crawley, west sussex, south east england, United Kingdom
InfoSec People Ltd
Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIAAdvancedSecurityPractitioner (CASP+). As dedicated recruitment professionals, we prioritize confidentiality. InfoSec People values diversity, equity, and inclusion (DE&I). Please share any information or accessibility needs more »
london, south east england, United Kingdom Hybrid / WFH Options
Stott and May
+ Email Gateways) Strong knowledge of endpoint and server operating systems and networking ISO27001 experience preferred. Desirable Certifications: ISC2 CISSP, CCSP, or SSCP COMPTIACASP+, CySA+, or Security+ If you are interested please email your CV to megan.seymour@stottandmay.com more »
Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIAAdvancedSecurityPractitioner (CASP+). Track record leading a security team or function where you have had to collaborate across partners with differing levels of technical security competency. Advancedmore »
Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIAAdvancedSecurityPractitioner (CASP+). Technical Expertise: Cloud Security Posture Management: Advanced knowledge in managing and securing cloud environments. Vulnerability Management: In-depth understanding and experience in running comprehensive more »
Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIAAdvancedSecurityPractitioner (CASP+). Technical Expertise: Cloud Security Posture Management: Advanced knowledge in managing and securing cloud environments. Vulnerability Management: In-depth understanding and experience in running comprehensive more »