Townhill, Swansea, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Blackwood, Gwent, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Alloa, Clackmannanshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Renfrew, Renfrewshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Dunblane, Perthshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Glenochil Village, Clackmannanshire, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Dunning, Perth & Kinross, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Bridgend, Mid Glamorgan, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Peebles, Scottish Borders, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Bilston, West Midlands, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Douglas, Isle of Man, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
Crook Of Devon, Perth & Kinross, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
EH547BW, Polbeth, West Lothian, United Kingdom Hybrid/Remote Options
Sky
s privileged security baseline. Be familiar designing and implementing closed loop credential management workflows. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Design, implement, and manage the PAM system to ensure the confidentiality, integrity, and availability More ❯
University Hospitals Bristol and Weston NHS Foundation Trust (UHBW)
will include delivery of mandated digital assurance work to meet statutory requirements, delivered in line with professional standards. The postholder will be suitably qualified in line with the NationalCyberSecurityCentre's Cyber Resilience Audit scheme, to hold a professional registration for the Cyber Audit and Assurance Chartership. They will investigate and advise on complex issues, including detailed cyberMore ❯
Prior experience working on government classified systems or within secure data centre environments. Experience of configuring and using AI technologies within cloud environments, including GCP AI technologies. Familiarity with NCSC guidance, UK Government cloud policies, or cross-domain architectures. Knowledge of multi-cloud integrations, edge computing, and data sovereignty requirements. NB: The ideal applicant will hold a minimum of SC More ❯
Westminster, London, City of Westminster, United Kingdom
Summer Browning Associates
Prior experience working on government classified systems or within secure data centre environments. Experience of configuring and using AI technologies within cloud environments, including GCP AI technologies. Familiarity with NCSC guidance, UK Government cloud policies, or cross-domain architectures. Knowledge of multi-cloud integrations, edge computing, and data sovereignty requirements. NB: The ideal applicant will hold a minimum of SC More ❯
Prior experience working on government classified systems or within secure data centre environments. Experience of configuring and using AI technologies within cloud environments, including GCP AI technologies. Familiarity with NCSC guidance, UK Government cloud policies, or cross-domain architectures. Knowledge of multi-cloud integrations, edge computing, and data sovereignty requirements. NB: The ideal applicant will hold a minimum of SC More ❯
Smart energy and metering Oil and gas Water Civil Nuclear Transport (including aviation, rail, maritime, road and autonomous vehicles) Wider critical infrastructure Security standards relating to the sector, including: NCSC NIS Guidance and CAF ISO 27001 and ISO 27005 NERC CIP ISA-99/IEC 62443 NIST CSF. Additional information Please note that the interview stages may be subject to More ❯
the development lifecycle. Lead and mentor a small team of Cybersecurity Engineers . Design and deliver secure cloud architectures and solutions. Ensure compliance with key security standards and regulations (NCSC, ISO, NIST, GDPR, etc.). Support Continuous Security, CI/CD, and DevSecOps processes. Key Requirements: Proven experience designing and implementing secure cloud solutions. Strong understanding of application and infrastructure More ❯
Bristol, Avon, South West, United Kingdom Hybrid/Remote Options
ITS Recruitment
SOC, helping to ensure critical assets remain secure Manage supplier relationships, report on control effectiveness, and support compliance with ISO 27001, GDPR, and Cyber Essentials Plus Technology NIST, CIS, NCSC, Mitre Att&ck, Security Scorecard, M365/Azure Security Center Azure Security Center, SIEM, Defender ATP, M365 Security, Data Compliance and Governance, PIM & PAM Zscaler (ZTNA), Darktrace, Firewalls, NAC, Network More ❯
TW75QD, Syon, Greater London, United Kingdom Hybrid/Remote Options
Sky
and assessments of the IAM stack to identify and resolve security gaps, and provide evidence to auditors as required. Stay current with emerging technologies and security frameworks (e.g., NIST, NCSC), proactively recommending upgrades and improvements to senior stakeholders. Provide technical guidance and mentoring to team members, supporting best practices in authentication, access control, and identity lifecycle management. Develop and deliver More ❯
EH547BW, Polbeth, West Lothian, United Kingdom Hybrid/Remote Options
Sky
any security gaps or vulnerabilities. Work with auditors to and supply evidence as required. Stay ahead of the security curve and make best practice recommendations to senior management (NIST, NCSC etc.) Be able to work autonomously on complex projects, gathering key information and making appropriate recommendations. Mentoring and support for other members of the Team. What You'll Bring Solid More ❯
Andover, Hampshire, South East, United Kingdom Hybrid/Remote Options
Data Careers
background , ideally with knowledge of command, control, and intelligence systems . Deep understanding of architecture frameworks, design standards and methodologies. Experience with secure software development lifecycles , OWASP , GDPR , and NCSC Cloud Security Principles . Demonstrated ability to design and deliver secure, integrated solutions in sensitive or classified environments. Strong stakeholder engagement and communication skills, with the ability to influence at More ❯
Nice-to-Have Skills AWS cloud experience. Experience with BPMN workflow engines (Camunda, Activiti, Flowable). Experience using React, Angular or Vue.js. Container orchestration using RedHat OpenShift. Awareness of NCSC cloud security principles. Clearance Requirements Active SC clearance required. Candidates must have the right to work in the UK and at least 5 years of continuous UK residency . Rate More ❯
Product Security/Information Security concepts to applicable technologies within the environment (or similar). Degree (or equivalent experience) in a relevant STEM subject or Information Security related. Holds NCSC CCP SIRA status (or able to achieve) Is a member of a professional institute Security Requirements: SC, ITAR & UK EYES ONLY This role will require the person to hold full More ❯