Location: Aldermaston Onsite 1-2 days per week. Duration: 2 years We are seeking a DV Cleared OT Cyber Security Engineer with strong expertise in Secure by Design (SbD) principles to join a high-profile Defence programme. This is a critical role ensuring that Operational Technology (OT) environments are protected against evolving cyber threats while remaining resilient, safe, and … compliant with security standards. The successful candidate will be responsible for designing, implementing, and reviewing OT security controls across complex systems, supporting both engineering and assurance activities. Key Responsibilities Apply Secure by Design principles throughout the engineering lifecycle. Conduct threat modelling, risk assessments, and security design reviews for OT environments. Work closely with engineering and project teams … to embed security into delivery. Produce and review security documentation in line with MOD/Defence standards. Provide SME input on OT security to stakeholders across projects. Essential Skills & Experience Active UK DV Clearance (mandatory). Security Practitioner Strong background in Operational Technology. Demonstrable experience applying MOD/Nuclear Secure by Design (SbD) principles. Proven experience More ❯
Location: Aldermaston Onsite 1-2 days per week. Duration: 2 years We are seeking a DV Cleared OT Cyber Security Engineer with strong expertise in Secure by Design (SbD) principles to join a high-profile Defence programme. This is a critical role ensuring that Operational Technology (OT) environments are protected against evolving cyber threats while remaining resilient, safe, and … compliant with security standards. The successful candidate will be responsible for designing, implementing, and reviewing OT security controls across complex systems, supporting both engineering and assurance activities. Key Responsibilities Apply Secure by Design principles throughout the engineering lifecycle. Conduct threat modelling, risk assessments, and security design reviews for OT environments. Work closely with engineering and project teams … to embed security into delivery. Produce and review security documentation in line with MOD/Defence standards. Provide SME input on OT security to stakeholders across projects. Essential Skills & Experience Active UK DV Clearance (mandatory). Security Practitioner Strong background in Operational Technology. Demonstrable experience applying MOD/Nuclear Secure by Design (SbD) principles. Proven experience More ❯
Location: Aldermaston Onsite 1-2 days per week. Duration: 2 years We are seeking a DV Cleared OT Cyber Security Engineer with strong expertise in Secure by Design (SbD) principles to join a high-profile Defence programme. This is a critical role ensuring that Operational Technology (OT) environments are protected against evolving cyber threats while remaining resilient, safe, and … compliant with security standards. The successful candidate will be responsible for designing, implementing, and reviewing OT security controls across complex systems, supporting both engineering and assurance activities. Key Responsibilities Apply Secure by Design principles throughout the engineering lifecycle. Conduct threat modelling, risk assessments, and security design reviews for OT environments. Work closely with engineering and project teams … to embed security into delivery. Produce and review security documentation in line with MOD/Defence standards. Provide SME input on OT security to stakeholders across projects. Essential Skills & Experience Active UK DV Clearance (mandatory). Security Practitioner Strong background in Operational Technology. Demonstrable experience applying MOD/Nuclear Secure by Design (SbD) principles. Proven experience More ❯
Cyber Security Tech Lead Taking the lead role as a Cyber Security Technical Lead you will be principally responsible across the technical Security aspects of the organisations. Overseeing response to critical incidents and threats , managing an outsourced SOC team a n d supporting the Director of Security on tactical and also strategic development of the growing … Security Function of the top tier business. With an emphasis on Project related work I am looking for someone that has a strong all round Cyber security background with an emphasis on experience with the delivery of one or more of the following ISO2700x, Cyber Essentials, CIS, NIST , and emerging UK government cybersecurity initiatives. Demonstrable knowledge of cybersecurity … principles, theories, practices, and techniques, including offensive security . Technical knowledge and proficiency (operational and security) with Defender, Intune, Azure, and D365 . One or more of the following certifications CISSP, CISM, CISA, or CEH. Any experience in implementing and adhering to controls in a growing organisation would be beneficial especially New Territories. Also if you have done More ❯
Cyber Security Tech Lead Taking the lead role as a Cyber Security Technical Lead you will be principally responsible across the technical Security aspects of the organisations. Overseeing response to critical incidents and threats , managing an outsourced SOC team a n d supporting the Director of Security on tactical and also strategic development of the growing … Security Function of the top tier business. With an emphasis on Project related work I am looking for someone that has a strong all round Cyber security background with an emphasis on experience with the delivery of one or more of the following ISO2700x, Cyber Essentials, CIS, NIST , and emerging UK government cybersecurity initiatives. Demonstrable knowledge of cybersecurity … principles, theories, practices, and techniques, including offensive security . Technical knowledge and proficiency (operational and security) with Defender, Intune, Azure, and D365 . One or more of the following certifications CISSP, CISM, CISA, or CEH. Any experience in implementing and adhering to controls in a growing organisation would be beneficial especially New Territories. Also if you have done More ❯
Kingston Upon Thames, Surrey, United Kingdom Hybrid / WFH Options
Unilever
Please Note: The deadline for applying is 23.59 the day before the job posting end date. Job Title: Offensive Security Senior Manager Business Function: Cyber Security Location: Kingston Head Office Unilever is one of the world's leading suppliers of Food, Home, and Personal Care products with sales in over 190 countries and reaching 3.4 billion consumers a … diverse businesses and increasing representation of diverse groups in our advertising. Find out more about our commitment to equity, diversity, and inclusion on our website . Unilever's Cyber Security team is a global, product-led function aligned to the NIST Cyber Security Framework. We deliver capabilities across governance, protection, detection, response, and recovery to safeguard our people … operations, and digital assets. Operating alongside our Technology and Data teams, Cyber Security enables secure innovation and resilience across our global business. Our structure is built around product families and risk-based priorities, with teams embedded across regions and business units. JOB PURPOSE We are looking for a technically exceptional and visionary Senior Manager to lead our Offensive SecurityMore ❯
instrumental in installing, configuring, and maintaining scalable network devices, including Cisco routers, switches, and firewalls. You'll be responsible for designing and implementing secure network access solutions and managing security policies using Cisco ISE to meet our organization's critical requirements. You will continuously monitor network performance and troubleshoot complex issues to ensure system availability and reliability across our … and partnership with other IT platform teams to support and optimize overall network operations and engineering initiatives. A key aspect of the role involves implementing and managing our network securityarchitecture, including essential network security patching and upgrades, establishing security baselines, ensuring compliance, and overseeing hardware and software maintenance. You will also provide crucial Level … IP, BGP, OSPF, MPLS, VPN. Certifications: CCNA/CCNP/CCIE certification preferred. Routing Platforms: Experience with Cisco ISR, ASR, CSR. Switching Platforms: Experience with Cisco Catalyst & Nexus. Network Security: In-depth knowledge of Network Security, VPN, ACL, DMVPN, IPSEC, NAC, MAB, DOT1X, and Encryption Standards. Security Platforms: Experience with Cisco Firepower Threat Defense, ASA, Secure Firewall More ❯
Quantico, Virginia, United States Hybrid / WFH Options
Gridiron IT Solutions
Mobile Security and Vulnerability Engineer, Senior Location: Quantico, VA Work Type: Onsite Remote Work: No Job Description: Provide reverse engineering, static, and dynamic binary analysis, and vulnerability analysis of software on a variety of different platforms and operating systems. Write proof-of-concept software that simulates the behavior of analyzed binaries and their interactions with other system components and … validate any discovered vulnerabilities. Author technical documentation of research or findings as it relates to all security mechanisms, including access control, encryption, and obfuscation. Qualifications: 10+ years of experience with reverse engineering or vulnerability analysis Experience with Python, C, or C++ programming languages Experience with embedded device software development and compilers, linkers, and binary code generation process Experience with … binaries using static and dynamic reverse engineering techniques Experience with modern software exploitation techniques, secure boot process, and bootloader design implementation for iOS or Android platforms Experience with microcontroller securityarchitecture and integrations, including ARM architecture, assembly language, or mobile operating systems (OS's), such as Android or iOS Experience with extending or modifying developed exploit chains More ❯
basis. This position must be performed onsite in either San Diego, CA (preferred), Pearl Harbor, HI, Norfolk, VA, Charleston, SC, or in Washington D.C. and requires an active Secret security clearance. • Title: Senior Arista Network Engineer - PEO Digital Network Modernization • Location: San Diego, CA (preferred), Pearl Harbor, HI, Norfolk, VA, Charleston, SC, or in Washington D.C. (Onsite) • Salary Range … significantly degraded network performance and cloud services health, negatively impacting Navy mission objectives. Responsibilities: • Architect and Design Network Solutions: Lead the design and implementation of Arista's Spine & Leaf architecture, integrating with NXP SD-WAN and Microsoft Azure HCI solutions to modernize the network infrastructure. • Network Modernization: Work closely with PEO Digital to transition legacy network infrastructure into a … modern, resilient, and high-performance system aligned with Zero Trust security principles. • Cloud-Native Networking: Develop and implement cloud-native solutions that extend NAVWAR's Base Area Network (BAN) into the GovCloud, enabling scalable, high-availability operations across a multi-cloud hybrid environment. • Performance Optimization: Improve network performance by reducing latency, minimizing packet loss, and eliminating network outages. Provide More ❯
it. An opportunity to play your part - Are you a driven and motivated individual looking to make a real impact? Join Centrica's DTS team as a Senior IS Security Architect and be part of our mission to innovate and secure our IT landscape! In this role, you'll design and develop IS architecture solutions that address business … challenges, ensuring alignment with our enterprise architecture standards. You'll be involved in technical planning, architecture development, and modifying specifications to meet evolving needs. Your expertise will help develop new products, services, and applications, while ensuring compatibility and integration across interdependent technologies. Design and develop integrated IS architecture solutions for business problems. Perform technical planning and architecture … integration of proposed standards to ensure a cohesive architecture. Location : UK, Windsor (talk to us about flexible working) The day to day: Define, enhance, and implement Centrica's information security architecture. Ensure consistent administration of information security policies, standards, procedures, and controls to effectively improve security posture. Collaborate with Solution Architects to provide input into High-Level More ❯
Plymouth, Devon, United Kingdom Hybrid / WFH Options
Pontoon
Job Title: IT Security Architect Contract: Contract role Location: Hybrid - Based in Plymouth or Exeter Sector: Energy & Utilities About the Role We're working with a leading organisation at the heart of the UK's energy transition-powering the move toward a cleaner, greener future. They're currently seeking an experienced IT Security Architect to support a portfolio … digital and cloud transformation projects. This is a hybrid contract role with on-site presence expected in Plymouth or Exeter . You'll play a key part in ensuring security is embedded across IT platforms, helping to safeguard systems that are essential to the UK's energy infrastructure. What You'll Be Doing Define and own securityarchitecture for key IT projects across cloud and on-premises environments. Provide security expertise and direction to delivery and engineering teams. Drive secure-by-design principles and ensure compliance with internal and industry security standards. Conduct 1st-line cyber risk assessments and supply chain assurance for third-party vendors. Review supplier contracts to ensure appropriate security clauses More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
La Fosse
DV Security Consultant We are seeking an experienced Contract Security Consultant with active DV clearance to support high-assurance UK Government and Defence projects. The ideal candidate will bring deep expertise across SecurityArchitecture, Engineering and secure system design, contributing to the delivery of robust and compliant solutions in sensitive and mission-critical environments. Day Rate … 900pd IR35 Status: Outside Duration: 6 Months initially Travel: 4 days a week in Cambridgeshire Office (1 day WFH) Clearance Level: Active DV This Security Consultant will have the previous following experience: Design and implement secure systems for classified and unclassified networks, assess vulnerabilities, apply risk mitigation strategies, and validate security posture to meet baseline compliance and operational … requirements Partner with engineering teams, customers, and government agencies to develop security policies, operational processes, technical designs, and ensure integration with SIEM and monitoring systems. Demonstrated proficiency in network/system security (firewalls, IDS/IPS, micro-segmentation), IAM (RBAC, ABAC, JWT), secure coding practices (OWASP, SANS), and hands-on experience with tools like Trellix, Ivanti, ClearSwift. Deep More ❯
work in a uniquely collaborative model across the firm and throughout all levels of the client organization, generating results that allow our clients to thrive. What You'll Do Security Continuous Monitoring Oversight Establish and lead BCG's first enterprise-wide Cybersecurity Continuous Monitoring (CSCM) program, ensuring continuous visibility into system, endpoint, network, and cloud activity. Define and implement … and integrate telemetry sources across SIEM, EDR, identity, network, and cloud platforms. Ensure monitoring outputs are actionable, enriching detection and response activities and informing risk and compliance stakeholders. Technical Architecture & Integration Design and implement a continuous monitoring reference architecture, leveraging SIEM, SOAR, UEBA, and threat intelligence. Establish enterprise logging standards covering log coverage, retention, encryption, access, and integrity … improvement cycles. Strategic Leadership Serve as the founding leader for the CCM function, creating the strategy, roadmap, and tactical build plan. Partner with enterprise stakeholders across IT, Risk, and Security to align monitoring with business risk tolerance and resilience objectives. Influence senior leaders by translating technical telemetry insights into business-relevant intelligence. Build, inspire, and retain a high-performing More ❯
to $250,000 per year Job Overview: At Mauck Research Group, LLC, we are seeking a highly skilled and motivated Android Cyber Tool Developer with a TS/SCI security clearance to join our dynamic team. As an Android Cyber Tool Developer, you will play a crucial role in researching and developing cutting-edge security tools for the … is dedicated to shaping the future of cyber operations. Responsibilities: - Conduct research to identify new vulnerabilities and attack vectors in Android operating systems. - Develop and implement robust and scalable security tools to understand risks and explore overall system security. - Collaborate with cross-functional teams to ensure seamless integration of developed tools into existing systems. - Stay abreast of the latest … or a related field. (Master's degree preferred) Minimum of 3 years of experience in Android development, including proficiency in Java, Kotlin, and Android SDK. Solid understanding of mobile security concepts, including secure coding practices, encryption algorithms, authentication protocols, and vulnerability assessment. Familiarity with Android security frameworks, libraries, and APIs. Experience with threat modeling, risk assessment, and securityMore ❯
Cyber Security Programme Manager - Contract Location: Bishopsgate, London (Hybrid - 3 days onsite) Contract Length: 6 months IR35 Status: Outside IR35 Start Date: ASAP Day Rate: Competitive A leading organisation in the construction sector is seeking a Cyber Security Programme Manager to oversee the delivery of strategic security programmes within a Microsoft Azure environment. This role will support … the business in strengthening its security posture across infrastructure, data, and identity, while ensuring compliance with industry standards. Key Responsibilities: Lead the planning and execution of cybersecurity programmes across the organisation Manage stakeholder relationships across IT, operations, and compliance teams Implement and optimise Microsoft security tools and frameworks Ensure alignment with regulatory and industry standards (e.g. ISO … by-design and Zero Trust principles Tech Environment: Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview (Data Governance & DLP) Microsoft Intune Azure Security Center Candidate Profile: Experience delivering cyber programmes in Microsoft environments Strong understanding of Azure securityarchitecture and tooling Background in construction, infrastructure, or related industries is beneficial More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
Cyber Security Programme Manager - Contract Location: Bishopsgate, London (Hybrid - 3 days onsite) Contract Length: 6 months IR35 Status: Outside IR35 Start Date: ASAP Day Rate: Competitive A leading organisation in the construction sector is seeking a Cyber Security Programme Manager to oversee the delivery of strategic security programmes within a Microsoft Azure environment. This role will support … the business in strengthening its security posture across infrastructure, data, and identity, while ensuring compliance with industry standards. Key Responsibilities: Lead the planning and execution of cybersecurity programmes across the organisation Manage stakeholder relationships across IT, operations, and compliance teams Implement and optimise Microsoft security tools and frameworks Ensure alignment with regulatory and industry standards (e.g. ISO … by-design and Zero Trust principles Tech Environment: Microsoft Sentinel Microsoft Defender (Cloud, Endpoint, Office 365) Microsoft Entra ID (Azure AD) Microsoft Purview (Data Governance & DLP) Microsoft Intune Azure Security Center Candidate Profile: Experience delivering cyber programmes in Microsoft environments Strong understanding of Azure securityarchitecture and tooling Background in construction, infrastructure, or related industries is beneficial More ❯
A successful candidate will partner with application owners and enterprise service providers to design identity and access management controls for internally and externally hosted applications. The position is 50% securityarchitecture, 30% technical leadership, and 20% research and development. The individual works with project delivery and enterprise architecture teams to set standards, provide leadership, and be the … final approval from a security perspective on projects and standards. Responsibilities: Acts as a subject matter expert and has a strong understanding of product roadmaps, trends, and industry practices Ability to work with leaders and team members at all levels and across functional lines Demonstrates effective verbal and written communication skills Demonstrates experience establishing and maintaining effective working relationships … Strong analytical skills and the ability to think strategically Critical thinking skills and does not hesitate to question status quo Requirements: Bachelor's degree 7 years of information security experience, including 4+ years cybersecurity architecture 7 years of experience delivering technology solutions in large-scale complex organizations Preferred Qualifications: Working experience implementing federated identity systems, directory services, role More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
INTEC SELECT LIMITED
Security Architect – Contract Global Investment Bank Overview: A leading global investment bank is seeking a highly experienced Security Architect to join their Cyber Security team. This role will play a key part in designing, developing, and implementing secure architectures across cloud, on-premises, and hybrid environments, ensuring alignment with enterprise security standards. Role & Responsibilities: Design and … maintain security architectures, principles, and reference models. Review and approve technical designs to ensure security compliance. Establish and enforce secure-by-design guidelines and frameworks. Assess emerging technologies and lead security tool evaluations. Conduct security risk assessments for new initiatives. Collaborate with engineering, infrastructure, and SOC teams globally. Provide subject matter expertise, training, and mentorship on … secure design. Essential Skills and Requirements: 7+ years’ experience in security architecture. Proven hands-on experience with SIEM, Proxy, EDR, DLP, and SEG implementations. Strong expertise across cloud (AWS, Azure, GCP), networks, and applications. Familiarity with DevSecOps, zero trust, secure SDLC, and threat modelling. In-depth knowledge of Active Directory security and networking concepts. Relevant certifications (e.g., CISSP More ❯
our capabilities to meet the increasing demand for cybersecurity solutions. Join us and be part of a global team of over 13,000 professionals dedicated to delivering cutting-edge security transformation programs and services. The Opportunity: As a Manager in Cybersecurity, you will play a pivotal role in advising organizations on how to define, manage, and transform their security posture. You will lead cybersecurity engagements, support business development activities, and collaborate with colleagues across the UK and globally to develop innovative solutions that address client security challenges. Key Responsibilities: Deliver high-quality cybersecurity engagements, ensuring alignment with EY's standards of technical excellence and client satisfaction. Act as a direct point of contact for clients, maintaining proactive … Expertise in developing impactful written presentations and engaging effectively with senior stakeholders. Specialization in one or more of the following areas: Identity and Access Management Data Privacy and Protection SecurityArchitecture Operational Technology Security Governance, Risk, and Compliance Ideally, You'll Also Have: Security-related qualifications such as CISSP, CISM, CISMP, ISO27001 lead implementer or auditor More ❯
our capabilities to meet the increasing demand for cybersecurity solutions. Join us and be part of a global team of over 13,000 professionals dedicated to delivering cutting-edge security transformation programs and services. The Opportunity: As a Senior Consultant in Cybersecurity, you will play a key role in advising organizations on how to define, manage, and transform their … security posture. You will deliver EY's cybersecurity offerings, support new client pursuits, and collaborate with colleagues across the UK and globally to develop innovative solutions that address client security challenges. Key Responsibilities: Deliver high-quality cybersecurity engagements, ensuring alignment with EY's standards of technical excellence. Support business development activities, including proposal writing and impactful presentations to … Expertise in developing impactful written presentations and engaging effectively with senior stakeholders. Specialization in one or more of the following areas: Identity and Access Management Data Privacy and Protection SecurityArchitecture Operational Technology Security Governance, Risk, and Compliance Ideally, You'll Also Have: Security-related qualifications such as CISSP, CISM, CISMP, ISO27001 lead implementer or auditor More ❯
Supports the Government in the design, development, implementation, and/or integration of IA architectures, systems, or system components • Provides the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity • Performs system or network designs that encompass multiple enclaves … recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise securityarchitecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master … s Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD Information Security regulations, publications, and policy Must meet specified certification requirements defined and documented by DOD 8570 - IASAE Level III a must have More ❯
Supports the Government in the design, development, implementation, and/or integration of IA architectures, systems, or system components • Provides the Government assistance to ensure that the architecture and design of information systems are functional and secure, including program of record systems and special purpose environments with platform IT interconnectivity • Performs system or network designs that encompass multiple enclaves … recent experience within the last five years, with Defense-in-Depth principles and technology, including access/control, authorization, identification and authentication, Public Key Infrastructure (PKI), network and enterprise securityarchitecture • 2 years of experience applying security risks assessment methodology to system development, including threat model development, vulnerability assessments, and resulting security risk analysis • A Master … s Degree in Computer Science or IT Engineering is desired and may be substituted for 6 years of experience • Knowledge of Federal, NSA, IC, and DoD Information Security regulations, publications, and policy This is a CWIP Billet per DoD Directive 8570-1 and must meet specified certification requirements defined and documented by the TTO COR - IASAE Level III a More ❯
Responsibilities: • Employing security concepts, theories, insights, tools and methodologies to mitigate system weaknesses and vulnerabilities • Appling advanced analytical skills and technical resources at the tactical levels and implementing infrastructure solutions supporting command decision making and execution of mission requirements • Providing support as needed to lab staff in the tasks of provisioning and issuing equipment to end users, as well … implementation of granular access control • Maintaining Fly Away Kits (FAKs) sanitization, inventory, repairs, and maintenance - Monitoring systems for acceptable performance and user accessibility, establish back-ups, and monitor systems security • Creating monitoring reports and logs • Providing insight and expertise to a Federal Lab Manager as Subject Matter Expert (SME) in regards to network architecture, hardware and software implementation … lab standard operating procedures (SOPs) and policies • Determining appropriate courses of actions in response to identified and analyzed anomalous network activity • Assessing network topology and device configurations identifying critical security concerns and providing security best practice recommendations • Assisting with conducting peer reviews and provides quality assurance reviews for junior personnel • Assisting with overseeing technical analysis by mentoring/ More ❯
customer (digital service user) experience and service responsiveness, with a focus on purpose and the need to maximise service user productivity and effectiveness Improvement of performance, availability, reliability, and security, of service under-pinning technologies (Hosting & Data Centres, Compute, Storage, Networking, End User Computing) Visible leadership to the digital and information teams, deputising for the CDIO as required, and … ensuring teams within their remit deliver on strategic, operational and regulatory objectives. Develop and deliver the technical strategy for the Trust in conjunction with the Head of Enterprise Architecture including, systems and securityarchitecture, integration, cyber-security posture, Effective management, reporting, accountability and compliance for all aspects of Cyber & IT Security including compliance with law … and guidance, and resolution of Cyber & IT security risks and law issues About us The Northern Care Alliance NHS Foundation Trust (NCA) provides hospital and integrated health and social care services to over one million people living across Greater Manchester. Our 20,000 colleagues care for people in hospital and in the community, working across Bury, Rochdale, Oldham and More ❯
our capabilities to meet the increasing demand for cybersecurity solutions. Join us and be part of a global team of over 13,000 professionals dedicated to delivering cutting-edge security transformation programs and services. The Opportunity: As a Senior Manager in Cybersecurity, you will leverage diverse ideas and perspectives to deliver technical excellence and provide relevant insights to our … clients. You will play a pivotal role in managing cybersecurity engagements, building client relationships, and leading teams to develop innovative solutions that address complex security challenges. Key Responsibilities: Deliver high-quality cybersecurity engagements, ensuring alignment with EY's standards of technical excellence and client satisfaction. Build and maintain strong relationships with clients, leveraging these connections to effectively execute work … Expertise in developing impactful written presentations and engaging effectively with senior stakeholders. Specialization in one or more of the following areas: Identity and Access Management Data Privacy and Protection SecurityArchitecture Operational Technology Security Governance, Risk, and Compliance Ideally, You'll Also Have: Security-related qualifications such as CISSP, CISM, CISMP, ISO27001 lead implementer or auditor More ❯