Preferred Technical and Professional Expertise Security Expertise: Bachelor's degree in Computer Science, Information Technology, Cybersecurity, or related fields. Professional certifications such as CISSP, CISM, or CRISC, are highly desirable. In-depth knowledge of ISO 27001, ISO 27002, ISO 27005, and other relevant ISO standards. Familiarity with NIST frameworks, such more »
technologies eg Microsoft Sentinel An interest in automation of Security operation function including artificial intelligence An understanding of Microsoft security product portfolio CISSP/CISM (Desired) CCSP/SSCP (Desired) Proven experience in Cybersecurity and IT Operations (Required) DLP, EDR/XDR, CASB, E-mail Security, SWG and ZTNA/ more »
requirements Project management certification (e.g., PMP, PRINCE2) is highly desirable. Professional certifications such as CertifiedInformation Systems Security Professional (CISSP), CertifiedInformationSecurityManager (CISM), or CertifiedInformation Systems Auditor (CISA) are highly desirable. Relevant Work Experience At least 6 years of experience in IT within the financial/banking more »
of-hours work as required. Qualifications and Experience: Bachelor's degree in Cybersecurity, Computer Science, or related field. Relevant professional certifications such as CISSP, CISM, GIAC, or equivalent are preferred. Strong working experience with Sentinel. Familiarity with industry frameworks and standards such as NIST, ISO 27001, and CIS Controls. Experience more »
management and team management skills. Advantageous: Degree level qualified, MSc in InformationSecurity, IT or relevant STEM subjects. General informationsecurity certificates such CISSP, CISM or CISA. Incident management certifications such as: CREST certified incident manager (CCIM). GIAC Certified Incident Handler (GCIH) Digital forensics certificates such as: CREST certifiedmore »
management and team management skills. Advantageous: Degree level qualified, MSc in InformationSecurity, IT or relevant STEM subjects. General informationsecurity certificates such CISSP, CISM or CISA. Incident management certifications such as: CREST certified incident manager (CCIM). GIAC Certified Incident Handler (GCIH) Digital forensics certificates such as: CREST certifiedmore »
written communication skills. Desirable experience: Professional certifications such as CertifiedInformation Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CertifiedInformationSecurityManager (CISM). In-depth knowledge of Operating System security and system hardening concepts, such as CIS Benchmarks. Experience in working with informationsecurity frameworks and regulatory more »
written communication skills. Desirable experience: Professional certifications such as CertifiedInformation Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CertifiedInformationSecurityManager (CISM). In-depth knowledge of Operating System security and system hardening concepts, such as CIS Benchmarks. Experience in working with informationsecurity frameworks and regulatory more »
/Global regulatory environment governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, InformationSecurity leadership, Technology more »
SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
enhance team effectiveness and efficiency. Mentor and develop junior team members. Role Requirements: High level technical knowledge with a relevant qualification (e.g., CompTIA Security+, CISM, CISSP, or CISA). Experience in a technical role. Results-oriented with a proactive approach to task completion. Excellent communication skills. Strong stakeholder and relationship more »
of Cybersecurity with practitioner’s experience for leading large scale Cybersecurity engagement (not just managerial, but domain expertise is the key) certifications like CISSP, CISM, CISA, C-CISO. technology certifications in security solutions (e.g., Microsoft, AWS, PaloAlto, etc.) are appreciated. Rewards & Benefits TCS is consistently voted a Top Employer in more »
london, south east england, United Kingdom Hybrid / WFH Options
Tata Consultancy Services
of Cybersecurity with practitioner’s experience for leading large scale Cybersecurity engagement (not just managerial, but domain expertise is the key) certifications like CISSP, CISM, CISA, C-CISO. technology certifications in security solutions (e.g., Microsoft, AWS, PaloAlto, etc.) are appreciated. Rewards & Benefits TCS is consistently voted a Top Employer in more »
of security policies and procedures. - Conduct security awareness training for staff. Skills and Experience: - Over 5 years of informationsecurity experience. - Preferred certifications: CISA, CISM, or CISSP. - Strong knowledge of security principles, standards (e.g., ISO 27001, NIST), and best practices. - Experience in security assessments and risk management. - Familiarity with regulatory more »
london (city of london), south east england, United Kingdom
DGH Recruitment
of security policies and procedures. - Conduct security awareness training for staff. Skills and Experience: - Over 5 years of informationsecurity experience. - Preferred certifications: CISA, CISM, or CISSP. - Strong knowledge of security principles, standards (e.g., ISO 27001, NIST), and best practices. - Experience in security assessments and risk management. - Familiarity with regulatory more »
industry. Strong interpersonal skills and experience of developing strong relationships and significant influencing abilities, within a large corporate environment. Relevant cyber qualifications, e.g. CISSP, CISM, CRISC. For more information, please forward your CV to: tom.haussrer@greshamhunt.com more »
industry. Strong interpersonal skills and experience of developing strong relationships and significant influencing abilities, within a large corporate environment. Relevant cyber qualifications, e.g. CISSP, CISM, CRISC. For more information, please forward your CV to: tom.haussrer@greshamhunt.com more »
of security policies and procedures. - Conduct security awareness training for staff. Skills and Experience: - Over 5 years of informationsecurity experience. - Preferred certifications: CISA, CISM, or CISSP. - Strong knowledge of security principles, standards (e.g., ISO 27001, NIST), and best practices. - Experience in security assessments and risk management. - Familiarity with regulatory more »
data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the development and implementation more »
data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the development and implementation more »
SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
of reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
of reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
ISO27001 would be advantageous. Desirable: Degree in Information Technology, Computer Science, or Cyber Security. InformationSecurity related certifications such as Security+, CISSP, CISM, GSEC, SSCP ITIL certifications ITIL Foundation. #LI-MF1 RTX is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration for employment without regard more »