Senior Cyber Project Consultant

Newcastle upon Tyne
2 weeks ago
Create job alert

I'm currently looking for 2x Senior Cyber Project Consultant with financial background!

You will be working with the client to enhance and improve security landscaping, leaving no area of cyber untouched.

What you'll need:

You know your Cyber Security Frameworks inside out and can explain their significance and impact to everyone from tech teams to senior business stakeholders.
You've got experience in scoping penetration tests, conducting risk assessments, and overseeing remediation plans.
You're well-versed in Cloud Service models like IaaS, PaaS, and SaaS and the security context when deploying solutions into them.
You've got experience in a similar role, bringing valuable insights and expertise to the table.Desirable:

You have knowledge and understanding of Microsoft Azure and 365 security products like Defender, Sentinel, Azure Information Protection, and Intune.
Holding Information Security certifications such as CISM, CCSP, CRISC, or CompTIA Security+ and being actively involved in the cyber community through participation in working groups, forums, and facilitating knowledge-sharing sessions
You've participated in threat modelling using techniques like STRIDE.Key Responsibilities:

Foster strong connections, help to shift our security culture and advocate for Secure by Design principles throughout our projects.
Offer expert advice and consultation on our policy & standards, industry regulations, frameworks, and best practices to support our change initiatives and operational teams.
Identify and evaluate security risks, making recommendations to continuously improve security posture in an ever-changing threat landscape.
Ensure that any risks or findings from security scans or tests are addressed within risk appetite before changes are promoted to production.
Assist our team lead and provide mentorship to junior team members, fostering a collaborative and growth-oriented environment.

Please click to find out more about our Key Information Documents. Please note that the documents provided contain generic information. If we are successful in finding you an assignment, you will receive a Key Information Document which will be specific to the vendor set-up you have chosen and your placement.

To find out more about Computer Futures please visit

Computer Futures, a trading division of SThree Partnership LLP is acting as an Employment Business in relation to this vacancy | Registered office | 8 Bishopsgate, London, EC2N 4BQ, United Kingdom | Partnership Number | OC(phone number removed) England and Wales

Related Jobs

View all jobs

Senior EC&I Engineer

Senior Cyber Security Consultant

Regional Security Analyst ( up to 80K plus bonus )

Graduate Mechanical Design Engineer

Net Developer

Technical Partner Manager

Get the latest insights and jobs direct. Sign up for our newsletter.

By subscribing you agree to our privacy policy and terms of service.

Industry Insights

Discover insightful articles, industry insights, expert tips, and curated resources.

Transitioning from Academia to the Cyber Security Industry: How Researchers Can Harness Their Skills to Protect Commercial Environments

Cyber security has become a mission-critical field in an era where data breaches, ransomware attacks, and sophisticated hacking techniques threaten businesses and public institutions alike. As digital transformation touches nearly every facet of modern life, the need for highly skilled individuals capable of defending systems and networks continues to grow. For PhDs and academic researchers with expertise in areas like cryptography, network security, or threat intelligence, this presents an exciting opportunity to deploy your analytical prowess in a high-impact, fast-paced commercial setting. In this guide we’ll explore how academics can successfully pivot from the research lab to the cyber security industry. Learn how to apply rigorous, theory-driven approaches to real-world challenges, from designing secure software architectures to neutralising advanced persistent threats. By embracing the industry’s urgency and end-to-end mindset, you can transform your scholarly insights into robust, market-facing security solutions that protect companies and users on a global scale.

Which Cyber Security Career Path Suits You Best?

Discover Your Ideal Role in the World of Digital Defence Cyber threats grow more complex by the day—ranging from sophisticated nation-state attacks to persistent phishing scams. In response, cybersecurity has become one of the fastest-expanding and most in-demand fields. If you’re exploring a career in cybersecurity, you might wonder which specialised role aligns best with your skills and aspirations. This quiz will help you identify your ideal cybersecurity path, from penetration testing to threat intelligence and beyond.

The Ultimate Glossary of Cyber Security Terms: Your Comprehensive Guide to Protecting the Digital World

As our daily lives become increasingly entwined with digital technologies, cybersecurity has emerged as one of the most critical and rapidly evolving fields. From safeguarding personal data on social media to protecting vital infrastructure and corporate networks, cyber threats loom in every corner of our connected world. Whether you’re just entering the workforce, looking to pivot your career, or a seasoned professional sharpening your skill set, understanding core terminology is essential to thrive in this domain. That’s why we’ve prepared this comprehensive glossary of cybersecurity terms and optimised for your career development. We’ll walk through the building blocks of cybersecurity—covering fundamental concepts, advanced techniques, and the latest trends—so you can confidently navigate this complex landscape. If you’re keen to explore or advance your career, be sure to check www.cybersecurityjobs.tech for roles spanning penetration testing, incident response, threat intelligence, and more.