London, South East, England, United Kingdom Hybrid / WFH Options
Searchability
Senior Cyber Security Engineer Excellent opportunity for an experienced Cyber Security Engineer with MSP experience to join a high-performing team delivering security solutions across Microsoft technologies and supporting compliance frameworks. Full-time, permanent position based in London with hybrid working (3 days in office, 2 remote), offering up to £60,000 depending on experience. Immediate start … available - candidates with hands-on Microsoft Security experience and relevant certifications are highly encouraged to apply. To apply, please email Who are the client? Our client is a recognised UK-based Managed Services Provider with strong accreditations and a reputation for excellence in technology and employee development. They are an IASME certification body and work with a broad client … base across sectors to deliver robust cyber security strategies. The company is growing and offers an outstanding culture of innovation, development, and recognition. What will you be doing? This senior, client-facing cyber security position is ideal for someone who enjoys both technical implementation and supporting security frameworks such as Cyber Essentials. You will play a key More ❯
Basildon, Essex, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
interoperability with partners, allies and NATO to get the right information to the right place at the speed of relevance. CEMA are currently recruiting for a highly motivated Lead Security Engineer to join their team. The nature of the role requires you to be based on site at anyone of our following locations; Basildon, Southampton, Luton, or Bristol. There … will also be occasional travel to our customers, suppliers and other Leonardo sites in the UK and overseas. As a Lead Security Engineer, you will be responsible for providing Security Assurance to support the development and delivery of the products with the ambition to meet the Secure by Design principles. You will oversee the development, implementation, and management of security protocols, tools, and practices on maturing products meets the appropriate standards and legislation. Working closely with the Integrated Product Team (IPT) frameworks with specialists from other disciplines (Software, Systems, and Electronics engineers), you will provide specialist knowledge and advice throughout the product lifecycle. Provide independent Information Assurance (IA) on products outside of your immediate responsibility, including More ❯
Yeovil, Somerset, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Job Description: The opportunity: Leonardo UK is seeking a proven and experienced Principal Consultant to join the Cyber & Security Solutions Division team. This role is focused on the delivery of one of the company's core products to an existing customer. This role will lead a team that will oversee, co-ordinate and deliver all facets of cyber and … information security related to the delivery across an engineering lifecycle - from requirements all the way through to in-service support and maintenance. This is an exciting opportunity at the very beginning of a significant programme, during which you will ensure that the product and associated deliverables are as secure as reasonably practicable, and in accordance with customer's requirements … and working on site at one of our Leonardo offices and closely with our customers. Talk to us to find out more. What you'll do as a Principal Security Consultant: Leading a team to meet all aspects of the cyber and information security delivery across an engineering lifecycle. Interpreting customer requirements into actionable securitymanagementMore ❯
Washington, Washington DC, United States Hybrid / WFH Options
CGI
opportunity for a Senior Cybersecurity ISSO Analyst to join a dynamic new program for one of our Federal Government clients. You will be part of a team of cyber security professionals working to improve the security posture for our client by evaluating systems and identifying and helping to mitigate cyber risks. At a high level, you will be … Interpret incidents to understand the impact and threat mechanisms - Own the response and remediation for alerts - Ensure that each alert description and recommendation is clearly articulated to technical and management personnel - Develop proper response actions as part of guided response to DOJ, in the context of a specific security incident - Engage with DOJ to guide through a response … action - Develop possible remediation plan(s) for a specific security incident. Document as part of the playbook. - Develop response and remediation templates - Provide the required subject matter expertise for effective EDR implementations - Assist with response and recovery actions when appropriate - Document lessons learned and best practices as part of day-to-day operations and review with appropriate leadership - Support More ❯
WAN), electronic mail, telecommunications, and PC based systems and related software within a cybersecurity environment Evaluates hardware and software, including peripheral, output, and telecommunications equipment Sets up and administers security procedures; troubleshoots problems Recommends and implements LAN policies and procedures and ensures adherence to security procedures Trains users on LAN operations and procedures Qualifications Required Skills/Experience … Mid Level: 5 years of experience Microsoft Windows Active Directory Understanding of NIST 800 series publications and Federal Information SecurityManagement Act (FISMA) compliance Must be a U.S. Citizen An active DoD Top Secret clearance with SCI eligibility is required to perform this work. Candidates are required to have an active Top Secret clearance with SCI eligibility upon … employment. Education Requirements : BS or B.A. Degree Preferred Qualifications: Microsoft Windows Server Hybrid Administrator Associate VMware Data Center Virtualization (VCP-DCV) Cisco Certified Network Professional (CCNP) Certified Information Systems Security Professional (CISSP) VMWare vSphere 7 experience (P) Cisco Networking (P) Dell Server, and SAN Storage hardware experience (P) Familiarity with system accreditation and authorization and the FBI's ATO More ❯
Overview We are looking for an experienced IT Security & ISO Compliance Specialist to lead the management and upkeep of our Information SecurityManagement System (ISMS) aligned with ISO 27001 standards. This role is pivotal to ensuring the organisation maintains robust compliance frameworks, manages documentation effectively, and prepares for audits and certifications. The ideal candidate will have … strong background in ISO 27001, and ideally experience with additional standards such as ISO , and CSR practices. This position may also support broader IT operations, including system testing, asset management, and security incident response. Key Responsibilities Manage and maintain compliance with ISO standards across the business, with a primary focus on ISO 27001. Develop and update documentation and … of continuous improvement and best practice in quality and information security. Support compliance with Data Protection regulations and PCI DSS requirements. Assess third-party vendors for compliance with organisational security and quality expectations. Assist in responding to customer security audits, questionnaires, and tender documentation. Provide support for general IT operations, including testing, investigations, and asset management when More ❯
Technology Governance Location: UK - Leeds Description Are you ready to take the challenge to educate all employees in a young and ambitious organisation about their role in making information security a core part of their modus operandi and conduct to appropriate behaviour change? DAZN is looking to hire an experienced Head of Risk & Compliance to join their Technology Governance … team as a Fixed Term 14-month maternity cover role. Leading a team overseeing the global strategic implementation of DAZN's information securitymanagement system (ISMS), the chosen candidate will be responsible for delivering annual workstream activities that form the ISMS programme to ensure continued conformity with standards such as ISO27001 and PCI DSS. What you'll be … doing: Leading the implementation and maintenance of DAZN’s information securitymanagement system (ISMS) in conformity with ISO27001. Managing and delivering annual workstreams for successful completion of audits against ISO27001 and PCI DSS. Providing subject matter expertise in information security risk, business continuity, and supplier risk management, including managing third-party risk activities. Maintaining standards and More ❯
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Alexander Mae Recruitment
a Head of Compliance. This is an exciting time to be joining this local, growing and forward thinking organising in Bristol. This role will be to lead their information security compliance efforts, specifically in line with ISO/IEC 27001 , ISO/IEC 42001 and Cyber Essentials PLUS standards. In this role you will be responsible for maintaining, auditing … and continuously improving their Information SecurityManagement System (ISMS), overseeing compliance initiatives, coordinating with internal teams, and ensuring the organization remains audit-ready. Additionally you will be implementing (alongside the technical and sales team) a Compliance as a Service ( CasS ) in which helps their clients with Pre Audits, Gap Analysis, Training and helping customer maintain their ISO Certifications. … Key Responsibilities: Instrumental in the building of a new Team to deliver CaaS and supporting services. Develop, implement, and maintain the Information SecurityManagement System (ISMS) aligned with ISO/IEC 27001 and Cyber Essentials PLUS standards. Lead internal audits, gap assessments, and risk assessments for ISO 27001 and Cyber Essentials PLUS. Coordinate and manage external audits and More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Alexander Mae (Bristol) Ltd
for a Head of Compliance. This is an exciting time to be joining this local, growing and forward thinking organising in Bristol. This role will be tolead their information security compliance efforts, specifically in line with ISO/IEC 27001 , ISO/IEC 42001 and Cyber Essentials PLUS standards. In this role you will be responsible for maintaining, auditing … and continuously improving their Information SecurityManagement System (ISMS), overseeing compliance initiatives, coordinating with internal teams, and ensuring the organization remains audit-ready. Additionally you will be implementing (alongside the technical and sales team) a Compliance as a Service ( CasS ) in which helps their clients with Pre Audits, Gap Analysis, Training and helping customer maintain their ISO Certifications. … Key Responsibilities: Instrumental in the building of a new Team to deliver CaaS and supporting services. Develop, implement, and maintain the Information SecurityManagement System (ISMS) aligned with ISO/IEC 27001 and Cyber Essentials PLUS standards. Lead internal audits, gap assessments, and risk assessments for ISO 27001 and Cyber Essentials PLUS. Coordinate and manage external audits and More ❯
Ripponden, Yorkshire, United Kingdom Hybrid / WFH Options
JLA Limited
and The Netherlands. Ensure compliance with data protection laws (eg GDPR, PECR) and internal privacy standards Provide expert advice and guidance on data protection impact assessments (DPIAs) and risk management Conduct regular audits to monitor compliance and address potential privacy issues Deliver training and awareness programs to employees on data protection best practices Collaborate with Legal, IT and HR … in emerging technologies (eg AI, IoT) In-depth knowledge of direct marketing laws as they relate to data privacy, such as the Privacy and Electronic Communications Regulations Strong project management skills Knowledge of data protection laws in Ireland and the Netherlands is helpful but not essential Knowledge of cybersecurity best practices and technologies Knowledge of data protection social norms … access requests and other requests from data subjects regarding their personal data Experience in delivering training and awareness programs to employees on data protection best practices Familiarity with information securitymanagement systems and data governance frameworks Experience in a legal, audit or risk management role Personal qualities (the way you think and act) An ability to work More ❯
Information System Security Officer (ISSO) Job Category: Security Time Type: Full time Minimum Clearance Required to Start: Secret Employee Type: Regular Percentage of Travel Required: Up to 10% Type of Travel: Local The Opportunity: CACI is looking for an Information System Security Officer (ISSO) to support our DoD customer to implement an enterprise IT service delivery model … end user experience across the customer environment. On this program, CACI will deliver enhanced capabilities and services to implement and operate an enterprise ITSM solution, enterprise service desk, endpoint management and security solution, as well as CONUS/OCONUS field support and life cycle support for end user devices to enable the DoD customer to transition focus from … in ensuring that a Certification and Accreditation package is prepared and maintained in accordance with (IAW) the DoD Information Assurance Certification and Accreditation Process (DIACAP), or the DoD Risk Management Framework (RMF). Overseeing System Owners to ensure they follow established IS policies and procedures. Reviews weekly bulletins and advisories that impact security of site information systems to More ❯
Information System Security Officer (ISSO) Job Category: Security Time Type: Full time Minimum Clearance Required to Start: TS/SCI with Polygraph Employee Type: Regular Percentage of Travel Required: None Type of Travel: None The Opportunity: CACI is seeking a cleared Information System Security Officer (ISSO) to provide support to the Information System Security Manager (ISSM … for maintaining the appropriate operations IA posture for a system, program, or enclave at Annapolis Junction, MD. Responsibilities: Maintain operational security posture for an information system or program. Provide Cyber Security oversight, guidance, and support in support of Assessment and Authorization ( A&A ) as required by the Federal Information SecurityManagement Act (FISMA) . Prepare system … security plan (SSP) and provide recommendations to assist in obtaining ATOs based on RMF experience IAW established cybersecurity policies and procedures. Verify package submissions have met the threshold for approval such as: CCIs, SCA-V results, POA&Ms, STIGs, Cyber Security Strategies and System Security Plans (SSPs) and other RMF documentation etc. Identify, develop (either directly, or More ❯
word format to The candidate will be responsible for evaluating key points in the System Lifecycle, such as before its deployment or during major updates. Responsibilities may include creating security documentation (e.g., System Security Plan, Security Assessment Report) and obtaining the final authorization to operate (ATO).The candidate should be able to provide assistance in collecting information … and answering questions in regard to many broad IT areas including, but not limited to: securitymanagement controls, access controls, provisioning and deprovisioning, transfers, separation of duties, configuration management, contingency planning, application security, business process controls, interface controls, and data management system controls. The candidate will be responsible for: • Conducting formal assessments and deciding whether … the system is authorized to operate • Conducting a formal assessment of the system's security posture • Evaluating whether security controls meet established standards and are functioning effectively • Documenting results and making recommendations for improving security • Recommending whether the system should be authorized to operate based on assessment outcomes • Ensuring that the system has the necessary securityMore ❯
Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act (FISMA) coordination and reporting, Risk Management Framework … RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cyber Data Science Engineer provides support to the customer in the area of Cyber Security. Daily Tasks include, but are not limited to: Utilize analytical, statistical, and programming skills to collect, analyze, and interpret large cybersecurity data sets … Develop data-driven solutions Analyze data sets found in the customer's vulnerability scanning, authorization, and configuration management tools Import and transform data into usable sets for analysis tools used by the customer (e.g., Tableau) Provide analysis and graphical presentations of collected metrics for IA compliance status reporting Support legacy visualization and situational awareness tools based on Microsoft Excel More ❯
everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 Create & Maintain an information securitymanagement system (ISMS) capable of demonstrating compliance against internal security requirements and external commitments including certification and regulatory requirements. Provide subject matter expertise in the application of … to any new or existing programme of work. Prepare and support internal and/or external compliance audit activities. Manage remediation of any audit (internal & External) non-conformities. Ensure security policies (on a risk-based approach) are produced, signed off by relevant stakeholders, published, and communicated. Also, ensure that policies are managed throughout their lifecycle and updated through yearly … or ad-hoc reviews. Produce relevant security standards documentation in consultation with Technical teams. Lead on providing information to Three UK Customers (B2B) regarding Three UK's security practices. Support proactive and effective oversight of technology and security risk management frameworks, methodologies, processes, assurance, remediation, and reporting activities across the company. Assist in designing, building, and More ❯
Linux/Windows Systems Administrator Location: Springfield, VA Clearance: Secret Position Overview: The Linux/Windows Systems Administrator is responsible for the design, implementation, maintenance, and security of the organization's Linux and Windows server infrastructure. The ideal candidate should possess strong expertise in Linux and Windows operating systems. Key Responsibilities: System Administration: Install, configure, and maintain Linux and … Windows servers. Perform routine system monitoring, analysis, and troubleshooting to ensure optimal system performance. Collaborate with cross-functional teams to design and implement system upgrades, patches, and new applications. SecurityManagement: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. … Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python, or PowerShell to automate routine tasks, streamline processes, and improve system efficiency. Create and update documentation for scripts, configurations, and procedures. User Support: Provide technical support to end-users for Linux and Windows-related issues. Collaborate with the More ❯
Position Summary Develops and deploys plans and designs of network systems that will meet our clients Security's requirements for performance, security, and compliance with relevant standards and regulations. Conducts network architecture design, feasibility, and cost studies. Defines monitoring, maintenance, expansion, contingency, and recovery plans and strategies to ensure the network is responsive to changes in demand. Troubleshoots … projects. Keeps informed of the latest technologies to enhance knowledge of networking hardware, software, and best practices. May be certified in vendor-specific products. Major Duties and Responsibilities Network management for client systems: Ability to manage client internal IT network Cyber Securitymanagement and oversight Develop and support all hardware configuration for all Avert products as determined … ARES demo environment onsite and/or hosted. Support SaaS sales with our infrastructure partner (nFina) on our scalable environment Create, develop, and implement solutions to address infrastructure and security requirements Troubleshoot, identify, and fix problems in the DevSecOps domain Identify management concerns and problems, assess them, and offer prompt solutions and/or escalation Required Work Experience More ❯
Administrator Experience: 4 Years Education Bachelors in IT. Location: Springfield, VA Clearance: Secret Position Overview: The Linux/Windows Systems Administrator is responsible for the design, implementation, maintenance, and security of the organization's Linux and Windows server infrastructure. The ideal candidate should possess strong expertise in Linux and Windows operating systems. Key Responsibilities: System Administration: Install, configure, and … Windows servers. Perform routine system monitoring, analysis, and troubleshooting to ensure optimal system performance. Collaborate with cross-functional teams to design and implement system upgrades, patches, and new applications. SecurityManagement: Implement and maintain security measures to safeguard systems against unauthorized access, vulnerabilities, and data breaches. Conduct regular security audits, vulnerability assessments, and implement corrective actions. … Stay updated on the latest security trends, vulnerabilities, and best practices. Scripting and Automation: Develop and maintain scripts using Bash, Python, or PowerShell to automate routine tasks, streamline processes, and improve system efficiency. Create and update documentation for scripts, configurations, and procedures. User Support: Provide technical support to end-users for Linux and Windows-related issues. Collaborate with the More ❯
and warfighter readiness. Visit for more details. Responsibilities Program Description: The program provides Systems Engineering and Technical Assistance (SETA) core and non-core support in the areas of Cyber Security and Management to improve the Information Assurance (IA) posture of a National customer. The contracts Core Capabilities are: IA Management, Federal Information SecurityManagement Act … FISMA) coordination and reporting, Risk Management Framework (RMF) application, IA compliance measurements and metrics, Assessment and Authorization (A&A), Vulnerability Management, and Cyber Defense support. Position Description: The Cross Domain Systems Engineer will support the design, integration, accreditation, and sustainment of Cross Domain Solutions (CDS) used to securely transfer information between networks of differing classification levels within Department … maintain a TS/SCI with Poly Able to support customer's core hours (; Mon - Fri) A Cyber Certification (DoD 8570/8140) 5+ years of Systems Engineering (configuration management, requirements management/writing, architecture, interfaces) experience, preferably in DoD or IC environments Experience leading projects or diverse teams in a DoD or government contracting environment Understanding of More ❯
Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant - Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that make … locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new business and managing delivery. … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in 'business as usual', technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Bristol, Almondsbury, Gloucestershire, United Kingdom Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant - Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that make … locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new business and managing delivery. … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in 'business as usual', technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Advance TRS
Senior Cyber Security Consultant - Defence There is an increasing demand in the projects we are undertaking for Information Assurance and Security Consultants, we are looking to grow our team to meet this. The role will suit experienced qualified professionals who are looking to take their career to the next level and provide real benefit to clients that make … locality of our offices, but with some travel requiring overnight stay. Your Purpose You will be a knowledgeable, enthusiastic and conscientious individual who has the relevant Information Assurance and Security qualifications. You will work on a range of exciting client facing projects, large and small, but will also be expected to contribute to winning new business and managing delivery. … successful in this role you need to have the ability to work on multiple projects and with many stakeholders concurrently. Your key responsibilities will encompass the following: Provide Cyber Security advice and guidance for clients in 'business as usual', technical refresh and new project environments. Be able to apply technical security knowledge, with creative and innovative thinking in More ❯
Facility Security Officer (FSO) with Information System Security Manager (ISSM) Experience Position Objective The FSO is responsible for implementing and maintaining a security program that complies with the NISPOM (32 CFR Part 117) and other regulations, and partnering with cognizant security authorities, senior management, and personnel. The FSO provides support for all security actions … in accordance with corporate and governmental policies and directives. The ISSM is responsible for ensuring the appropriate operational security posture is maintained for information system security requirements for Sparton's Authorized Information Systems (AIS). The successful candidate will have the knowledge and expertise required to manage all security aspects of information systems and oversee the day … to-day security operations of each system, associated media and networks. FSO Responsibilities: • Must have a thorough knowledge of the National Industrial Security Program Operations Manual (NISPOM), and any other polices and directives as necessary by site. • Serve as the manager on all physical and Proxy Agreement security requirements, with working knowledge of Foreign Ownership, Control and More ❯
Senior Cyber Security Risk Specialist – Make This Role Your Own! 3 days a week on-site in London or Crawley Circa £75K + up to 15% bonus + 10% pension + guaranteed annual salary increases Are you passionate about Cyber Security Risk and ready to play a key role in shaping a GRC function from the ground up … a business that’s right at the beginning of its cyber journey. With offices in both London and Crawley, they’re looking to build a best-in-class cyber security function and you’ll be right at the heart of that transformation. This isn’t a tick-box auditing role. It’s hands-on, it’s strategic, and it … front and centre. The best part? This role has space to be shaped by you. There are, of course, some core responsibilities, including: What You’ll Be Doing: Risk Management: Carry out cyber security risk assessments using the company’s risk framework, identifying key issues and tracking remediation actions. Communicate risks and treatments clearly to internal and external More ❯
Regular Percentage of Travel Required: None Type of Travel: None At CACI, we specialize in providing innovative and secure IT solutions to our clients in the defense and national security sectors. Our mission is to support critical infrastructure with the highest standards of service and reliability. We're looking for a skilled System Administrator to join our team and … accomplished System Administrator - Level 4 to lead and support complex enterprise IT environments, with a focus on high-assurance systems. This senior-level position involves architecture support, advanced troubleshooting, security compliance, and operational oversight across a range of IT platforms including UNIX, Linux, and Windows systems. The ideal candidate brings extensive hands-on experience, deep system knowledge, and leadership … in IT service and security management. Responsibilities: Oversee and support the implementation, configuration, maintenance, and troubleshooting of enterprise IT systems Manage the operation and configuration of server, storage, and network systems, including mobile device environments Deliver Tier 1 through Tier 3 support, including advanced issue escalation and root cause analysis Provide detailed technical feedback and reporting to agency leadership More ❯