tools and control testing platforms. Strong data analysis skills, including proficiency in Excel and visualization tools like Tableau or Power BI. Familiarity with risk management frameworks such as COSO, NIST, ISO 31000, and control testing methodologies. Exceptional communication and interpersonal skills, capable of influencing stakeholders at all levels. Experience managing regulatory audits. Ability to collaborate with regional and global partners More ❯
Develop and implement a robust cybersecurity strategy to safeguard DBT's sensitive data and digital assets. Lead risk management, ensuring compliance with UK government standards (eg, NCSC, GDPR, andNIST frameworks). Oversee incident response, threat intelligence, and resilience planning to protect against cyber threats. Collaborate with cross-government partners, industry stakeholders, and international counterparts to enhance cybersecurity capabilities. Provide More ❯
London, England, United Kingdom Hybrid / WFH Options
Methods
OT/ICS systems, how they are designed, deployed and operated Familiarity with OT cyber security standards or regulatory frameworks including but not limited to IEC 62443/ISA, NIST CSF, NCSC CAF, the Network and Information Systems (NIS) Regulations and ISO21434 Automotive cyber expertise would be desirable with knowledge of UN155/156 regulations GICSP, IEC/ISA More ❯
London, England, United Kingdom Hybrid / WFH Options
Bridewell
position of mature cyber security & resilience, sometimes from a starting point of minimal security maturity. Supporting clients to implement frameworks, standards, and guidance, including ISA/IEC62443, NCSC CAF, NIST SP 800-82, ISO 27001, HSE OG86. Helping clients to understand their attack vectors that could be exploitable by threats. Designing secure OT network architectures and perimeter defences. Delivery of … within OT environments. Understanding of the different priorities of cyber security in OT & IT. Knowledge of cyber security frameworks, including but not limited to ISA/IEC62443, NCSC CAF, NIST SP 800-82, HSE OG86, ISO 27001. Awareness and understanding of the OT security threat landscape. Ability to understand and articulate the impacts of cyber security events in various OT More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Leyden Solutions Inc
are taken to implement information security requirements for IT systems throughout their life cycle, from the requirements definition phase through disposal. • Perform compliance monitoring, analysis, tracking and reporting • Apply NIST Risk Management Framework andNIST SP 800-53 security controls • Analyze and re-mediate weaknesses while working with system administrators and other personnel in the organization to implement risk mitigation … Minimum of 12 years of IT experience, or 10 years of experience and a master's degree • Must be able to demonstrate integration of regulations and processes such as NIST 800 series special publications, Risk Management Framework (RMF), and Federal Information Security Act (FISMA) reporting for national security systems (NSS) • Must have exceptional writing capabilities on technical and process security More ❯
Farnborough, Hampshire, United Kingdom Hybrid / WFH Options
The Talent Locker Ltd
variety in your day-to-day. What you'll be doing Designing robust, secure-by-design architectures aligned to MOD and wider government standards Managing risk using frameworks like NIST 800-53 and producing key security artefacts (RMAs, Security Aspects, Test Plans, etc.) Working with cross-functional teams including DevSecOps, Software, Infrastructure and Agile delivery Providing strategic guidance on cyber More ❯
Farnborough, Hampshire, South East, United Kingdom Hybrid / WFH Options
Talent Locker
variety in your day-to-day. What you'll be doing Designing robust, secure-by-design architectures aligned to MOD and wider government standards Managing risk using frameworks like NIST 800-53 and producing key security artefacts (RMAs, Security Aspects, Test Plans, etc.) Working with cross-functional teams including DevSecOps, Software, Infrastructure and Agile delivery Providing strategic guidance on cyber More ❯
variety in your day-to-day. What you’ll be doing Designing robust, secure-by-design architectures aligned to MOD and wider government standards Managing risk using frameworks like NIST 800-53 and producing key security artefacts (RMAs, Security Aspects, Test Plans, etc.) Working with cross-functional teams including DevSecOps, Software, Infrastructure and Agile delivery Providing strategic guidance on cyber More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
The Talent Locker Ltd
variety in your day-to-day. What you'll be doing Designing robust, secure-by-design architectures aligned to MOD and wider government standards Managing risk using frameworks like NIST 800-53 and producing key security artefacts (RMAs, Security Aspects, Test Plans, etc.) Working with cross-functional teams including DevSecOps, Software, Infrastructure and Agile delivery Providing strategic guidance on cyber More ❯
Staines-upon-Thames, England, United Kingdom Hybrid / WFH Options
Bupa
Technology audits or IT Assurance (e.g., CISSP, CISM, CISA, CRISC, CCAK) A sound understanding of British and International Security Standards (e.g., ISO/IEC 27001, ISO/IEC 27002, NIST, CIS-20, PCIDSS) and the UK regulatory environment (e.g., ICO, FCA, PRA and CQC). Our benefits are designed to make health happen for our people. Viva is our global More ❯
the DORA framework and know how to translate requirements into business deliverables • Track record of implementing and managing IT and cybersecurity control frameworks • Experience with security certification processes (ISO27001, NIST, etc.) • Demonstrated success in remediation of audit findings and control gaps • History of leading security awareness programs and training initiatives • Experience working with external auditors • Familiarity with cloud environments andMore ❯
Bristol, England, United Kingdom Hybrid / WFH Options
Oof
the organisation's strategic objectives. This individual will provide architectural leadership across IT Infrastructure, Applications, and Cyber Security domains, with a strong emphasis on Secure by Design principles andNIST Risk Management Framework compliance. The role requires effective communication with senior client stakeholders and the ability to influence technical decisions through sound governance and evidence-based architectural rationale. Key Responsibilities … Provide strategic direction on on-premise infrastructure strategies. Cyber Security & Secure by Design Embed Secure by Design principles throughout the product lifecycle. Ensure architecture and solution designs comply with NIST controls, regulatory requirements, and internal cyber security policies. Collaborate with Information Architecture, Security, Risk, and Compliance teams to assess architectural risk and apply appropriate mitigation measures. Governance & Assurance Lead architectural … networks, servers, storage, virtualisation), application architecture (e.g. integration, APIs, data), and cyber security architecture (e.g. identity & access management, threat modelling, security controls). Strong working knowledge and application ofNIST Risk Management Framework, Secure by Design, and architecture standards. Proven experience leading architecture governance in large-scale transformation programmes. Demonstrated ability to engage and influence C-level and senior stakeholders More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
CBSbutler Ltd
the Security Assurance Team (SAT), providing risk management and assurance of programme artefacts. Responsibilities and Tasks Support delivery of secure Releases and Features aligned with the relevant legacy or NIST assurance processes through Security Assurance stories agreed with nominated team Scrum Master Create security assurance case for releases, including risk assessments and mitigations for identified defects and vulnerabilities Liaise with … and security training and briefings Support development of relevant security documentation; including RMADS, CoCo, RAR, SSP, POAM, OSMP (including SyOps). Knowledge, Experience and Capabilities Cyber Security Assurance ISO27001 NIST 800-53 series MOD Secure by Design Information assurance Risk management High quality of written and verbal communication skills Experience of working in Secure environments (Highly desirable) Experience in Safe More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
the Security Assurance Team (SAT), providing risk management and assurance of programme artefacts. Responsibilities and Tasks Support delivery of secure Releases and Features aligned with the relevant legacy or NIST assurance processes through Security Assurance stories agreed with nominated team Scrum Master Create security assurance case for releases, including risk assessments and mitigations for identified defects and vulnerabilities Liaise with … and security training and briefings Support development of relevant security documentation; including RMADS, CoCo, RAR, SSP, POAM, OSMP (including SyOps). Knowledge, Experience and Capabilities Cyber Security Assurance ISO27001 NIST 800-53 series MOD Secure by Design Information assurance Risk management High quality of written and verbal communication skills Experience of working in Secure environments (Highly desirable) Experience in Safe More ❯
Aldershot, Hampshire, South East, United Kingdom Hybrid / WFH Options
JLA Resourcing Ltd
scanning, management, and reporting Implementing and maintaining endpoint security measures, including AV/anti-malware compliance Conducting system hardening and security compliance audits against frameworks like CIS, STIG, andNIST Contributing to incident response, forensic investigations, and remediation activities Assessing the security impact of changes, supporting secure design and assurance processes Producing and maintaining detailed security documentation (HLDs/LLDs … defence or secure government sector Strong hands-on expertise across vulnerability management, endpoint protection, and incident response Familiarity with frameworks such as Government Functional Standard 007, CIS, STIG, andNIST A proactive, collaborative mindset with the ability to engage across multidisciplinary technical teams The ability to gain or already hold DV (Developed Vetting) security clearance Strong documentation skills and experience More ❯
Annapolis Junction, Maryland, United States Hybrid / WFH Options
GTSC Talent Solutions
within a team Desired Skills: Experience with one or more ServiceNow modules: CAM (Cloud Asset Management) RMF (Risk Management Framework) GRC (Governance, Risk & Compliance) SecOps (Security Operations) Familiarity with NIST SP 800-53 standards Deep understanding of the Risk Management Framework (RMF) Previous experience in a DoD or highly regulated environment Education and Required Qualification Bachelor's Degree andMore ❯
and design of the security infrastructure including WAF, Proxy, Email Gateway, Logging, Endpoint, IDS, IDP, etc. Strong understanding of cyber security principles, frameworks, and regulatory standards (e.g. ISO 27001, NIST, GDPR) Experience working with security transformation initiatives Knowledge of Azure and native cloud tools Good knowledge of ITIL processes Understanding of network/directory/security technologies Understanding of secure More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Oliver James
and design of the security infrastructure including WAF, Proxy, Email Gateway, Logging, Endpoint, IDS, IDP, etc. Strong understanding of cyber security principles, frameworks, and regulatory standards (e.g. ISO 27001, NIST, GDPR) Experience working with security transformation initiatives Knowledge of Azure and native cloud tools Good knowledge of ITIL processes Understanding of network/directory/security technologies Understanding of secure More ❯
and policy teams to create and ensure compliance with industry regulations and company-specific policies. Implementing and maintaining Information Security and Privacy Standardsand Frameworks, such as ISO 27001, NIST, and CIS. Reviewing system and data architectures alongside engineering teams and architects, recommending best practices. Assessing vulnerabilities, articulating their impact, and recommending controls and mitigations for current and future systems. … to technical and non-technical stakeholders. Managing and supporting project stakeholder expectations with a flexible, pragmatic approach. Cyber Governance Analyst Requirements: Strong knowledge of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Proven experience in a similar role, supporting governance, monitoring controls, and managing risks. Ability to assess and articulate the impact of vulnerabilities and recommend mitigations. Skilled in collaborating More ❯
and policy teams to create and ensure compliance with industry regulations and company-specific policies. Implementing and maintaining Information Security and Privacy Standardsand Frameworks, such as ISO 27001, NIST, and CIS. Reviewing system and data architectures alongside engineering teams and architects, recommending best practices. Assessing vulnerabilities, articulating their impact, and recommending controls and mitigations for current and future systems. … to technical and non-technical stakeholders. Managing and supporting project stakeholder expectations with a flexible, pragmatic approach. Cyber Governance Analyst Requirements: Strong knowledge of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Proven experience in a similar role, supporting governance, monitoring controls, and managing risks. Ability to assess and articulate the impact of vulnerabilities and recommend mitigations. Skilled in collaborating More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and policy teams to create and ensure compliance with industry regulations and company-specific policies. Implementing and maintaining Information Security and Privacy Standardsand Frameworks, such as ISO 27001, NIST, and CIS. Reviewing system and data architectures alongside engineering teams and architects, recommending best practices. Assessing vulnerabilities, articulating their impact, and recommending controls and mitigations for current and future systems. … to technical and non-technical stakeholders. Managing and supporting project stakeholder expectations with a flexible, pragmatic approach. Cyber Governance Analyst Requirements: Strong knowledge of cybersecurity frameworks (e.g., ISO 27001, NIST, CIS). Proven experience in a similar role, supporting governance, monitoring controls, and managing risks. Ability to assess and articulate the impact of vulnerabilities and recommend mitigations. Skilled in collaborating More ❯
Bath, England, United Kingdom Hybrid / WFH Options
Leonardo
levels. A degree or MSc. in engineering or cyber security, or recognized professional certification. 5+ years of experience in cyber/engineering roles, including MOD accreditation, security standards (e.g., NIST, Defstan), risk management, and security design. Desirable Skills: Understanding of the engineering lifecycle and key review activities. Knowledge of cryptographic technologies and MOD/NCSC standards. Experience with cyber security More ❯
London, England, United Kingdom Hybrid / WFH Options
Control Risks
and managing comprehensive security programs tailored to diverse environments, including hybrid IT/OT settings. Delivering projects aligned with industry frameworks and compliance requirements such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Applying expertise in emerging technologies like AI, IoT, cloud solutions, and advanced threat detection systems. Advising on their application, assessing suitability, and determining optimal implementation timing More ❯
and manage comprehensive security programmes tailored to diverse environments, including hybrid IT/OT settings. Deliver projects aligned with industry frameworks and compliance requirements, such as NIST800-53, ISO27001, NIST CSF, NIS 2, DORA. Leverage emerging technologies such as AI, IoT, cloud solutions, and advanced threat detection systems. Advise on their application, assess their suitability for specific environments, and determine More ❯