Security Consultant (Hybrid, UK - 1 day per week with possible to increase)

Workable
London
1 year ago
Applications closed

Related Jobs

View all jobs

Security Consultant

Security Consultant – GRC (Governance, Risk, Compliance)

Penetration Tester - Nato Cleared

Cyber Security Consultant

Principal Security Consultant

Cyber Security Consultant / SME

Introducing Zinc Network

Zinc Network is a business dedicated to meaningful, measurable change. Zinc conceptualises and creates programs, interventions, and strategic communications campaigns around some of the world’s most complex problems – from disinformation to extremism, media capture to authoritarianism.

We are headquartered in London with offices in Washington, D.C., and Warsaw with 80+ team members from diverse professional and cultural backgrounds. Zinc works with a broad range of governmental, NGO, and private sector clients, including the UK Home Office (HO); the UK Foreign, Commonwealth and Development Office (FCDO); the United States Agency for International Development (USAID); the U.S. Department of State (DOS); UN agencies and missions; and foundations.

Outline of the job

We are seeking a Security Consultant with a strong background in cyber security to support our projects, including those in non-permissive environments. The successful candidate will also provide guidance on cyber, physical and human security, delivering comprehensive risk management strategies. We are particularly interested in individuals with experience working on UK or US government-funded projects and those with professional backgrounds in military, law enforcement, or intelligence.

The candidate will be required to work 1 day per week with the possibility of increasing.

What you’ll be doing

Cyber Security Leadership:

  • Design and implement advanced cyber security strategies tailored to the unique needs of our global projects.
  • Conduct regular vulnerability assessments and provide actionable recommendations to enhance digital security.
  • Ensure secure communication protocols for teams operating in high-risk environments.

Physical and Human Security:

  • Advise on physical security measures, including site risk assessments and travel safety protocols.
  • Develop human security strategies to protect personnel and project participants, focusing on situational awareness and mitigation of threats.

Risk Assessment and Crisis Management:

  • Conduct thorough risk assessments across physical, human, and cyber security domains.
  • Develop crisis management plans and lead response efforts in the event of security incidents.

Training and Capacity Building:

  • Deliver tailored training programs to staff and partners on best practices in cyber, physical, and human security.
  • Create user-friendly resources and guides to empower teams with practical knowledge.

Collaboration and Compliance:

  • Ensure adherence to security protocols and compliance standards, including those specific to government-funded projects.
  • Collaborate with internal teams and external stakeholders to align security measures with project goals.

Requirements

- Significant experience in security and risk management, with a focus on cyber security.

- Background in military, law enforcement, or intelligence is highly desirable.

- Experience working on UK or US government-funded projects, with a solid understanding of compliance and security protocols.

- Expertise in operating in non-permissive environments and managing associated risks.

- Relevant certifications such as CISSP, CISM, CEH, or similar.

- Exceptional problem-solving and communication skills, with the ability to translate complex security concepts into actionable plans.

Area of Selection

We’re committed to hiring a diverse workforce from different professional and cultural backgrounds, and to that end we encourage a variety of people to apply to join our company to represent the diverse range of subjects associated with our projects.

Conditions of Employment

Candidates who receive a job offer will be required to:

- Disclose any previous disciplinary action against them resulting from a substantiated safeguarding (including any breaches involving trafficking- related activities) or workplace investigation.

- Undergo background checks including employment verification, sexual offender registry (as available), identity confirmation, and anti-terrorism vetting.

How to apply

Please include a cover letter stating how you meet each of the requirements.

If you require an accommodation to be made at any point throughout the recruitment process, please advise us when contacted.

Subscribe to Future Tech Insights for the latest jobs & insights, direct to your inbox.

By subscribing, you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

How Many Cyber Security Tools Do You Need to Know to Get a Cyber Security Job?

If you are trying to build or move forward in a cyber security career, it can feel like the list of tools you are expected to know never ends. One job advert asks for SIEM platforms, another mentions penetration testing tools, another lists cloud security, threat intelligence platforms, endpoint detection, scripting languages and compliance frameworks. Scroll LinkedIn and it gets worse. Everyone seems to “know” dozens of tools, certifications and platforms. Here is the reality most cyber security hiring managers agree on: they are not hiring you because you know every tool. They are hiring you because you understand risk, can think like an attacker and a defender, follow process, communicate clearly and make good decisions under pressure. Tools matter — but only when they support those outcomes. So how many cyber security tools do you actually need to know to get a job? For most job seekers, the answer is far fewer than you think. This article explains what employers really expect, which tools are essential, which are role-specific and how to focus your learning so you look credible, not overwhelmed.

What Hiring Managers Look for First in Cyber Security Job Applications (UK Guide)

If you want to stand out in the highly competitive world of cyber security job applications, you need to understand what hiring managers look for before they even finish reading a CV. Cyber security hiring managers scan applications quickly and with specific priorities in mind. They assess not just your technical ability, but your judgement, professionalism, clarity, risk awareness and evidence of impact. This guide explains what hiring managers look for first in cyber security applications across roles like Security Analyst, Security Engineer, Penetration Tester, Incident Responder, Security Architect, Governance Risk and Compliance specialists and Cloud Security positions. Use this as a practical, step-by-step checklist to sharpen your CV, LinkedIn profile, cover letter and portfolio before you apply on www.cybersecurityjobs.tech .

The Skills Gap in Cyber Security Jobs: What Universities Aren’t Teaching

Cyber security has become one of the most critical disciplines in the modern economy. From protecting financial systems and healthcare data to securing national infrastructure, cloud platforms and supply chains, cyber security professionals now sit at the frontline of digital trust. Demand for cyber security talent in the UK has surged. Job vacancies remain high, salaries continue to rise, and organisations across every sector report difficulty hiring skilled professionals. Yet despite this demand, many graduates struggle to break into cyber security roles and employers consistently report that candidates are not job-ready. The problem is not intelligence, ambition or academic effort. It is a persistent and widening skills gap between university education and real-world cyber security work. This article explores that gap in depth: what universities teach well, what they routinely miss, why the gap exists, what employers actually want, and how jobseekers can bridge the divide to build sustainable careers in cyber security.