posture. COBIT (Control Objectives for Information and Related Technologies ): Understand the framework for governance and management of enterprise IT. Preferred Qualification: SANS Certification CISSP, CISA, or CRISC About Capita Technology and Software Solutions (TSS) and CISO Capita Technology and Software Solutions (TSS) is a newly formed global shared service, responsible more »
london, south east england, United Kingdom Hybrid / WFH Options
Capita
posture. COBIT (Control Objectives for Information and Related Technologies ): Understand the framework for governance and management of enterprise IT. Preferred Qualification: SANS Certification CISSP, CISA, or CRISC About Capita Technology and Software Solutions (TSS) and CISO Capita Technology and Software Solutions (TSS) is a newly formed global shared service, responsible more »
PRINCE2) is highly desirable. Professional certifications such as CertifiedInformationSystems Security Professional (CISSP), CertifiedInformation Security Manager (CISM), or CertifiedInformationSystemsAuditor (CISA) are highly desirable. Relevant Work Experience At least 6 years of experience in IT within the financial/banking industry is preferable. Minimum of more »
Information Technology and Security audits and projects, cyber security reviews, and internal audits. Certificates or Licenses: [One of these required] CertifiedInformationSystemsAuditor (CISA), CertifiedInformationSystems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent. more »
Information Technology and Security audits and projects, cyber security reviews, and internal audits. Certificates or Licenses: [One of these required] CertifiedInformationSystemsAuditor (CISA), CertifiedInformationSystems Security Professional (CISSP), Certification in Risk Management Assurance (CRMA), Certified Internal Auditor (CIA), Certified Public Accountant (CPA), or equivalent. more »
and update security policies, procedures and guidelines Support the organisation with complex security queries and risk assessments The Ideal Candidate ISO27001 Implementer certified CISM, CISA, CRISC certified or another relevant professional certification Can work well under pressure and prioritise workloads to meet deadlines Capable of working without supervision Excellent attention more »
and update security policies, procedures and guidelines Support the organisation with complex security queries and risk assessments The Ideal Candidate ISO27001 Implementer certified CISM, CISA, CRISC certified or another relevant professional certification Can work well under pressure and prioritise workloads to meet deadlines Capable of working without supervision Excellent attention more »
governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, Information Security leadership, Technology, Management, Risk Management and more »
Cybersecurity with practitioner’s experience for leading large scale Cybersecurity engagement (not just managerial, but domain expertise is the key) certifications like CISSP, CISM, CISA, C-CISO. technology certifications in security solutions (e.g., Microsoft, AWS, PaloAlto, etc.) are appreciated. Rewards & Benefits TCS is consistently voted a Top Employer in the more »
london, south east england, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
Cybersecurity with practitioner’s experience for leading large scale Cybersecurity engagement (not just managerial, but domain expertise is the key) certifications like CISSP, CISM, CISA, C-CISO. technology certifications in security solutions (e.g., Microsoft, AWS, PaloAlto, etc.) are appreciated. Rewards & Benefits TCS is consistently voted a Top Employer in the more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
where required; ability to write and review reports, procedures, and standards Desirable skills and experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective marking standards; industry more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
where required; ability to write and review reports, procedures, and standards Desirable skills and experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective marking standards; industry more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
where required; ability to write and review reports, procedures, and standards Desirable skills and experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective marking standards; industry more »
and efficiency. Mentor and develop junior team members. Role Requirements: High level technical knowledge with a relevant qualification (e.g., CompTIA Security+, CISM, CISSP, or CISA). Experience in a technical role. Results-oriented with a proactive approach to task completion. Excellent communication skills. Strong stakeholder and relationship management abilities. Passion more »
the types of relevant tools previously listed. Possess an intermediate to expert level Cyber centric industry certification such as a CYSA+, CASP+, OSCP, GCIH, CISA, CISM, or CISSP. Operating System experience to include a fundamental understanding of common security best practices or industry standard baselines such as those developed by more »
enforcement of security policies and procedures. - Conduct security awareness training for staff. Skills and Experience: - Over 5 years of information security experience. - Preferred certifications: CISA, CISM, or CISSP. - Strong knowledge of security principles, standards (e.g., ISO 27001, NIST), and best practices. - Experience in security assessments and risk management. - Familiarity with more »
london (city of london), south east england, United Kingdom
DGH Recruitment
enforcement of security policies and procedures. - Conduct security awareness training for staff. Skills and Experience: - Over 5 years of information security experience. - Preferred certifications: CISA, CISM, or CISSP. - Strong knowledge of security principles, standards (e.g., ISO 27001, NIST), and best practices. - Experience in security assessments and risk management. - Familiarity with more »
Coventry, England, United Kingdom Hybrid / WFH Options
Lorien
strong authentication, authorisation, and accounting controls. Experience within directory services such as Active Directory, LDAP, and Azure AD. Desirable: Security related qualification e.g. CISSP, CISA/M, SANS GIAC. So, if you feel your skills and experience align with the prerequisites for this role. Then please get in touch and more »
enforcement of security policies and procedures. - Conduct security awareness training for staff. Skills and Experience: - Over 5 years of information security experience. - Preferred certifications: CISA, CISM, or CISSP. - Strong knowledge of security principles, standards (e.g., ISO 27001, NIST), and best practices. - Experience in security assessments and risk management. - Familiarity with more »
Demonstrate the ability to create and maintain security policy, standard, guideline, and procedure documents. CertifiedInformationSystems Security Professional (CISSP), CertifiedInformation Security Auditor (CISA), CertifiedInformation Security Manager (CISM), or other relevant training and certifications are preferred. more »
Demonstrate the ability to create and maintain security policy, standard, guideline, and procedure documents. CertifiedInformationSystems Security Professional (CISSP), CertifiedInformation Security Auditor (CISA), CertifiedInformation Security Manager (CISM), or other relevant training and certifications are preferred. more »
a proven track record of delivering secure, compliant and robust systems and procedures. Prior experience using Azure and Microsoft cloud products and a CISSP, CISA, CISM, ISO 27001 lead auditor/implementor or similar accreditation would be highly advantageous to your application. This is an excellent opportunity for a highly more »
reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. OWASP Top more »
reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. OWASP Top more »
software development. Proven experience in conducting IT audits. Strong technical knowledge of IT systems, software development practices, and cybersecurity risks. Professional certifications such as CISA, CISSP, or CISM are highly desirable. Excellent analytical and problem-solving skills. Strong communication and interpersonal skills. Ability to lead a team and manage senior more »