Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
Assurance and Risks. Security related legislation (e.g. GDPR, PCI DSS, ICO requirements). Security Control Frameworks such as ISO 27001, NIST CSF and CIS Controls v8. HMG, NPSA and NCSCsecurity policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding More ❯
Hampshire, South East, United Kingdom Hybrid / WFH Options
Sanderson Government and Defence
Assurance and Risks. Security related legislation (e.g. GDPR, PCI DSS, ICO requirements). Security Control Frameworks such as ISO 27001, NIST CSF and CIS Controls v8. HMG, NPSA and NCSCsecurity policies, standards and guidance. Have experience building and implementing secure by design principals within the software development lifecycle (SDLC). Threat Modelling - Kill Chain - Attack tree analysis. Working understanding More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
/CD) Familiarity with scripting languages like PowerShell, YAML, JSON Hands-on with application security tools and DevSecOps processes Understanding of frameworks and standards like OWASP, NIST SSDF, ISO27001, NCSC Experience with threat modelling, risk assessments, and secure design reviews Confident owning security strategy and tooling across complex product landscapes A strong communicator - able to engage with engineers and execs More ❯
london, south east england, united kingdom Hybrid / WFH Options
Logiq
security certification. Desirable • Full Membership of the Chartered Institute of Information Security (CIISec) — highly desirable. • Chartered or Principal status via the UK CyberSecurity Council for Secure Systems Architecture. • NCSC Certified Cyber Professional (CCP) in Security Architecture. • IEng or CEng registered with a UK engineering body. • Chartership through BCS, The Chartered Institute for IT. • SABSA Chartered Security Architect. Why Join More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Logiq
security certification. Desirable • Full Membership of the Chartered Institute of Information Security (CIISec) — highly desirable. • Chartered or Principal status via the UK CyberSecurity Council for Secure Systems Architecture. • NCSC Certified Cyber Professional (CCP) in Security Architecture. • IEng or CEng registered with a UK engineering body. • Chartership through BCS, The Chartered Institute for IT. • SABSA Chartered Security Architect. Why Join More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Logiq
security certification. Desirable • Full Membership of the Chartered Institute of Information Security (CIISec) — highly desirable. • Chartered or Principal status via the UK CyberSecurity Council for Secure Systems Architecture. • NCSC Certified Cyber Professional (CCP) in Security Architecture. • IEng or CEng registered with a UK engineering body. • Chartership through BCS, The Chartered Institute for IT. • SABSA Chartered Security Architect. Why Join More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
environments Hands-on knowledge of cloud platforms , CI/CD pipelines , and scripting (PowerShell, YAML, JSON, etc.) Familiarity with frameworks and standards such as OWASP , NIST SSDF , ISO27001 , or NCSC Practical experience with threat modelling , security tooling , and risk assessments Excellent communication skills, able to influence and engage at all levels from developers to execs A collaborative, proactive approach to More ❯
Camberley, Surrey, South East, United Kingdom Hybrid / WFH Options
Morson Talent
security through design and delivery. Background in the defence, maritime, or critical national infrastructure environment. Skills & Qualifications: Degree (or equivalent experience) in a relevant STEM or Information Security discipline. NCSC CCP SIRA status (or ability to achieve). Membership of a relevant professional body. Strong stakeholder engagement, leadership, and mentoring capabilities. Why Join? This is an opportunity to play a More ❯
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Motherwell, Lanarkshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Livingston, West Lothian, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Stirling, Stirlingshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Dunfermline, Fife, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Tranent, East Lothian, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Auchterarder, Perthshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Busby, Yorkshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Tillicoultry, Clackmannanshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Eaglesham, Renfrewshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Dollar, Clackmannanshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Comrie, Perthshire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Thornton, Lancashire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Blackburn, Lancashire, United Kingdom Hybrid / WFH Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯