Secure by Design DefStan 05-139 Knowledge and application of non-UK Information Assurance Standards NIST SP800 (in particular NISTSP800-53, NISTSP800-37, NISTSP) NIST Guidance Material Knowledge of encryption standards more »
laws, regulations, and industry guidelines. comprehensive security assessments, including health checks and gap analysis against standards like the Cyber Assessment Framework (CAF) and NIST CSF 2.0, to gauge and enhance clients' security posture. and implement OT Security Policies, Procedures, Guidelines, and Work Instructions as part of a CSMS … and the NIST Cybersecurity Framework (CSF) 2.0, ensuring governance practices are in place and standards like NISTSP800-82 are met. complex security challenges within Industrial Control Systems (ICS) and critical national infrastructure, providing bespoke solutions to mitigate risks. and evaluate operational technology … Experience: Experience in conducting detailed security assessments, audits, and gap analyses against standards, frameworks and guidance such as HSE OG-86, NISTSP800-82, CAF, and/or NIST CSF 2.0, to evaluate and enhance clients' security posture. Development Skill: Ability in crafting more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks (eg ISO, NIST800-53, 800-171, 800-172, C2M2) Excellent communication skills Experience of writing Defence/Government documentation Desirable more »
Experience: Experience in conducting detailed security assessments, audits, and gap analyses against standards, frameworks and guidance such as HSE OG-86, NISTSP800-82, CAF, and/or NIST CSF 2.0, to evaluate and enhance clients' security posture. Policy Development Skill: Ability in more »
Regulations (NIST-CSF, ISO27k series, NISD, NIS2 etc.). OT cybersecurity standards and frameworks (IEC ISA 99/62443, NISTSP800-82, etc.). Essential: Experience working on or leading projects to deliver new security solutions. Experience securing on premise infrastructure. Network security more »
with ticketing systems (ex. Remedy, Service Now) to assess information security controls based on cybersecurity principles and tenets. (e.g., CIS CSC, NISTSP800-53, Cybersecurity Framework, etc.). to identify cybersecurity and privacy issues that stem from connections with internal and external About you: Degree more »
eg, GIAC, TIA, IAM) Experience: At least 3 years of experience in incident detection, response, and forensics. Technical Skills: Familiarity with NISTSP800-53 and RMF implementation. Knowledge of PKI infrastructure tools. Understanding of Firewalls, proxies, and encryption. Proficiency in programming languages (Python, C++, Java more »
e.g., GIAC, TIA, IAM) Experience: At least 3 years of experience in incident detection, response, and forensics. Technical Skills: Familiarity with NISTSP800-53 and RMF implementation. Knowledge of PKI infrastructure tools. Understanding of firewalls, proxies, and encryption. Proficiency in programming languages (Python, C++, Java more »
frictionless user experience. Knowledgeable of Information Security best practices and regulatory and compliance requirements that impact security for the enterprise: HIPAA, HITECH, PCI, NIST Cybersecurity Framework, NIST800-53, ISO 27001, HITRUST, and other relevant privacy and security frameworks. Drive a unified IAM approach … Experience with global security and privacy standards and regulations such as GDPR and CCPA is a plus. Experience with ISO/IEC 27001, NIST CSF standards. Global company experience. Experience Progressive leadership roles and relevant experience as a team lead in various Information and Cyber security disciplines supporting more »
Cybersecurity experience with an interest to learn Industry 4.0, OT & IoT Security adaptive security approaches. Must have experience in working with framework like NIST CSF, IEC 62443, NIST800-82 etc. or at least good understanding about these frameworks. Should have a strong understanding … architecture competency. Ability to understand market and forecast demands to prepare team and improve delivery capabilities. Knowledge of security industry regulations and standards NIST, EU NIS Directive, IEC 62443. Ability to work with stakeholders ranging from C-level executives to business and technical teams . Excellent communication, presentation more »
security compliance tools such as SailPoint, Tenable, and Microsoft Security Suite.Experience evaluating controls over IT processes.Knowledge of security control frameworks such as ISO27001, NIST CSF, and NIST800-171.Strong attention to detail and accuracy in document analysis.Benefits:Competitive salaryComprehensive benefits packageOpportunities for professional more »
security compliance tools such as SailPoint, Tenable, and Microsoft Security Suite.Experience evaluating controls over IT processes.Knowledge of security control frameworks such as ISO27001, NIST CSF, and NIST800-171.Strong attention to detail and accuracy in document analysis.Benefits:Competitive salaryComprehensive benefits packageOpportunities for professional more »
Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and security standards and regulations. Provides internal customer support … Provides a documented work history that includes a minimum of 5-years experience in Information Security. Proficiency in security framework models such as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network … upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN more »
role holder will have detailed working knowledge of the European/Global regulatory environment governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable more »
Stafford, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Viqu Limited
s and PLC's. Experience designing and configuring secure networks. Experience completing system assessments and security audits based on security frameworks such as NIST800-53/800-82, ISO 27001 and IEC 62433. Building strong relationships with internal and external stakeholders. Must be more »
Knowledge of UK/NATO Information Assurance standards, procedures & systems, including Government Functional Standard GovS 007: Security, HMG IS1&2, ISO27000 series standards, NIST SP800 series standards, JSP440, JSP604, guidance material provided by NCSC, CPNI and NIST. Practical experience of producing Security Accreditation documentation Practical experience of NCSC more »
to ensure ongoing compliance. Qualifications Proven experience in information security management. Strong knowledge of information security frameworks and regulations such as, ISO 27001, NIST800series, NERC-CIP, NIS and GDPR requirements. Knowledge and experience of quality management systems, especially in an ISO 9001 certified environment. more »
SAN storage systems, enabling effective management and maintenance of infrastructure resources. Experience in navigating compliance requirements such as Cyber Essential Plus, CIS Controls, NIST800-53, and ISO 27001, ensuring adherence to industry standards and regulatory frameworks to uphold organizational security and governance standards. Proficiency in more »
City Of London, England, United Kingdom Hybrid / WFH Options
Mimecast
and possible targets What You'll Bring: Experience with the examination or implementation of technical controls, such as SOC 2, ISO, TISAX or NIST800-53 Excellent verbal and written communication skills Has demonstrable skill working with internal and external stakeholders Experience engaging with external auditing more »
Office (Word, Excel, PowerPoint, SharePoint) (Required) Experience in multinational companies (Required) Strong knowledge of Risk management (Required) Working knowledge of Risk management frameworks (NIST 800.X, ISO 3100X (Preferred) Working Knowledge of Change/Delivery methods and associated controls from conception to realisation (e.g. MoP, MSP, PRINCE2, MoR etc. more »
Office (Word, Excel, PowerPoint, SharePoint) (Required)Experience in multinational companies (Required)Strong knowledge of Risk management (Required)Working knowledge of Risk management frameworks (NIST 800.X, ISO 3100X (Preferred)Working Knowledge of Change/Delivery methods and associated controls from conception to realisation (e.g. MoP, MSP, PRINCE2, MoR etc. more »
all levels. '€¢Strong written and oral communication skills '€¢Active SC Clearance, or ability to obtain SC clearance Experience of following Cyber Security Frameworks: '€¢ NIST Cybersecurity Framework (CSF): Understand the five core functions of Identify, Protect, Detect, Respond, and Recover. Familiar with the framework's guidelines for managing and … reducing cyber risks, in particular NIST 800.53. '€¢ ISO/IEC 27001: Comprehend the international standard for information security management systems (ISMS). Knowledge about risk assessment, controls, and continuous improvement. '€¢ CIS Controls: Be aware of the Centre for Internet Security's critical security controls. These provide a prioritized more »
all levels. Strong written and oral communication skills Active SC Clearance, or ability to obtain SC clearance Experience of following Cyber Security Frameworks: NIST Cybersecurity Framework (CSF): Understand the five core functions of Identify, Protect, Detect, Respond, and Recover. Familiar with the framework’s guidelines for managing and … reducing cyber risks, in particular NIST 800.53. ISO/IEC 27001: Comprehend the international standard for information security management systems (ISMS). Knowledge about risk assessment, controls, and continuous improvement. CIS Controls : Be aware of the Centre for Internet Security’s critical security controls. These provide a prioritized more »