technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge of NIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for growth. more »
Demonstrated commitment to ongoing learning in technical concepts and technologies. Familiarity with IT security policies and technical standards (e.g., ISO 27001, NIST, Cyber Essentials, COBIT, SOC 2 Type II, etc.). Proficiency in report writing. Qualifications Bachelor's degree in Computer Science (or related field) 4 + years of relevant more »
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Gresham Hunt
testing is essential. Knowledge/experience with major cloud service providers, preferably AWS. Knowledge of various industry frameworks and controls such as ITIL, NIST, COBIT, ISO 27001/2. A broad, high-level IT or Cybersecurity background with exposure to areas such as cloud security, security architecture, IT infrastructure andmore »
testing is essential. Knowledge/experience with major cloud service providers, preferably AWS. Knowledge of various industry frameworks and controls such as ITIL, NIST, COBIT, ISO 27001/2. A broad, high-level IT or Cybersecurity background with exposure to areas such as cloud security, security architecture, IT infrastructure andmore »
Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with business requirements. Familiarity with Control Frameworks like ISO 27001 andCoBITfor determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven more »
strategic 3rd parties across a diverse operation Exposure/experience of a shared services operating model/organisation Application of best practice principles (ITIL & COBIT) within a diverse and challenging technology environment Strong leadership and a proven ability to influence and persuade internally and externally Nice to have : Experience operating more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s ControlObjectivesforInformationandrelatedTechnology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment | 🌳🌳🌳 | We’re on a mission to put people and the planet before profit, leaving the world in a more »
infrastructure. Requirements: Expertise in IT, disaster recovery planning, and cybersecurity. Preferred certifications in relevant disciplines (CompTIA Network +, CompTIA Security +, CISM, CISSP or COBIT 5) Baseline knowledge of resilience frameworks (NIST CSF, ISO 27001/27002 andCOBIT) For more information, please apply more »
external network to understand emerging Cyber Security threats and events Knowledge of internal and/or external regulatory policies, standards, procedures, and controls (e.g., COBIT, COSO, NIST, ISO27xx) Ability to drive technical consensus and facilitate agreements with challenging stakeholders Ability to understand business visions and strategy Strong communication (oral andmore »
relevant field such as finance, accounting, businessadministration, or a related discipline is preferred Relevant certifications in finance, project management, or ITgovernance (e.g. CMA, PMP, COBIT). Skills Exemplary leadership skills, with the ability to manage and developteams to the best of their abilities, leading by example and workingcollaboratively to deliver more »
Key Responsibilities: Facilitating Risk andControl Self Assessments (RCSA) by Risk Owners to ensure completeness (e.g. against industry standard frameworks such as NIST andCOBIT) and accuracy. This will include running risk assessment workshops with various business areas and support functions, and consolidating the results into operational risk maps Advise more »
Sheffield, England, United Kingdom Hybrid / WFH Options
Chapman Tate Associates
as a Technical Consultant or similar role, with a focus on IT policy development and implementation. Strong understanding of IT governance frameworks, such as COBIT, ITIL, and ISO 27001. Working knowledge of Linux, Windows and MacOS Technical background with solid experience in maintaining systems and hardware Proficiency in troubleshooting andmore »
Operations Meeting, Application andInformation Security Forum All activities and findings must be recorded and stored as this will be used as evidence during COBIT 5, PCI DSS and Security review, internal and external audits. Required Skills Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge … exposure and awareness FCA or equivalent GDPR - General Data Protection Regulation PCI DSS - Payment Card Industry Data Security Standard COBIT 5 - ControlObjectivesforInformationandrelatedTechnology ISO 27001 - Information Security Management System (ISMS) CIS - Center of Internet Security (Cyber security best Practices) Infrastructure Security Engineer - 12 Month Contract more »
disruptions such as cyberattacks or infrastructure damage. -Possessing one of the following certifications is advantageous: CompTIA Network +, CompTIA Security +, CISM, CISSP, or COBIT 5. -Demonstrate a fundamental understanding of frameworks such as NIST CSF, ISO 27001/27002, and COBIT. -Experience in Operational Technology Security, with the ability more »
in an operational or service delivery role Exposure/experience of a shared services operating model/organisation Application of best practice principles (ITIL & COBIT) within a diverse and challenging technology environment Experience of operating across multiple countries and cultures is desirable, but not essential more »
and investigate access incidents while monitoring logs for suspicious activity, ensuring IAM security with broad IT and security expertise, implementing frameworks like ISO 27001, COBIT, and NIST, with preferred certifications in CISSP and SANS. Ideal Hire Candidates should come from a professional services or end-user background and should ideally more »