laws, regulations, and industry guidelines. comprehensive security assessments, including health checks and gap analysis against standards like the Cyber Assessment Framework (CAF) and NIST CSF 2.0, to gauge and enhance clients' security posture. and implement OT Security Policies, Procedures, Guidelines, and Work Instructions as part of a CSMS … and the NIST Cybersecurity Framework (CSF) 2.0, ensuring governance practices are in place and standards like NISTSP800-82 are met. complex security challenges within Industrial Control Systems (ICS) and critical national infrastructure, providing bespoke solutions to mitigate risks. and evaluate operational technology … Experience: Experience in conducting detailed security assessments, audits, and gap analyses against standards, frameworks and guidance such as HSE OG-86, NISTSP800-82, CAF, and/or NIST CSF 2.0, to evaluate and enhance clients' security posture. Development Skill: Ability in crafting more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
equivalent. Excellent customer facing skills, internally and externally facing with national and international agencies. Knowledge of cyber security best practises such as GPG13, NIST800-53, NIST800-171, ISO27001 would be advantageous. Desirable: Degree in Information Technology, Computer Science, or Cyber more »
Corsham, England, United Kingdom Hybrid / WFH Options
J&C Associates Ltd
and Cyber Kill Chain frameworks • Skilled in maintaining Microsoft directory services. • Skilled in using virtualisation software. • Knowledge of key security frameworks (e.g. ISO, NIST800-53, 800-171, 800-172, C2M2) • Excellent communication skills • Experience of writing Defence/Government documentation Desirable more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
eTeam Inc
and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks (eg ISO, NIST800-53, 800-171, 800-172, C2M2) Excellent communication skills Experience of writing Defence/Government documentation Desirable more »
with ticketing systems (ex. Remedy, Service Now) to assess information security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NISTSP800-53, Cybersecurity Framework, etc.). to identify cybersecurity and privacy issues that stem from connections with internal and external About you: Degree more »
Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and security standards and regulations. Provides internal customer support … Provides a documented work history that includes a minimum of 5-years experience in Information Security. Proficiency in security framework models such as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network … upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN more »
City Of London, England, United Kingdom Hybrid / WFH Options
Mimecast
and possible targets What You'll Bring: Experience with the examination or implementation of technical controls, such as SOC 2, ISO, TISAX or NIST800-53 Excellent verbal and written communication skills Has demonstrable skill working with internal and external stakeholders Experience engaging with external auditing more »