+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
+ performance related bonus and a range of benefits to support your finances, wellbeing and family. Working Pattern: Permanent Full Time Flexible First options available The role The Lead CyberSecurity Enterprise Architect will support the establishment of a new enterprise cybersecurity architecture capability for SSE and support the creation of technical sub-strategies and a tooling strategy for … cyber security. The role holder will be responsible for establishing and maintaining a robust cybersecurity architecture that aligns with the company's security ambitions to support cyber and IT/OT and business transformations and secure by design. You will Establish an enterprise security architecture capability for SSE Group including the development and publication of architecture patterns, standards and … Secure by Design methodology for the Group to ensure that the right architectures, standards and guardrails exist to support delivery teams in implementing secure solutions. Develop and maintain a cybersecurity tooling strategy and technical sub strategies to the overall cybersecurity Group strategy in areas such as identity, network, detection, firewalls and encryption and work with the OT community. More ❯
Are you a CyberSecurity professional ready to take the next step in your career? Join a forward-thinking, award-winning London-based MSP that’s at the forefront of CyberSecurity services and play a pivotal role in their journey to becoming a Cyber Essentials Plus Certification Body. We’re looking for a CyberSecurity Assessor to join my … client's expanding CyberSecurity Projects team. If you're passionate about security, skilled in Microsoft 365 and Azure, and experienced with audits and offensive security tools, we want to hear from you. What You’ll Be Doing Conducting CyberSecurity Assessments and audits across Microsoft 365 and Azure environments Performing Cyber Essentials and Cyber Essentials PLUS audits in line … as an escalation point for security-related technical queries and pre-sales support To be considered for this role you’ll need At least 2 years in a similar CyberSecurity Assessment/Auditing role Previous work in a Managed Service Provider (MSP) environment A Strong understanding of Microsoft 365 & Azure Cloud Experience with technical audits and offensive security tools More ❯
Data Protection Team to promote the sharing of best practice and ensure alignment between SCI and Member information security and data protection programmes. Job Title: Specialist, Information Security Team: Cybersecurity and Information Assurance, Reports To: Head of Information Security Services Work Pattern : Hybrid/Remote with flexible working options available Contract Length: Permanent Grade : P3 Location : Any approved Save the … alignment of information security tools and best practices across the movement. Help facilitate clear and regular communications regarding security initiatives and concerns. Experience and Skills Essential Experience working on cybersecurity, information security and data protection requirements within a global organization or related, technical or IT support. Good understanding of IT infrastructure including cloud, networks and information systems. Good knowledge of … organisational and self-management skills. Strong communication skills, in English. Commitment to Save the Children mission and values Desirable Strong working knowledge of ISO/IEC 27001 and NIST Cybersecurity Framework (CSF) Experience of 'field operations' and the cybersecurity-related issues associated with working in remote, inhospitable and insecure environments Strong understanding of/willingness to learn key trends in More ❯
when you're inspired to think big and bring your ambition to work every day, which is why, at British Airways the sky is never the limit. The role: CyberSecurity Engineering Principal The CyberSecurity Engineering Principal is a highly experienced and skilled leader within the BA Cyber Team, reporting to the CyberSecurity Engineering Manager. This role plays … a critical part in shaping and driving improvements in BA's Cybersecurity posture. As the line manager of a small team of CyberSecurity Engineers, you will provide both technical advice on BA's security products and foster a culture of continuous learning and development. You will ensure that your team stays ahead of emerging threats and technologies by … security professionals and an ability to foster a collaborative and learning-oriented environment Proven track record of implementing and managing security solutions in a complex environment Strong understanding of cybersecurity processes, people and technology Experience in implementing and managing security solutions in complex environments Focused on building and nurturing the team's capability and understanding Ability to maintain a More ❯
Job Summary C++ Developer Country: United Kingdom Location: Malvern Sector: Software Developer Salary: GBP Up to £40,000 Job Type: Permanent Technologies: C++ developer SC Programming Code Java CyberSecurity Windows Linux Solaris Agile Degree HTTP C# SMTP AWS Docker Azure Powershell Perl Python PHP A growing cyber-security company is looking for a C++ Developer to join their existing … highly skilled development team writing complex cybersecurity solution software. This is the perfect opportunity for somebody who has a passion for cybersecurity and for high quality coding. 2 years of C++ programming experience required. Role and Responsibilities: Writing high quality code following the in-house full life cycle development methodologies and our clients chosen toolset. Unit, module and … UK security clearance. Problem solving and analytical skills. Computing, scientific or mathematical degree is preferred (2 nd Class honours or over). Domain knowledge of, or an interest in, cybersecurity is preferred. A minimum of 2 years' experience of programming in C++. The ability to work collaboratively across functions within the business and to be adaptable and flexible. Good More ❯
Security Control Assessor (Authorizing Official) Position Summary: As Security Control Assessor (Authorizing Official/AO) you will provide cybersecurity support to the National Geospatial-Intelligence Agency (NGA) in Springfield, VA. You will award authorization to operate (ATO) for systems and/or networks based on the determination of acceptable risk. Clearance Requirement: Must have an active DoD Top Secret/… and protocols, and network security methodologies. Knowledge of risk management processes (e.g., methods for assessing and mitigating risk) Knowledge of laws, regulations, policies, and ethics as they relate to cybersecurity and privacy. Knowledge of cybersecurity and privacy principles and tools. Knowledge of Security the Risk Management Framework (RMF) and Assessment and Authorization process. Knowledge of information technology (IT) security principles … and methods (e.g., firewalls, demilitarized zones, encryption). Skill in discerning the protection needs (i.e., security controls) of information systems and networks. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to coordinate cyber operations with other organization functions or support activities. Physical Demands and Expectations: Regular physical activity More ❯
our people-first culture and collaborative environment. Position Overview We are seeking an experienced IT Manager to lead and oversee all aspects of our organization's IT infrastructure and cybersecurity initiatives. This role is critical to ensuring the performance, security, and reliability of our technology systems to support ongoing operations in a fast-paced food manufacturing environment. Essential Duties and … and governance. Collaborate with executive leadership to align technology strategies with business needs. Manage the IT budget, including capital investments, operating expenses, and staffing. Develop and maintain a comprehensive cybersecurity strategy to protect the organization from internal and external threats. Collaborate with other departments to understand technology needs and deliver effective solutions. Maintain documentation for systems, processes, and IT policies. … manage the IT, providing mentorship, development opportunities, and performance evaluations. Foster a culture of continuous improvement, security awareness, and collaboration. Ensure that training programs are in place to maintain cybersecurity awareness for all employees. Oversee the daily operations of IT systems, including networks, servers, applications, and telecommunications. Ensure uptime, reliability, and scalability of IT infrastructure. Implement disaster recovery and business More ❯
our people-first culture and collaborative environment. Position Overview We are seeking an experienced IT Manager to lead and oversee all aspects of our organization's IT infrastructure and cybersecurity initiatives. This role is critical to ensuring the performance, security, and reliability of our technology systems to support ongoing operations in a fast-paced food manufacturing environment. Essential Duties and … and governance. Collaborate with executive leadership to align technology strategies with business needs. Manage the IT budget, including capital investments, operating expenses, and staffing. Develop and maintain a comprehensive cybersecurity strategy to protect the organization from internal and external threats. Collaborate with other departments to understand technology needs and deliver effective solutions. Maintain documentation for systems, processes, and IT policies. … manage the IT, providing mentorship, development opportunities, and performance evaluations. Foster a culture of continuous improvement, security awareness, and collaboration. Ensure that training programs are in place to maintain cybersecurity awareness for all employees. Oversee the daily operations of IT systems, including networks, servers, applications, and telecommunications. Ensure uptime, reliability, and scalability of IT infrastructure. Implement disaster recovery and business More ❯
supporting SMC and AFSPC acquisition programs. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization. Responsibilities include, but are not limited to : Serve as the RMF Cybersecurity Specialist for the organization's Systems. Maintain Day-to-Day security analysis of More ❯
supporting SMC and AFSPC acquisition programs. The position will provide "day-to-day" support for Collateral, Sensitive Compartmented Information (SCI) and Special Access Program (SAP) activities to meet NIST Cybersecurity requirements for system assessment & authorization. Responsibilities include, but are not limited to : Serve as the RMF Cybersecurity Specialist for the organization's Systems. Maintain Day-to-Day security analysis of More ❯
TEKsystems is searching for a CyberSecurity Engineer for a partner in the Atlanta area. Must be onsite. The CyberSecurity Software Engineer designs, develops, and tests cybersecurity software in languages such as Java, C, and C++. The CyberSecurity Software Engineer requires extensive knowledge of programming languages, software development, and computer operating systems in order to apply engineering principles … to software creation. The necessary skill areas for the CyberSecurity Software Engineer include programming and coding, fundamentals of computer science, design and architecture, algorithms and data structures, information analysis, debugging software, and testing software. The CyberSecurity Software Engineer also creates novel cybersecurity technology components and software to ensure that critical systems and information are resilient to cyber … exploits and attacks. The researcher also performs attendant vulnerability assessments, analysis, and software engineering and design. The CyberSecurity Software Engineer also develops hardware and software prototypes, and tests those prototypes in realistic environments. Key Responsibilities • Perform software development, software testing/debugging, software modification/enhancement, and software documentation • Develop and maintain kernel and user-level software and scripts More ❯
We have an outstanding career opportunity for a CyberSecurity Lead to join a leading Company located in the Honolulu, HI (On-Site) surrounding area. Location: Honolulu, HI (On-Site) Clearance: TS/SCI • At start date, must possess current IAM Level III Certification. One or more of the following certifications in ACTIVE status are acceptable. o GSLC - GIAC Security … Leadership Certification o CISM - Certified Information Security Manager o CISSP - Certified Information Systems Security Professional (or Associate) • 10+ years' knowledge of DoD and Army cybersecurity policy. • 3+ years' CyberSecurity planner and/or Defense Cyberspace Operations (DCO) experience. • 3+ years' program management experience and the ability to conduct Joint level network planning. • Experience with Army tactical communications systems. • Experience More ❯
Risk/Mission Assurance Control Systems Cybersecurity Consultant Location: Onsite at the Pentagon 2 days/week Clearance: Top Secret with SCI Rate: 100-115/hr 1099 or 175K W2 with full benefits Risk/Mission Assurance Control Systems Cybersecurity Consultant to apply mid-tier technical expertise to support mission mapping and prioritization efforts across the Department of the … experience, listed in order of importance) • Risk Management & Mission Assurance - 3+ years implementing NIST RMF and mission-assurance methodologies in DoD or civilian critical-infrastructure contexts • OT/ICS Cybersecurity - 3+ years securing SCADA (Supervisory Control and Data Acquisition), ICS (industrial Control Systems), and other operational-technology systems • Vulnerability Prioritization & Mission Mapping - 3+ years developing risk-based frameworks that align … cyber vulnerabilities to mission impact • Strategic Briefing & Communication - 3+ years delivering technical reports and briefings to mid and senior-level stakeholders • Cybersecurity Governance & Compliance - 3+ years ensuring conformance with NIST CSF (Cybersecurity Framework), DoD instructions, and Air Force policies • Stakeholder Engagement & Facilitation - 3+ years leading workshops and working sessions to plan risk mitigation • Project Management - 3+ years coordinating schedules, deliverables More ❯
in Data and VOIP, WAN , WiFi and cloud Network Management in a large busy environment. The post holder will also be responsible for the management of several firewalls and cybersecurity and the change control processes. and help the desktop Engineers and other end user support resources effectively. They will also analyse, report and be responsible for the SLAs associated with … resources are available to meet growth in demand. Provide technical guidance on IT security and ensure compliance with the Trust's Security Policy, reporting any suspected breach to the CyberSecurity Manager and working with them to resolve any cybersecurity issues. Undertake technical reviews of IT systems and analyse, report and take necessary actions on the provision of Digital IT More ❯
Junior Cybersecurity Consultant - Risk & Mission Assurance (OT/ICS) Location: Pentagon - 3 days onsite/2 days remote Clearance Requirement: Active DoD Top Secret clearance (SCI eligible) We're seeking a Junior-Level Cybersecurity Consultant (1-3 years' experience) to support mission assurance and OT cybersecurity efforts across a branch of the Armed Forces' critical infrastructure portfolio. In this role … reports and visualizations, and update compliance documentation while gaining hands-on experience with AI-enabled tools and mission-critical cyber processes. Responsibilities: • Support mission mapping activities that align OT cybersecurity with operational priorities • Assist in collecting and analyzing cyber vulnerability data in OT/ICS systems • Draft status updates, slide decks, and summary reports for technical and executive audiences • Coordinate … track follow-up actions • Maintain documentation to support NIST CSF, and DoD compliance. 1 - 3 years of experience with the following: • Supporting NIST RMF, mission assurance, or critical infrastructure cybersecurity • Familiarity with SCADA/ICS/OT systems and basic cyber protection practices • Exposure to vulnerability analysis and linking cyber risks to mission impact • Strong written communication skills (reports, briefings More ❯
GreyMatter , we produce operational, strategic, and tactical intelligence that delivers actionable insights into threat actor tactics, techniques, and procedures . Beyond this, we act as a thought leader in cybersecurity by offering original insights that highlight our expertise in detecting, containing , investigating, and responding to adversaries. If you thrive in a high-performance environment, this role will challenge you to … meetings and regular business reviews, understanding their unique environment and challenges to optimize their cyber resiliency. Do you have what it takes? 3-4 years' experience of working in cybersecurity and/or cyber threat intelligence A relevant bachelor's degree (e.g., languages, computer science, cybersecurity, international relations, political science), equivalent education, or appropriate professional experience Knowledge of cyber adversary … analytical skills , a demonstrated writing abilit y, and excellent verbal communication Experience working in online intelligence investigations and analysis, including strong OSINT skills What makes you uncommon? Understanding of cybersecurity and IT disciplines including networking, operating systems, authentication protocols, security incident response , and enterprise technical security solutions (SIEM, IDS/IPS, firewall solutions, offensive security tools ) Basic knowledge of Linux More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Reed Technology
IT Security and Service Management Contract Type: Permanent Salary: £55,000 - £65,000 About the Role We are seeking a highly experienced and motivated GRC Lead to join our CyberSecurity team. This role is critical in shaping and delivering our information assurance strategy, ensuring that cybersecurity risks are effectively managed across the organisation. As a senior member of … senior leadership and translating complex technical requirements into actionable governance strategies. With a significant project pipeline launching in 2026, this is a unique opportunity to influence the future of cybersecurity governance in a regulated environment. Key Responsibilities Own and evolve the Information Security Assurance Framework and programme. Lead themed reviews to assess the effectiveness of security controls. Manage the … Drive compliance with frameworks including DSPT , CAF , ISO 27001 , and GDPR . Lead the security culture, education, and awareness programme across the organisation. Collaborate with external bodies to mature cybersecurity practices across the health and social care sector. Present findings, risks, and recommendations to senior stakeholders and leadership teams. Ensure timely and accurate submission of compliance documentation, including NHS More ❯
Employment Type: Permanent, Part Time, Work From Home
Evaluation Document (SED) CDRLs. Multiple programs is highly desirable. o Working knowledge of Type 1, Suite A, Suite B, and Commercial Cryptographic algorithms (Symmetric and Asymmetric). Experience with Cybersecurity and Risk Management Framework Cybersecurity Credential (e.g., CISSP) Experience using Cameo Systems Modeler for systems architecture, design, and requirements traceability. More ❯
The CyberSecurity Architect is an intermediate level position responsible for driving efforts to prevent, monitor and respond to information/data breaches and cyber-attacks. The overall objective of this role is to ensure the execution of Information Security directives and activities in alignment with Citi's data security policy. Responsibilities: Plan, research, and design security architecture for IT More ❯
Are you a CyberSecurity Engineer looking for a role that offers the opportunity to lead on critical projects in a period of large scale digital transformation project? If so Found Talent may have the role for you Working for a leader within their field you will be tasked with managing and maintaining the organisations IT security, as part of … organisations security stance across on-premises and cloud environments. Arranging and running annual penetration tests to identify and address vulnerabilities. Running campaigns across the business to raise awareness about cybersecurity best practices. Developing and executing a comprehensive security plan. Identifying all security initiatives necessary for safeguarding the organisation's assets. Building business cases and a roadmap to deliver the security … CySA+, CASP+, PenTest+, or Microsoft Azure Security). Proficiency in cloud security technologies would be beneficial. Strong understanding of firewalls, networking, Microsoft 365, and endpoint security. Keen awareness of CyberSecurity trends and hacking techniques. Analytical mindset, problem-solving skills, and ability to work independently. Flexibility to prioritise tasks and meet deadlines effectively. What youll receive in return: Annual bonus. More ❯
We are looking for a Chief Information Security Officer (CISO) to join our team. In this role, you will lead Remepy's global cybersecurity strategy, ensuring the integrity, confidentiality, and availability of our digital health platform, patient data, and regulated software products. You'll be responsible for aligning information security and data protection with our mission to deliver FDA-regulated … in one of our office locations offering the opportunity to collaborate closely with our dynamic team in person. Responsibilities Design, implement, and lead Remepy's security practice and enterprise cybersecurity program Own security compliance with HIPAA, 21 CFR Part 11, FDA pre/postmarket cybersecurity guidance, and related frameworks Collaborate with Product, Engineering, and Compliance to embed security-by-design … Strong communicator who can translate security priorities to technical and non-technical audiences Experience supporting FDA submissions, audits, and documentation Demonstrated ability to scale and lead a high-performing cybersecurity team Executive presence and comfort engaging with regulatory bodies and strategic partners Nice to Have Certifications: CISSP, CISM, HCISPP, CIPP/US, or similar Experience in fast-paced startup environments More ❯
CyberSecurity Lead - Sentinel & Azure Local Government Rate: £650 per day IR35: Inside IR35 Location: Hybrid - 2 days per week onsite in London Contract: 3 months initially, with strong potential for extension Salt Recruitment's Local Government team is working with a London-based Local Authority to recruit an experienced and hands-on CyberSecurity Lead . This role will … You'll also be expected to mentor internal analysts and drive cross-departmental engagement on cyber posture, compliance, and incident response readiness. Key Responsibilities: Act as the lead for cybersecurity across multiple projects and programmes Design and implement Sentinel playbooks to automate detection and response Lead on PSN audit readiness and ensure compliance with key frameworks (Cyber Essentials, ISO27001 … Coordinate efforts across IT, digital, and service departments to embed secure-by-design principles Essential Requirements: Strong hands-on experience with Microsoft Sentinel and Azure, including playbook development Proven cybersecurity leadership within a Local Government environment (this is essential) Direct experience supporting or leading PSN audits and wider compliance activities Strong working knowledge of core security frameworks: ISO27001, CyberMore ❯