security compliance frameworks (e.g., NIST, ISO 27001, GDPR). Excellent analytical and problem-solving skills. Effective communication and interpersonal skills. Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance,Identity Fundamentals and Cybersecurity (SC-100) are a plus. Hybrid and multi-cloud infrastructures Security Cleared or more »
continuously improve upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: CertifiedInformation System SecurityProfessional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud SecurityProfessional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of more »
Greater London, England, United Kingdom Hybrid / WFH Options
Luware
/or central logging solutions (MS Sentinel a plus) Qualifications in the field of Computer Science, or equivalent industry experience Recognised certifications such as CISSP, CISM, AZ-500, including knowledge of industry best-practice, guidelines and certification standards such as CIS, NIST, ISO 27001 and SOC 2 Server infrastructure more »
s degree in Computer Science, Information Technology, Cybersecurity, or a related field. Equivalent practical experience is acceptable. Certifications : Possession of industry-recognized certifications (e.g., CISSP, CISM) is highly desirable. Technical Proficiency : Expert knowledge in security domains, cloud security architectures, data protection, network security, and identity management. Experience with defensive more »
Certification Experience with NIST assurance/EDR IT Certifications, including Network+, Security+ Protective Monitoring/SOC Certifications, including CySA+ Cyber Security Certifications, including CISMP, CISSP Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity and Cloud Experience with SIEM platforms, including IBM QRadar, Microsoft Sentinel and LogRhythm more »
Certification '€¢Experience with NIST assurance/EDR '€¢IT Certifications, including Network+, Security+ '€¢Protective Monitoring/SOC Certifications, including CySA+ '€¢Cyber Security Certifications, including CISMP, CISSP '€¢Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity and Cloud '€¢Experience with SIEM platforms, including IBM QRadar, Microsoft Sentinel and LogRhythm more »
security functions (IT Compliance Assessor, QSA, Security Specialist, IT Auditor) Possession of one of the following industry certifications required : CISA, CRISC, CIA, CISM, PCI, CISSP EEO: JAGGAER is a proud equal opportunity/affirmative action employer supporting workforce diversity. We do not discriminate based upon race, ethnicity, ancestry, religion more »
improvement of security practices and procedures. Requirements: Bachelor's degree in Computer Science, InformationSecurity, or related field. Advanced degree or relevant certifications (e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and more »
with one or more of the main cloud vendor platforms, ideally AWS Amazon AWS, Google Cloud or Microsoft Azure cloud architect professional qualifications ISC2CISSP accreditation or equivalent internationally recognised membership Experience in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS/ more »
leading cloud platforms Proficiency in cloud security tools and automation Professional certifications in cloud architecture from Amazon AWS, Google Cloud, or Microsoft Azure ISC2CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, and IDAM systemsmore »
reduce the risk posed to the company. You will hold professional qualifications within security e.g Security+, AWS Security or MS Azure Security and ideally CISSP (although for the right candidate we can support the gaining of this qualification). Key responsibilities include: Security Monitoring and Incident Response Monitoring systemsmore »
security posture. '€¢ COBIT (Control Objectives for Information and Related Technologies): Understand the framework for governance and management of enterprise IT. Preferred Qualification: '€¢SANS Certification '€¢CISSP, CISA, or CRISC About Capita Technology and Software Solutions (TSS) and CISO Capita Technology and Software Solutions (TSS) is a newly formed global shared more »
out-of-hours work as required. Qualifications and Experience: Bachelor's degree in Cybersecurity, Computer Science, or related field. Relevant professional certifications such as CISSP, CISM, GIAC, or equivalent are preferred. Strong working experience with Sentinel. Familiarity with industry frameworks and standards such as NIST, ISO 27001, and CIS more »
security posture. COBIT (Control Objectives for Information and Related Technologies ): Understand the framework for governance and management of enterprise IT. Preferred Qualification: SANS Certification CISSP, CISA, or CRISC About Capita Technology and Software Solutions (TSS) and CISO Capita Technology and Software Solutions (TSS) is a newly formed global shared more »
Proficiency in security tools and automation to bolster defence mechanisms. Professional certifications such as AWS, Google Cloud, or Azure architect credentials. Accreditation like ISC2CISSP, indicative of your mastery in cyber security. Strong background in security architecture and risk management. Familiarity with cyber security standards such as NIST CSF more »
and SIEM technologies eg Microsoft Sentinel An interest in automation of Security operation function including artificial intelligence An understanding of Microsoft security product portfolio CISSP/CISM (Desired) CCSP/SSCP (Desired) Proven experience in Cybersecurity and IT Operations (Required) DLP, EDR/XDR, CASB, E-mail Security, SWG more »
Strong analytical and problem-solving skills, with the ability to prioritise and manage multiple tasks in a fast-paced environment. - Relevant certifications such as CISSP, CISM, CEH, or GIAC are a plus. more »
end-user detection and response, micro-segmentation, zero trust). Exposure to ITIL environments or structured platform management. Possession of professional certifications such as CISSP, CISM, CCNP, CCIE, AWS CertifiedSecurity, etc. Key Accountabilities Technical: Lead the design and implementation of end-to-end Cyber capabilities for both OT more »
and response, micro-segmentation, zero trust) Experience working within an ITIL environment or structured platform management, particularly change and incident management Professional certifications, e.g., CISSP, CISM, CCNP, CCIE, AWS CertifiedSecurity, etc. Key Accountabilities Technical Design lead for end-to-end cyber capabilities for operational technology (OT) and Informationmore »
compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the more »
team effectiveness and efficiency. Mentor and develop junior team members. Role Requirements: High level technical knowledge with a relevant qualification (e.g., CompTIA Security+, CISM, CISSP, or CISA). Experience in a technical role. Results-oriented with a proactive approach to task completion. Excellent communication skills. Strong stakeholder and relationship more »
non-technical level · Experience of crisis management, business resilience, and threat analysis · Strong knowledge of data privacy/protection legislation · Ideally candidates will be CISSP, CISM or CISA certified · Good technical cyber security understanding Please send your CV for immediate review. more »
Services industry. Strong interpersonal skills and experience of developing strong relationships and significant influencing abilities, within a large corporate environment. Relevant cyber qualifications, e.g. CISSP, CISM, CRISC. For more information, please forward your CV to: tom.haussrer@greshamhunt.com more »
CK, NIST, ISO 2700X ) (Preferred) Experience in informationsecurity management reporting and related methodologies (Preferred) InformationSecurity and/or Information Technology industry certification (CISSP, CISM, or equivalent) (Preferred more »
including ISO27001/2, Cyber Essentials Plus, CIS Top 20, Data Protection Act 2018, OWASP Top 10 Have a relevant industry certification such as CISSP, CISM, CRISC, BRMP or similar NB: The above list of job duties is not exclusive or exhaustive and the post holder will be required more »