or equivalent experience) in Cybersecurity, Computer Science, Information Systems, or related field Professional Information Security certification such as CCSP, CISM, CISSP, CEH, GIAC, or CASP+ COMPETENCIES Ownership and Delivery . Has a clear focus to deliver results, working to targets, reviewing progress and adapting their plans accordingly, motivating themselves/ More ❯
or equivalent experience) in Cybersecurity, Computer Science, Information Systems, or related field Professional Information Security certification such as CCSP, CISM, CISSP, CEH, GIAC, or CASP+ COMPETENCIES Ownership and Delivery . Has a clear focus to deliver results, working to targets, reviewing progress and adapting their plans accordingly, motivating themselves/ More ❯
or equivalent experience) in Cybersecurity, Computer Science, Information Systems, or related field Professional Information Security certification such as CCSP, CISM, CISSP, CEH, GIAC, or CASP+ COMPETENCIES Ownership and Delivery . Has a clear focus to deliver results, working to targets, reviewing progress and adapting their plans accordingly, motivating themselves/ More ❯
or equivalent experience) in Cybersecurity, Computer Science, Information Systems, or related field Professional Information Security certification such as CCSP, CISM, CISSP, CEH, GIAC, or CASP+ COMPETENCIES Ownership and Delivery . Has a clear focus to deliver results, working to targets, reviewing progress and adapting their plans accordingly, motivating themselves/ More ❯
Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH Desirable. IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements: Full Driving Licence. Fluent in written and spoken English. Recruitment More ❯
in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH (Desirable). IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements Full Driving Licence. Fluent in written and spoken English. More ❯
and/or experience. Hold an industry recognised information security qualification such as GIAC/GCIA/GCIH, CISSP or CompTIAAdvancedSecurityPractitioner (CASP+) and/or SIEM-specific training and certification. An understanding and knowledge of compliance and regulatory frameworks such as National Cyber Security Centre (NCSC) Cyber More ❯
permits to work in the UK and security clearances (up to or over CTC). Desirable IT Qualifications/Certifications such as CompTIA CySA+, CASP, BCS CISMP, CCSP, SSCP, CISSP or CISM qualification or similar or equivalent experience/qualifications Project management certification such PRINCE2, APM, PMP etc. Familiarity with More ❯
permits to work in the UK and security clearances (up to or over CTC). Desirable IT Qualifications/Certifications such as CompTIA CySA+, CASP, BCS CISMP, CCSP, SSCP, CISSP or CISM qualification or similar or equivalent experience/qualifications Project management certification such PRINCE2, APM, PMP etc. Familiarity with More ❯
permits to work in the UK and security clearances (up to or over CTC). Desirable IT Qualifications/Certifications such as CompTIA CySA+, CASP, BCS CISMP, CCSP, SSCP, CISSP or CISM qualification or similar or equivalent experience/qualifications Project management certification such PRINCE2, APM, PMP etc. Familiarity with More ❯
permits to work in the UK and security clearances (up to or over CTC). Desirable IT Qualifications/Certifications such as CompTIA CySA+, CASP, BCS CISMP, CCSP, SSCP, CISSP or CISM qualification or similar or equivalent experience/qualifications Project management certification such PRINCE2, APM, PMP etc. Familiarity with More ❯
cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIAAdvancedSecurityPractitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is essential. Additionally, experience with security tools and technologies, including More ❯