team and individualsExperience and knowledge of the regulatory environment facing clients; with a particular focus on cyber security and privacy relevant regulationsQualification such as CISSP, CISM, and CIPP/E preferredAdditional InformationLife At PA encompasses our peoples' experience at PA. It's about how we enrich peoples’ working lives more »
and working knowledge of IT audits and/or control gap assessments certification such as CISA preferred Demonstrable interest, training, experience or certification (e.g. CISSP) in cyber security is highly beneficialStrong technical foundation to support the understanding of controls, experience in information technology, IT risk (consultancy experience) or regulatory more »
DTI) Product Groups and the wider DTI Security community. Required Skills and Qualifications: Experience in Privileged Access Management and Identity Governance and Access Management. CISSP or CISM certification. Technical security knowledge with exposure to relevant technical architecture, environments, platforms, and software industry practices. Familiarity with InformationSecurity principles, tools more »
Experience with virtual security operations centers. Essential Criteria: Security Clearance : Willingness and ability to obtain SC (Security Clearance). Certifications : CISSP (CertifiedInformationSystemsSecurityProfessional) or CISM (CertifiedInformationSecurity Manager). Framework Understanding : Strong understanding of security frameworks such as NIST (National Institute of Standards and Technology more »
will support your colleagues in topics such as: Operational Resilience, Data Protection, Business Continuity, and related matters. Key Requirements CertifiedInformationSystemsSecurityProfessional (CISSP) certified or relevant experience to demonstrate understanding. Extensive informationsecurity experience. Deep knowledge of InformationSecurity frameworks (ISO27001, NIST). Experience of Cloud technology more »
days per week in office) Technology risk management, auditing or similar qualification would be beneficial but is not essential (i.e. CRISC, CISA, CISSP). Risk & Control Framework Qualification in technology risk management, auditing or similar qualification would be beneficial but is not essential (i.e. CRISC, CISA, CISSP) If more »
as CIPM, CIPT, CIPP/E, CISM, CISSP, and/or HCISSP, as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)²) are desirable. Where you do not have the qualifications, we will support you in achieving them The ability to efficiently understand client organizations and their more »
organization. Additional experience with global security operations and understanding the complexities of multi-regional compliance and data protection laws are essential. Certifications: Certifications like CISSP, CISM, CRISC are definitely a plus YOU'LL WORK WITH As part of the Global Risk team - InformationSecurity Risk Managment you will work more »
to multi-task and prioritize workload Experience in a team-oriented, collaborative environment Able to work after-hours and on call as needed Certifications: CISSP, GSEC, CRISC, OSCP, GCTI, GEVA, Security+, Vendor Certifications more »
leading cloud platforms Proficiency in cloud security tools and automation Professional certifications in cloud architecture from Amazon AWS, Google Cloud, or Microsoft Azure ISC2CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, and IDAM systemsmore »
reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
stakeholder management and team management skills. Advantageous: Degree level qualified, MSc in InformationSecurity, IT or relevant STEM subjects. General informationsecurity certificates such CISSP, CISM or CISA. Incident management certifications such as: CREST certified incident manager (CCIM). GIAC Certified Incident Handler (GCIH) Digital forensics certificates such as more »
ARM. Hands-on experience with security tools and technologies In-depth knowledge of cloud security (AWS, Azure, GCP). Relevant certifications such as CSPM, CISSP, CISM, CEH, or AWS CertifiedSecurity – Specialty. Familiarity with zero-trust architecture and principles. more »
European/Global regulatory environment governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, InformationSecuritymore »
team effectiveness and efficiency. Mentor and develop junior team members. Role Requirements: High level technical knowledge with a relevant qualification (e.g., CompTIA Security+, CISM, CISSP, or CISA). Experience in a technical role. Results-oriented with a proactive approach to task completion. Excellent communication skills. Strong stakeholder and relationship more »
or more of the main cloud vendor platforms (AWS, Azure & GCP) Good understanding of security tooling for cloud as well as security automation ISC2CISSP accreditation or equivalent internationally recognised membership Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS more »
conduct simulation exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. more »
minimum) or equivalent experience and certifications 7 or more years of experience working in InformationSecurity or relevant IT technical roles with increasing responsibility CISSP, CISM, GSEC, or equivalent accepted cyber management certification Working knowledge of the following InformationSecurity domains, 4 required Security Operations Cloud Security Network Security … or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds and IOCs Cybersecurity Certification (CISSP, CISM, GSEC, etc) Preferred Qualifications and Education: Experience with cloud services and APIs Working knowledge of firewall, router, network switch, VOIP, and wireless architecture more »
and ISE - Experience with network security protocols and tools, such as VLANs, IPSec, and SSL VPN - Certifications such as CCNA Security, CCNP Security, or CISSP are a plus - Excellent communication and problem-solving skills - Ability to work effectively in a fast-paced, collaborative environment - Strong attention to detail and more »
programming languages such as Java, C++, or Python - Excellent problem-solving and analytical skills - Effective communication skills, both written and verbal - Relevant certifications (e.g., CISSP, CEH, OSCP) are highly regarded This role is ideal for a forward-thinking individual passionate about cybersecurity and software development, eager to contribute to more »
global technology infrastructure. Requirements: Expertise in IT, disaster recovery planning, and cybersecurity. Preferred certifications in relevant disciplines (CompTIA Network +, CompTIA Security +, CISM, CISSP or COBIT 5) Baseline knowledge of resilience frameworks (NIST CSF, ISO 27001/27002 and COBIT) For more information, please apply more »
as SOC2.Previous experience of deploying the Microsoft Insider Risk Management module within a global enterprise organization.Industry certifications such as CertifiedInformationSystemsSecurityProfessional (CISSP), CertifiedInformationSecurity Manager (CISM), or CertifiedInformation Privacy Professional (CIPP) Experience with CASB and UEBA Equal Opportunity EmployerAt WTW, we believe difference makes more »
InformationSecurity Officer Key Responsibilities: - Perform security assessments for vendors and projects, identifying risks and recommending mitigation strategies. - Ensure compliance with security policies and standards in all vendor and project activities. - Develop and maintain frameworks for security assessments. - Stay updated more »
and the organisational challenges to addressing these threats. Qualifications we are looking for include - CertifiedInformationSecurity Manager (CISM), CertifiedInformationSystemsSecurityProfessional (CISSP), MSc InformationSecurity, Achieved Senior or Lead level certification in the NCSC’s Certified Cyber Professional scheme in one or more of Security and more »
platform owner for perimeter security technologies and will need to demonstrate a deep understanding of the security concepts that determine a secure network perimeter (CISSP advantageous). Required experience and knowledge: c.10 years Network Security experience achieved in a financial services/markets environment CCNP-level knowledge of routing … using vendor and open-source tooling SIEM log analysis and anomaly detection experience (preferable) Coding and automation experience Python and/or Terraform (preferable) CISSP certifications or familiarity with CISSP concepts Hybrid working role. Market-leading compensation package. more »