bachelor's degree in computer science, informationsecurity, cyber security or a related field, or equivalent work experience. A recognised security certification, such as CISSP, CISM, CISA, GCIH, GCIA, CEH or equivalent. Proven experience in leading and managing a SOC and a team of cyber analysts, preferably in a more »
improvement of security practices and procedures. Requirements: Bachelor's degree in Computer Science, InformationSecurity, or related field. Advanced degree or relevant certifications (e.g., CISSP, CISM, CEH) preferred. Proven experience as a Security Engineer, with a focus on compliance assessment, security architecture, threat detection and response, and identity and more »
team effectiveness and efficiency. Mentor and develop junior team members. Role Requirements: High level technical knowledge with a relevant qualification (e.g., CompTIA Security+, CISM, CISSP, or CISA). Experience in a technical role. Results-oriented with a proactive approach to task completion. Excellent communication skills. Strong stakeholder and relationship more »
the governance team. About you: Bachelor's or Master's degree in InformationSecurity, Computer Science, or a related field. Professional certifications such as CISSP, CRISC, CISM, or CISA (highly desirable). 4+ years of experience in information security. Strong knowledge of informationsecurity frameworks, standards, and best practices. more »
Leakage prevention Background in working closely with 1st line of defence teams whilst being a 2nd line of defence Cyber Security expert Security accreditations – CISSP, CISA and/or CISM Strong knowledge of current Security standards – NIST, ISO 27001, GDPR, CyberEssentials Solid knowledge of IT Security Operations – tools, processes more »
What you need to succeed Bachelor/Master degree or equivalent experience in InformationSecurity/Cyber Security or related field CISA, CISM or CISSP certification is a plus 5+ years of relevant work experience in GRC, Big 4 Compliance Advisory, Cyber security, Risk Advisory, or Internal Audit Experience more »
techniques. Technical cyber knowledge, including: Cloud Security. Identity and Access Management. Software development lifecycle. Operational Technology. Industry accreditation such as SANS Institute, Security+, CISM, CISSP or ISO27001; OUR BENEFITS We offer thoughtful, balanced rewards and support to help our people do their best work and live their lives outside more »
methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell, Ansible, Jenkins, etc. Hold relevant industry certifications such as CISSP, CISM, CRISC, etc. Candidates must be based in the UK with full right to work. Unfortunately, visa sponsorship is not available at this time. more »
controls as needed. About you: Experience in working with third party vendors. Excellent knowledge and experience working with ISO 27001, SOC 2 and NIST. CISSP/CISM certification (preferable). Strong communication skills, both verbal and written. Experience in leading a global cyber security team. A collaborative cyber securitymore »
ability to effectively convey complex technical concepts to non-technical stakeholders and deliver engaging training sessions to internal teams. Professional certifications in cybersecurity (e.g., CISSP, CISM, CRISC), insurance (e.g., CPCU, ARM, AINS) Why Join Them: Exciting Opportunity: Be part of a dynamic team at the forefront of cyber risk more »
The Experience and Key Skills we need: At least 5+ years of experience in a Product or Application Security role Industry certifications such as CISSP, CISM, and CISA, are highly advantageous Solid understanding of secure coding principles Experience working with cloud-based applications and services Familiarity with a variety more »
management (e.g. ITIL) and IT governance (e.g. CoBIT) frameworks. Strong understand of Secure Design and Secure Development practices and frameworks, preferably ISC2 CSSLP or CISSP certified. Good technical skills and awareness of web/digital technologies and the business advantages of varying technology and operational approaches to managing web more »
driving risk culture. Compliance with the Security aspects of applicable laws, regulations, and industry standards including ISO 27001, SOX, PCI DSS, Data Protection. CISM, CISSP, ISO27001 certifiedInformationSecurity – GRC Consultant £55,000 - £70,000 London, UK more »
preferred. Experience of infrastructure design and management in mission critical environments preferred. Understanding of Virtual Infrastructure preferred Juniper experience would be additionally desirable. JNCIA, CISSP, CISA, GIAC or network specific certifications preferred. Effective communication, organizational, problem-solving and presentation skills Self-motivated and, in time while supported, able to more »
stakeholders from diverse technology and business teams. Strong verbal and written communication skills. Desirable experience: Professional certifications such as CertifiedInformationSystemsSecurityProfessional (CISSP), Certified Ethical Hacker (CEH), or CertifiedInformationSecurity Manager (CISM). In-depth knowledge of Operating System security and system hardening concepts, such as more »
Party relationships Knowledge of major compliance frameworks such as CIS and ISO27001 Experience with Data Privacy would be a big bonus Certifications such as CISSP, CISM, CRISC, ISO LI, ISO LA Sound interpersonal skills The role would be best suited to someone who is a 'doer', wants to drive more »
authentication policies/controls for cloud applications/environments. * Understanding of emerging trends in identity and access management. * Professionalsecurity management certifications such as CISSP, CISM, CISA, or ISO 27001 Lead Auditor. * Experience in conducting assurance over identity & access management and/or informationsecurity controls. The Guardian is more »
Desirable Skills: Five+ years in informationsecurity, focusing on security engineering. Familiarity with security standards like ISO 27001, NIST, and CIS. Certifications such as CISSP, CISM, or SANS GIAC. This is a hybrid role requiring 2-3 days in Central London. It offers an excellent salary and a comprehensive more »
Bachelor's Degree in Computer Science/Information Technology or equivalent experience Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network more »
with vendors Audit activities of administrators and conduct Security awareness training Requirements Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network more »
continuously improve upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: CertifiedInformation System SecurityProfessional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud SecurityProfessional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of more »
e.g., Red Hat, CentOS, Alma, ubuntu) Have familiarity with security technologies, including firewalls, intrusion detection systems, and encryption techniques Possess professional certifications, such as CISSP, CISA, or CRISC, similar Have experience in the identification and capture of IT functional and non-functional requirements for large, complex project. Collaboration is more »
two years of experience in cyber security, network security, or information security. Certification in one or more of the following areas: CompTIA Security+, CEH, CISSP, CISM, GSEC, or equivalent. Solid understanding of security principles, frameworks, and best practices, such as NIST, ISO270001, OWASP, and CIS. Proficiency in security tools more »
Strong analytical and problem-solving skills, with the ability to prioritise and manage multiple tasks in a fast-paced environment. - Relevant certifications such as CISSP, CISM, CEH, or GIAC are a plus. more »
with internal and external About you: Degree (Cyber security or related field), relative InformationSecurity certification, and extensive related experience. InformationSystemsSecurityProfessional (CISSP), or related certification. and understanding of controls related to COBIT, HITRUST, SOX, PCI, HIPAA, and other regulations. to review Service and Organization Controls (SOC more »