coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications: CISSP, CISM, or CISA are a plus. Education: Bachelor’s degree in Computer Science, Cyber Security, or a related field (Master’s more »
conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF), Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), Certified Information Systems more »
Industry Security Qualifications, e.g. CCP, CISSP, CISM (or able to achieve) Proven experience of assessing and managing risk in line with industry good practice (NIST, ISO 27001) Significant experience with using security baselines, mitigations and controls Engineering background and or strong familiarity with a life cycle phased approach Desirable: Experience more »
Industry Security Qualifications, e.g. CCP, CISSP, CISM (or able to achieve) Proven experience of assessing and managing risk in line with industry good practice (NIST, ISO 27001) Significant experience with using security baselines, mitigations and controls Engineering background and or strong familiarity with a life cycle phased approach Desirable: Experience more »
skills and experiences: Experience as an Auditor or Implementer of ISO27001 Expert understanding of information security principles and Security Frameworks including ISO 27001 andNIST Experience in Cyber Security in relation to DEFCON 658, DEFSTAN 05-138, MOD Accreditation/Secure by Design Degree (or equivalent experience) in a relevant more »
across Tech and Data Determine, adopt, embed and assess the infoSec framework and certification appropriate to our organisation and markets considering new laws, DORA, NIST, ISO27001, CIS, CQUEST etc) Define and execute the cyber strategy, prioritising short, medium and long-term investment considering resilience and risk factors Work with stakeholders more »