration tests, and vulnerability management across cloud services. Oversee endpoint security, cloud network and API security for robust protection across all … Strong experience managing Microsoft 365 (Exchange, SharePoint, Teams), Azure cloud infrastructure, and security tools such as Microsoft Defender and Sentinel. Security & Compliance: Deep knowledge of security frameworks (ISO 27001, NIST, CIS), compliance requirements (GDPR, SOC2), and risk management best practices. Identity & Access Management (IAM): Expertise in Azure AD, MFA, Conditional Access, Single Sign-On (SSO), and Privileged Access Management (PAM More ❯
principles Collaborate with IT, DevOps, and business teams to embed security into solution design Evaluate and recommend security tools, technologies, and controls Ensure compliance with industry standards (e.g. ISO27001, NIST, Cyber Essentials Plus) Provide expert guidance on secure configuration, identity management, and data protection Support incident response planning and post-incident reviews from an architectural perspective Qualifications & Experience Proven experience … in cyber security architecture or senior security engineering roles Strong knowledge of security frameworks (e.g. NIST, SABSA, TOGAF) Hands-on experience with cloud platforms (Azure, AWS) and enterprise security tools (e.g. SIEM, EDR, IAM) Relevant certifications such as CISSP, CISM, SABSA, or CCSP (preferred) Ability to translate complex security concepts into clear, actionable guidance Excellent stakeholder engagement and communication skills More ❯
analysis, SOC operations, and incident handling skills. Substantial experience in information security across different industries, platforms, and applications. Experience conducting IT compliance assessments (IT General Controls and Audits, PCI, NIST CSF etc.) Experience working on implementation in a SOC environment. Experience working in Microsoft Defender, Microsoft Purview and Microsoft Sentinel is essential. Experience in or understanding of penetration testing and … hacking techniques. Experience across applying NIST CSF, ITIL, ISO 27001, ISO and other best practice standards Desirable Experience/Skills: In-depth knowledge of architecture, engineering, and operations of at least one enterprise SIEM platform (e.g., ArcSight, Splunk, Nitro/McAfee Enterprise Security Manager, QRadar, LogLogic). Understanding of event and incident investigations and incident response in a 24/ More ❯
achieve operational excellence. Role Overview As a Security Architect, you will be responsible for enhancing the security posture of DXC's client services by ensuring full compliance with the NIST 800-53 framework. You will evaluate existing security controls, map them to NISTstandards, and develop new controls and documentation to improve compliance and overall security. Key Responsibilities Architect and … oversee the implementation of security solutions in compliance with NIST 800-53 Work closely with the customer's architecture team to develop and implement security strategies Identify security risks, define security requirements, and recommend remediation strategies Develop and enforce security policy standards to ensure compliance with customer security requirements Provide technical leadership on security projects and mentor junior team members … Support incident investigations and security control enhancements Ensure security architectures align with industry frameworks such as TOGAF and SABSA Key Deliverables Gap Analysis Report: Assessing current security posture against NIST 800-53 Security Control Mapping: Documenting alignment of existing controls with compliance frameworks Implementation Plans: Designing and deploying new security controls Updated Security Documentation: Policies, procedures, and system security plans More ❯
on experience with SCADA, DCS, PLC, EMS, and related technologies Familiarity with protocols like TCP/IP, Modbus, IEC 61850, OPC UA, PROFINET Knowledge of security standards such as NIST CSF, ISO27001, IEC 62443, and NIS regulations Ability to develop pragmatic solutions to address cyber risks in OT environments More ❯
on secure product architecture. Monitor evolving IoT threat landscapes and update security policies accordingly. Contribute to internal security standardsand assist in compliance with industry benchmarks (e.g., ETSI EN , NIST IR 8259). Work with the AppSec and Cloud Security teams to ensure end-to-end system security. Qualifications 4+ years of experience in IoT, embedded, or hardware security. Deep More ❯
fulfilled. OT/IOT Security SME Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions More ❯
fulfilled. OT/IOT Security SME Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions More ❯
fulfilled. OT/IOT Security SME Role: 10+ years of experience in Cyber security Designing & implementation on ICS/OT network Architectures, Cybersecurity frameworks for ICS/OT environments NIST SP 800-82 and c, OT Network Communication Protocols (e.g., Ethernet, Modbus, OPC, IEC-101/104 etc.), Information Event Management (SIEM). Key Responsibilities: Designing and implementing technical solutions More ❯
experience with OT/ICS networking Strong background in industrial firewalls and network segmentation Familiar with common OT protocols and monitoring tools Knowledge of industry security standards (IEC 62443, NIST 800-82) Certifications are welcome but not required. Interested? Send your CV or get in touch for a chat. More ❯
support internal teams in understanding CMP features. Ideal Candidate Profile Experience managing technical products in privacy, compliance, or consent domains. Strong understanding of global privacy frameworks (e.g., GDPR, ICO, NIST). Comfortable working with engineering teams on technical implementations (cookies, SDKs, tag management). Excellent communicator with the ability to translate legal requirements into practical product decisions. Passionate about user More ❯
Hemel Hempstead, Hertfordshire, South East, United Kingdom
Sopra Steria Limited
storage platforms. Expertise in storage array deployment, replication, and fault tolerance. Knowledge of secure-by-design principles and system hardening practices. Familiarity with security compliance frameworks such as STIG, NIST, or CIS. Skilled in enterprise hardware installations and cabling management. It would be great if you had: Dell EMC or VMware certifications. Experience with infrastructure automation tools like PowerShell, Ansible More ❯
OWASP Top 10), and application security testing tools ️ Experience with SAST, DAST, and security code review tools (e.g., Fortify, Veracode, Checkmarx) ️ Familiarity with secure software development frameworks (e.g., OWASP, NIST) ️ Relevant certifications such as CSSLP, CEH, or CISSP are highly desirable More ❯
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Eclipse C++ Development IDE & plugins, anti-malware tools, configuring switch/firewall/NAS and other network devices, setup of RHEL subscription and update services, all within a secure NIST based framework. The task package requires the derivation of detailed use cases and design from the high-level use cases/requirements and design, and implementation and test of the More ❯
storage platforms. Expertise in storage array deployment, replication, and fault tolerance. Knowledge of secure-by-design principles and system hardening practices. Familiarity with security compliance frameworks such as STIG, NIST, or CIS. Skilled in enterprise hardware installations and cabling management. It would be great if you had: Dell EMC or VMware certifications. Experience with infrastructure automation tools like PowerShell, Ansible More ❯
will be responsible for overseeing Security Operations and ensuring the highest level of security for the customer. The Cyber Security Consultant leads detailed risk assessments, implements industry-standard frameworks (NIST, NCSC, NIS2), and actively manages SIEM/XDR tools such as IBM QRadar, Microsoft Sentinel, and Defender XDR. This role involves deeper client interaction, proactive risk management, and advanced threat … preferably in cybersecurity). Responsibilities: Manage and strengthen client relationships with regular strategic interactions. Lead comprehensive cybersecurity risk assessments aligned to industry standards. Conduct environment reviews, ensuring compliance with NIST frameworks and related standards. Oversee and implement SIEM/XDR deployments, custom rule development, and incident response processes. Provide guidance on best practices for SIEM/XDR and threat detection. … Conduct security posture reviews and gap analysis. Prepare reports and present findings to client stakeholders. Location London, UK Good understanding of cybersecurity frameworks (NIST CSF, NCSC CAF, NIS2, NIST 800-30). Good understanding of risk assessment methodologies (NIST 800-30). Hands-on experience with SIEM/XDR solutions (QRadar, Sentinel, Defender XDR). Familiarity with cloud security principles More ❯
and solutions to address specific client needs. Collaborate with clients to design and implement risk mitigation strategies and incident response plans. Provide expert guidance to clients on frameworks (GDPR, NIST, ISO, HIPAA) and related strategies, with a focus on cyber security. Conduct thorough assessments of clients' existing security programs, identifying gaps and vulnerabilities. Develop and implement effective framework policies, procedures … industry best practices. Conduct tabletops/workshops with clients discussing information security best practices, incident response, and the threat landscape. Advise clients on compliance requirements, such as GDPR, HIPAA, NIST, ISO 27001, and other relevant regulations. Stay up to date with the latest cybersecurity threats, trends, and regulatory changes to provide informed guidance. Qualifications: Bachelor's degree in a relevant More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
statements to technical and non-technical audiences at various hierarchical levels Deep knowledge of common information security management frameworks andstandards, such as ISO/IEC 27001/27002, NIST 800-53, and the NIST Cybersecurity Framework Soft skills: collaboration, teamwork, persuasion, attention to detail, time management, prioritization, resourcefulness Advanced proficiency with MS Office products, primarily MS Word, Excel, PowerPoint More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
statements to technical and non-technical audiences at various hierarchical levels Deep knowledge of common information security management frameworks andstandards, such as ISO/IEC 27001/27002, NIST 800-53, and the NIST Cybersecurity Framework Soft skills: collaboration, teamwork, persuasion, attention to detail, time management, prioritization, resourcefulness Advanced proficiency with MS Office products, primarily MS Word, Excel, PowerPoint More ❯