Full-Time

Consultant

Third Party Cyber Risk

Posted on 10/6/2025

BlueVoyant

BlueVoyant

501-1,000 employees

Cloud-native cyber defense with threat monitoring

No salary listed

Remote in UK

Remote

Must be authorized to work in the United Kingdom.

US Top Secret Clearance, UK Citizenship Required

Category
Consulting (3)
, ,
Requirements
  • 3+ years as a consultant in Supply Chain Risk Management.
  • 5+ years in an information security or a related role in cyber security
  • Certifications: CISSP, CISM, or equivalent preferred.
  • Ability to achieve security clearance or DV as required
  • Excellent verbal and written communication skills.
  • In-depth knowledge of third party risk management practices and tools, including risk assessment methodologies and compliance standards. Proficiency in developing and implementing risk management frameworks.
  • Strong understanding of network and information security, security protocols, and security tools.
  • Design, development and implementation of third party security questionnaires.
  • Proven ability to build trusted client relationships and conduct deep client discovery.
  • Demonstrated ability to design programs and solutions independently.
Responsibilities
  • Deployment Leadership: Develop and implement strategic initiatives to enhance third party risk management frameworks and processes.
  • Client Engagement: Collaborate with clients to assess and address supply chain and cyber security risks, offering expert guidance on best practices.
  • Program Development: Lead the creation and refinement of third-party risk management programs, ensuring alignment with industry standards and client needs.
  • Risk Assessment: Oversee vendor identification, on-boarding, monitoring, and remediation processes, including development and deployment of cyber security risk questionnaires.
  • Communication & Reporting: Present findings and strategic recommendations to senior management and client stakeholders, facilitating informed decision-making.
  • Process Optimisation: Standardise operating procedures to optimise service delivery and maximise client utilisation of third party risk management solutions.
  • Business Development: Identify opportunities for service expansion, including renewals, cross-sells, and up-sells, while maintaining strong client relationships.
  • Framework Creation: Develop scalable processes and frameworks applicable across various industries to streamline future implementations
Desired Qualifications
  • CISSP, CISM or equivalent preferred.
  • Entrepreneurial mindset with a drive for results.
  • Experience in a cybersecurity or technology-focused organisation.
  • Strong project and process management skills.

BlueVoyant provides cyber defense solutions via a cloud-native platform that combines internal and external security operations to protect networks, endpoints, and the digital attack surface. It continuously monitors environments and uses threat detection and analytics to give real-time visibility. A major focus is supply chain security, using machine-learning automation and human expertise to identify, validate, and mitigate threats across complex third-party networks by monitoring domains, websites, social media, and applications. It also offers specialized Microsoft Security tools services and serves commercial and government clients, aiming to reduce digital risk and enable proactive defense across on-premises and cloud environments.

Company Size

501-1,000

Company Stage

Series E

Total Funding

$695.5M

Headquarters

New York City, New York

Founded

2017

Simplify Jobs

Simplify's Take

What believers are saying

  • John Hernandez's CEO appointment scales AI platform globally using Quest and Genesys experience.
  • Philippines SOC launched April 2026 cuts APJ time-zone delays, boosting regional demand capture.
  • VISIBL mROC with Qualys enables proactive risk management, consolidating customer tools.

What critics are saying

  • Cork SOC scales from 9 to 15 employees, causing analyst burnout and service degradation by November 2026.
  • Qualys VISIBL partnership lets Qualys siphon clients with competing TPRM tools by May 2028.
  • Philippines SOC faces South China Sea shutdown, crippling global operations by May 2029.

What makes BlueVoyant unique

  • BlueVoyant integrates AI-driven internal, external, and supply chain cyber defense in one platform.
  • Portfolio Cyber Defense de-risks investments for organizations over 600 employees using Microsoft and Splunk MDR.
  • COMS optimizes Microsoft Security tools, leveraging 2024 Microsoft Worldwide Security Partner award.

Help us improve and share your feedback! Did you find this helpful?

Benefits

Flexible Work Hours

Remote Work Options

Growth & Insights and Company News

Headcount

6 month growth

0%

1 year growth

1%

2 year growth

1%
BlueVoyant
Nov 24th, 2025
Top Security Insights You Need to Know from Microsoft Ignite 2025

Sophia lagerkrans-pandey and micah heaton. A practical guide for security leaders with BlueVoyant's perspective from the ground at Ignite. Microsoft Ignite 2025 delivered big news for security professionals. The theme this year is clear: Microsoft is giving customers more capability inside the tools they already own, focused on AI agents and integrations. Whether you are a small IT team, a mid-market group, or a global enterprise, these updates can transform your security posture. BlueVoyant was on the ground at Ignite, and BlueVoyant International is here to break down the top five security insights plus a bonus and share practical steps to help you activate these innovations. 1. Security Copilot Entitlement Arrives for Microsoft 365 E5 Customers Security Copilot is now included in Microsoft 365 E5. Rollout begins in 2025, giving customers a meaningful block of Security Compute Units (SCUs) without extra licensing. This means AI-powered investigation, response, and automation are now accessible to organizations of every size. You do not need a large SOC to realize value. You only need a clear adoption plan and guided workflows. Why it matters: Copilot will redefine how teams respond to threats, automate workflows, and close the expertise gap. But success depends on more than entitlement; it requires a clear vision for adoption. 2. Microsoft Defender capabilities include proactive mid-attack action Microsoft Defender is introducing several features, strengthening its ability to detect and thwart attacks. First is Predictive Shielding, a component of automatic attack disruption, that can anticipate attacker movement and apply just-in-time hardening actions to critical assets, reducing thousands of potential attack paths to just a handful, optimizing business continuity while minimizing risk. Microsoft is also extending automatic attack disruption beyond Defender to AWS, Proofpoint, and Okta via Sentinel signals. This will enable real-time detection and containment of threats like phishing and identity compromise across federated accounts and cloud boundaries. They also announced a Threat-Hunting Agent that will orchestrate full threat-hunting sessions through natural language and receive summarized answers, underlying KQL queries and dynamic follow-up suggestions all within a chat interface. The agent will also provide contextual insights and visualizations like timelines, making advanced hunting accessible even to those without query expertise. Why it matters: SOC teams receive incidents at a scale that isn't maintainable. Predictive capabilities reduce manual effort and accelerate containment, especially for hybrid and multi-cloud environments. This update will allow SOC teams to focus on high priority incidents. 3. Security Copilot and Security Store Expand Agent-Powered Security Microsoft expanded the Security Store and introduced 12 new built-in agents across Defender, Entra, Intune, and Purview. The Security Store now offers 100+ solutions, including partner agents and service offerings. BlueVoyant's own Security Copilot agents were featured at Ignite, including the Watchtower Agent, which helps SOC teams maintain visibility and optimize Microsoft Security tools through automated health checks, variance analysis, and actionable recommendations. Why it matters: Agents will become the backbone of automated triage and investigation. Governance and safe adoption are critical to avoid complexity and risk. Selecting and deploying the right Security Copilot agents is not just a technical decision; it is a strategic move that shapes how your organization leverages AI in security operations. BlueVoyant helps you cut through the noise by identifying which agents align with your business objectives and risk posture. Its team ensures these agents are deployed and governed effectively, while building automated triage and investigation workflows that accelerate response and reduce analyst fatigue. BlueVoyant International also map agent usage to your Security Copilot SCU entitlements to maximize ROI and provide expert guidance on safe, responsible adoption practices. This approach empowers your SOC to move beyond reactive security and embrace a proactive, AI-driven model. 4. Microsoft Sentinel Becomes an AI-Ready Security Platform Sentinel now includes a modern data lake, graph capabilities, and an MCP server, enabling richer analytics and improved entity understanding. Sentinel is evolving from a traditional SIEM to an intelligence layer for teams of all sizes that support richer analytics and entity understanding. Why it matters: Sentinel is no longer just about log aggregation; it is the foundation for AI-driven detection and response. 5. Unified Security Cloud Posture Across Azure, AWS, and Google Cloud Defender for Cloud and Sentinel now provides unified posture management across Azure, AWS, and GCP. This gives customers a single view of configuration drift, exposure, vulnerabilities, and attack paths. Why it matters: Fragmented visibility is one of the biggest challenges in cloud security. Unified posture management simplifies governance and accelerates remediation. Small teams no longer need multiple consoles. Larger teams gain consolidated posture visibility across cloud boundaries. Bonus Insight: Microsoft Purview Adds AI-Driven Data Security and Governance Purview now offers AI-powered DSPM, agent governance controls, stronger DLP for Copilot prompts, and two new Security Copilot agents for data security. These updates unify data security, compliance, and AI safety. Why it matters: Data security is becoming inseparable from AI governance. Organizations need a holistic approach to protect sensitive information in an AI-driven world. The future of productivity is AI-powered. Make sure your data security strategy is too. Start with BlueVoyant's Data Security Diagnostic

Business Wire
Oct 1st, 2025
BlueVoyant Partners with Axio to Modernize Cybersecurity Vendor Selection

BlueVoyant partners with Axio to modernize cybersecurity vendor selection.

PR Newswire
Sep 23rd, 2025
BlueVoyant Launches VISIBL mROC Service to Power Proactive Cyber Risk Management with Qualys

BlueVoyant launches VISIBL mROC Service to power proactive cyber risk management with Qualys.

Cybersecurity News Central
May 8th, 2025
BlueVoyant Unveils New Enterprise Cybersecurity Solution to Strengthen Cyber Defense and Manage Costs

BlueVoyant unveils new enterprise cybersecurity solution to strengthen cyber defense and manage costs.

NextTech Today
May 7th, 2025
BlueVoyant Launches COMS for Microsoft Security

BlueVoyant, the leader in integrated cybersecurity, today launched its Continuous Optimization for Microsoft Security (COMS) offering.

INACTIVE