Operations activities. Demonstrated ability to lead, mentor, and collaborate across teams. Holds recognised industry certifications relevant to Cyber Defence such as: CISSP (Certified Information Systems Security Professional) CEH (Certified Ethical Hacker) CISM (Certified Information Security Manager) CompTIA Security+ Strong technical background with deep familiarity in: Cyber defence principles and best practices Security standards and frameworks Security services and systems More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or EthicalHacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and More ❯
to contribute to a growing and innovative academic program. Responsibilities: Instruction and curriculum Delivery Course Instruction: Teach undergraduate or graduate-level cybersecurity courses, including topics such as network security, ethicalhacking, digital forensics, risk management, cryptography, and incident response using blended learning techniques to include reverse learning objectives. Curriculum Development: Produce capstones, design and update course materials, including … world scenarios and hands-on practice in a safe, controlled environment. Industry Standards Alignment: Ensure that the course content aligns with industry-recognized certifications, such as CompTIA Security+, Certified Ethical Hacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized … Seminars: Organize or participate in cybersecurity workshops, boot camps, or industry-related seminars for student enrichment. Compliance: Ensure all instructional materials and lab activities comply with relevant legal and ethical standards, such as the Cybersecurity Framework (NIST) and other related regulations. Required Qualifications: Educational Background Minimum Education: Master's degree in Cybersecurity, Computer Science, Information Technology, or a related More ❯
and experience with Windows and Linux Operating Systems Strong analytical skills Strong verbal and written communication skills DESIRED SKILLS: Knowledge of and experience with securing cloud-based systems Certified Ethical Hacker (CEH) certification Scripting knowledge Understanding of regular expressions EDUCATION AND EXPERIENCE: Twenty (20) years experience as an ISSE on programs and contracts of similar scope, type, and complexity More ❯
in Computer Science, Cybersecurity, Information Technology, or a related field is often advantageous. Entry-level certifications (optional but beneficial) that demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO 27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs More ❯
of the Following: (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems Security Management Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH), CompTIA Security+ The objective is to provide specialized expertise to complement the organization's inherent resources for effective and efficient mission accomplishment and continuity, introduction of innovation … Risk and Compliance (CGRC), Certified in Risk and Information Systems Control (CRISC), Information Systems Security Management Professional (ISSMP), Certified Information Systems Auditor (CISA), Certified Cloud Security Professional (CCSP), Certified Ethical Hacker (CEH), CompTIA Security+ More ❯
product updates and security best practices Qualifications: Education: Bachelor's degree in Computer Science, Information Security, Information Technology, or a related field are a plus. Relevant certifications such Certified Ethical Hacker (CEH), or GIAC Security Essentials (GSEC) are a plus. Certifications: CompTIA Security+ Tenable Certified Nessus Expert (TCNE) or other relevant certifications a plus. Additional certifications such as CISSP More ❯
Technology (NIST) Special Publication (SP) 800-37, SP 800-39, SP 800-53, SP 800-53A, SP 800-60. 7. Certifications: Certified Information Security Manager (CISM), Certified Ethical Hacker. 8. Software Development Support: 9. Demonstrated experience using Java or Java using Spring. 10. Demonstrated experience with Sponsor networks, systems, and services. 11. Demonstrated experience with the Sponsor More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
findings, and responding to questions. Strong time management and personal organisation. Professional, approachable, and client-focused mindset. Qualifications: A-Level or equivalent (required) HND or Degree in Computer Science, EthicalHacking, or Digital Forensics (preferred) One or more of the following certifications: OSCP , OSWA , GPEN , GWAPT , CEH , CRT , CCT-WEB , CCT-INF, CSSL, CCSM Work Authorisation: We are More ❯
delivery(s), People Care, Customer & Stakeholders relationship, project transition. Education qualification: Bachelor’s degree in information technology, Computer Science and/or related areas CISM/CISSP/Certified Ethical Hacker/CompTIA CySA+ Certification & knowledge - Must Have ITIL V3/4 Foundation/Expert certification & knowledge – good to have What’s in for you? At Mphasis, we promise More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: Certifications: OSCP or CREST/TIGER Scheme. Experience penetration testing, ethicalhacking, or completing vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security … Developed Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
as CISSP, CISM, CISA, or other relevant certifications preferred. Additionally, certifications that demonstrate firsthand Information technology knowledge specific to the Army and OT environments are highly desirable, including: Certified Ethical Hacker (CEH) GIAC Security Essentials (GSEC) Certified SCADA Security Architect (CSSA) Information Technology Infrastructure Library (ITIL) Required Education: Candidates should possess a bachelor's degree, preferably in Engineering, Cyber More ❯
4. Excellent written and verbal communication skills, with an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in More ❯
4. Excellent written and verbal communication skills, with an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in More ❯
4. Excellent written and verbal communication skills, with an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), Offensive Security Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Woodside Staffing Solutions & Consulting
Information Assurance Contractor DISA FSO certified CCRI Team Lead and certification in penetration testing, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Additional Qualifications: • Proven proficiency performing CCRI/vulnerability assessment/penetration testing on networks, databases, computer applications and IT … II upon assignment. • DISA FSO certified CCRI Team Lead and certification in penetration testing, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Max Salary: 155K DLA DAI Apps Systems Support - Oracle More ❯
Proven experience with Python, GitLab CI/CD, and Kubernetes. Familiarity with cloud platforms such as AWS or Azure. Certifications: AWS Solutions Architect or Security Specialty (preferred). Certified Ethical Hacker (CEH) or similar. Linux Foundation Certified Kubernetes Administrator (preferred). Skills: Strong expertise in Linux and Windows environments. Proficient in scripting/programming (Python, Bash, C++). Knowledge More ❯
s Degree in Computer or Physical Science, Mathematics, or related technical discipline. • Certifications: (ISC)2 Certified Information Systems Security Professional (CISSP) • Certifications: Certified Information Security Manager (CIMS) • Certifications: Certified Ethical Hacker (White and Gray Hat Disciplines) • Certifications: AccessData Certified Forensics Examiner (ACE) Salary Range: $100,000-$190,000 All qualified applicants will receive consideration for employment without regard to More ❯
Technology, Cybersecurity, Data Science, Information Systems, or Computer Science, from an ABET accredited or CAE designated institution. Certification (Preferred one of the following in lieu of Required Degree): • Certified Ethical Hacker (CEH). • CompTIA Cloud+ • CompTIA PenTest+ • CompTIA Security+ • Cisco Certified CyberOps Associate • CompTIA Cybersecurity Analyst (CySA+) • CyberSec First Responder (CFR) • Federal IT Security Professional-Operator-NG (FITSP-O More ❯