Deputise for the Senior IT Security Manager as and when required. Education, Qualifications & Training * Achieved one or more relevant qualification/certification (i.e. CISSP, CISA, CISM Knowledge & Experience * Expert knowledge of security data tools, information security controls, security best practice and management strategies. * Experience of designing control maturity tests and more »
/Experience: Proven experience in cybersecurity assurance or related roles, with a strong understanding of cybersecurity principles, practices, and technologies. Relevant certifications (e.g., CISSP, CISA, CISM, etc.) are a plus. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerability management more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Recruit with Purpose
SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification/certification (i.e CISSP, CISA, CISM) knowledge or experience of technical engineering. How to apply: If you're ready to embark on a journey of innovation, challenge, and impact, we more »
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Adecco
management methodologies. Previous experience in the Cybersecurity or Utilities sectors is highly advantageous. Familiarity with LAN/WAN, CRISC, FAIR, NIS-R, CISSP, CISM, CISA, ICS, SCADA, and risk assessment methodologies is preferred. Technical expertise in Active Directory, network infrastructure, Windows Server, and relevant cybersecurity tools is a plus. Knowledge … like Power BI and Visio, is beneficial. Desirable Skills : Possess relevant security risk certifications (e.g., CRISC, FAIR) and information security credentials (e.g., CISSP, CISM, CISA). Hold a degree or equivalent combination of education and practical experience. Familiarity with Network and InformationSystems Regulations (NIS-R) and international standards such … IEC62351. Ability to obtain and maintain security clearance is essential. Technologies : Cyber Security, Cyber Sec, LAN/WAN, CRISC, FAIR, NIS-R, CISSP, CISM, CISA, ICS, SCADA, Risk, Cyber Risk, NIS Regulations, Network and InformationSystems Regulations, Active Directory, Networks, Switches, Windows Server, PEN Test, Azure, Tenable.io, Tenable, FortiNet Firewalls more »