Deputise for the Senior IT Security Manager as and when required. Education, Qualifications & Training * Achieved one or more relevant qualification/certification (i.e. CISSP, CISA, CISM Knowledge & Experience * Expert knowledge of security data tools, information security controls, security best practice and management strategies. * Experience of designing control maturity tests and more »
Finance, or related field. Has, or is planning to attain, a Certified Public Accountant (CPA), Certified Internal Auditor (CIA), or CertifiedInformationSystemsAuditor (CISA) designation. A minimum of 3 years of experience at a "Big 4" External Audit firm, as an Internal Auditor at a publicly traded company, or more »
/Certification Requirements Certified or actively pursuing audit professional certifications including, but not limited to, Certified Internal Auditor (CIA) and CertifiedInformationSystemsAuditor (CISA). more »
developing and implementing successful security programs. Deep understanding of security frameworks and standards (e.g., NIST, CIS, ISO 27001). Recognised Information Security qualifications (e.g., CISA, CISM, CISSP, CRISC, GCCC or CGEIT). Hands-on experience with security tools and technologies. Excellent communication, collaboration, and leadership skills. A passion for security more »
London, England, United Kingdom Hybrid / WFH Options
Ripple
change in a fast moving environment Experience with cloud-native pre-IPO startup companies Experience with AWS security services and tooling Desirable certifications: CISSP, CISA, PMP WHO WE ARE: Do Your Best Work The opportunity to build in a fast-paced start-up environment with experienced industry leaders A learning more »
encryption. Experience with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls). Relevant certifications (e.g., CISSP, CISM, CISA) preferred. If your interested and have prior experience working within the Higher Education Sector, please apply now more »
or internal control experience with comprehensive knowledge of process analysis and control design techniques • 5+ years Information Technology or IT Risk and Controls experience • CISA, CISM, CISSP, or similar certifications What Could Set You Apart: • Ability to understand data flows, sources, and data transformations across multiple domains and transform data more »
or internal control experience with comprehensive knowledge of process analysis and control design techniques • 5+ years Information Technology or IT Risk and Controls experience • CISA, CISM, CISSP, or similar certifications What Could Set You Apart: • Ability to understand data flows, sources, and data transformations across multiple domains and transform data more »
or internal control experience with comprehensive knowledge of process analysis and control design techniques • 5+ years Information Technology or IT Risk and Controls experience • CISA, CISM, CISSP, or similar certifications What Could Set You Apart: • Ability to understand data flows, sources, and data transformations across multiple domains and transform data more »
or internal control experience with comprehensive knowledge of process analysis and control design techniques • 5+ years Information Technology or IT Risk and Controls experience • CISA, CISM, CISSP, or similar certifications What Could Set You Apart: • Ability to understand data flows, sources, and data transformations across multiple domains and transform data more »
policies, and procedures Penetration Testing/Ethical Hacking Solid understanding of computer networking - Routing/Switching, LAN/WAN Firewall Configuration Certification such as: CISA/CISM/CISSP, CCNA/CCNP (R&S/Security) Benefits: 23 days holiday, increasing to 29 days through service, including birthday off Discretionary more »
Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection systems, and encryption techniques Possess professional certifications, such as CISSP, CISA, or CRISC, similar Have experience in the identification and capture of IT functional and non-functional requirements for large, complex project. Collaboration is key; you more »
PowerPoint, Excel, SharePoint. High school diploma or equivalent. Minimum age of 18. Must be authorized to work in the U.S. Preferred PMP. Cybersecurity certification (CISA, CISSP, etc). Experience managing multiple projects and multiple project resources of moderate to high risk. Working knowledge of the project life cycle. Ability to more »
ranging from C-level executives to business and technical teams . Excellent communication, presentation and collaboration skills. Industry qualifications (CCSK, CEH, CCSP, GICSP, CISM, CISA, SABSA) would be desirable. Candidates who are having connects with CISO levels are preferable. Knowledge on any of the platforms such as Nozomi Network, Claroty more »
knowledge to interpret client organization requirements. Ability to adapt to evolving business, industry, and assessment methodologies. Excellent communication, organizational, and presentation skills. Preferred certifications: CISA, CISM, CISSP. Keys to Success: Possess key auditor traits such as professionalism, ethics, diplomacy, and adaptability. Apply risk-based thinking and process approach to audits. more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »
GSEC, or SSCP along with an appropriate computing environment (CE) certification). An IAT Level III certification would also be acceptable (CASP+, CCNP Security, CISA, CISSP, GCED, GCIH, CCSP). Clearance Required: Active TS/SCI clearance with Polygraph required OR active TS/SCI and willingness to get a more »