and HIPAA. Proficiency in scripting and automation (Python, PowerShell, Bash) is a plus. Deep technical understanding of Microsoft security architectures, solutions and technologies. Relevant security certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Excellent analytical, problem-solving, and communication skills. Ability to work independently and collaboratively in a fast-paced environment. Some of the benefits include More ❯
Bletchley, Buckinghamshire, United Kingdom Hybrid / WFH Options
In Technology Group
with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI DSS). Professional certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable. Excellent analytical, problem-solving, and communication skills. Desirable: Experience in the finance or fintech sector. Knowledge of DevSecOps practices and secure CI/CD More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
In Technology Group Limited
with cloud security (AWS, Azure, or GCP) and hybrid environments. Good understanding of regulatory frameworks and standards (ISO 27001, NIST, PCI DSS). Professional certifications such as CISSP, CISM, CEH, or CompTIA Security+ are highly desirable. Excellent analytical, problem-solving, and communication skills. Desirable: Experience in the finance or fintech sector. Knowledge of DevSecOps practices and secure CI/CD More ❯
Familiarity with compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting/automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem-solving, communication, and collaboration abilities. Ready to Make an Impact? Join us and be part of a security-first team committed More ❯
security solutions and strategies. Anticipate and prevent potential security threats and vulnerabilities, as well as respond to them quickly. Certifications : Relevant certifications in cyber security, such as CISSP, CISM, CEH, SSCP, or CCSP. Further technical certifications in Microsoft Azure, Networking, Firewall, SIEM, PAM or VM Products are beneficial. Technical Capabilities : Technical competence in one or more of the following areas More ❯
Hands-on expertise in SIEM, EDR, firewalls, VPNs, cloud security (AWS, Azure, GCP) 🔸 Experience with Palo Alto XSOAR or similar platforms 🔸 Familiarity with security compliance & best practices 🔸 Certifications (CISSP, CEH, OSCP, CISM, Security+) are a big plus! 🔥 Ready to take your Cyber Security career to the next level? Apply today! Computappoint Limited operates as an Employment Business and/or More ❯
Watford, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
Risk Management Framework. Strong written and verbal communication abilities, with a focus on clear reporting and stakeholder engagement. Possession of industry-recognised certifications such as CISSP, CISM, CRISC, or CEH would be preferred. Familiarity with Governance, Risk, and Compliance (GRC) platforms and maintaining structured risk registers. Understanding of applicable regulations and data protection legislation, including GDPR and other industry-specific More ❯
Employment Type: Part Time, Work From Home
Salary: £28.49 - £36.98 per hour + £36.98 p/h via Umbrella (Inside IR35)
South East London, England, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetration testing and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why Join? Be at the forefront of upskilling future cybersecurity professionals. Collaborate with a passionate, mission-driven team. More ❯
Milton Keynes University Hospital NHS Foundation Trust
related software and tools, understanding of secure network architectures, experience with encryption and security protocols, and familiarity with threat modelling and risk assessments.o Relevant certifications such as CISSP, CISM, CEH, or equivalent are highly desirable.o Strong analytical skills to identify security threats and implement effective solutions.o Ability to explain complex security issues to non-technical staff and provide security training More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
in a SOC or incident response role, although candidates with Cyber Security know-how and able to demonstrate essential skills, may be considered. Relevant advanced certifications (e.g., GCIA, GSEC, CEH, GCDA, GCIH, GCFA, OSCP) are highly desirable but not essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores More ❯
frameworks. Experience conducting threat modelling, code reviews and penetration testing. Excellent communication skills with the ability to influence and educate development teams. Security certifications such as CISSP, OSCP, GWAPT, CEH or CSSLP are a plus. Experience with Infrastructure-as-Code security (Terraform, CloudFormation is desirable. Knowledge of API security best practices and standards (OAuth, JWT, OpenID) is desirable. Familiarity with More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Trilogy International, A Korn Ferry Company
SIEM platforms such as Splunk, Sentinel , or similar. Solid understanding of security frameworks, malware analysis, and network protocols. Strong analytical and problem-solving skills. Relevant certifications (e.g., CompTIA Security+, CEH, GCIA, or Splunk Certified ) are a plus. More ❯
Redhill, Surrey, United Kingdom Hybrid / WFH Options
FPSG
non-technical and business community Strong demonstrable stakeholder management skills, (internal and external) Desirable to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. Please note: This role requires you to be … application. Key terms IT Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any More ❯
threat modelling, and compliance (GDPR, HIPAA, PCI) Strong communication and stakeholder engagement skills Technical knowledge across .NET, Java, scripting (Python, PowerShell), APIs, and cryptography Nice to have: Certifications (CISSP, CEH, CCSP), experience with SIEM/SOAR tools, business analysis, and working with agile delivery teams. More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
leadership in a security functional role is essential. Recognised cyber security certifications and a track record of continuous professional development is preferred UK Cyber Security Council, NCSC, CISSP, CEH, SFIA etc. Deep technical knowledge of cyber security trends, threats, tools, and protocols -demonstratable vendor agnostic technical appreciation of both defensive and offensive Cyber Security with focus on Microsoft security More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
full year's minimum experience in penetration testing or cyber security assurance. Experience : Some experience of cyber security assessment, vulnerability assessments, or penetration testing. Certifications : such as CPSA or CEH would be advantageous. Tools: Experience of penetration testing tools, Linux, Windows, and Active Directory. Communication : Strong verbal and written skills for stakeholder management, collaboration and administration tasks. Independence : Ability to More ❯
and root cause analysis. Ability to communicate technical issues to non-technical audiences and explain the impact of vulnerabilities or threats in business-focused language. Industry certifications (e.g., CompTIA, CEH) are advantageous. More ❯
especially Azure). Experience with cybersecurity frameworks (e.g., ISO 27001, NIST). Hands-on with security tools, penetration testing, and compliance. Excellent communication and collaboration skills. Certifications like CISSP, CEH, or AZ-500 are a plus. Why Join Be part of a mission-driven, global company focused on safety and innovation. Flexible working hours and hybrid options. Strong benefits package More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯
modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding More ❯