with others to deliver. Technically astute, with in good knowledge of IT Operation and infrastructure. Desired Certifications (one or more is a plus): CISSP (CertifiedInformation Systems Security Professional) CISM (CertifiedInformationSecurityManager) CompTIA Security+ CEH (Certified Ethical Hacker More ❯
in threat modelling & application security risk assessments, secure software development practices, including SecDevOps FAIR Open certified & experience in applying FAIR for cyber risk quantification Relevant industry certifications including CISSP, CISM, CISA Understanding of cyber risk frameworks or industry standards such as 800-53, ISO 27001/2, PCI, CIS 18, CMMC Qualifications Your Experience 4+ years of experience performing cyber More ❯
methodologies within DevOps environments Industry-recognized professional certifications such as CertifiedInformation Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Certified Solutions Architect, CertifiedInformationSecurityManager (CISM) 4+ years experience in the e-commerce industry 4+ years experience in a regulated environment 2+ years experience in financial services industry 2+ years of experience in security integration for More ❯
methodologies within DevOps environments Industry-recognized professional certifications such as CertifiedInformation Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Certified Solutions Architect, CertifiedInformationSecurityManager (CISM) 4+ years experience in the e-commerce industry 4+ years experience in a regulated environment 2+ years experience in financial services industry 2+ years of experience in security integration for More ❯
methodologies within DevOps environments Industry-recognized professional certifications such as CertifiedInformation Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Certified Solutions Architect, CertifiedInformationSecurityManager (CISM) 4+ years experience in the e-commerce industry 4+ years experience in a regulated environment 2+ years experience in financial services industry 2+ years of experience in security integration for More ❯
methodologies within DevOps environments Industry-recognized professional certifications such as CertifiedInformation Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), AWS Certified Solutions Architect, CertifiedInformationSecurityManager (CISM) 4+ years experience in the e-commerce industry 4+ years experience in a regulated environment 2+ years experience in financial services industry 2+ years of experience in security integration for More ❯
degree in Cybersecurity, Information Technology, or a STEM subject (or equivalent experience). Essential o Security Assurance certifications such as CCP, SIRA o Security certifications such as CISSP, SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and More ❯
DSS Qualified Security Assessor (QSA) or Internal Security Assessor (ISA) NIST Cybersecurity Framework or CAF-related training/accreditation CertifiedInformation Systems Security Professional (CISSP) CertifiedInformationSecurityManager (CISM) CertifiedInformation Systems Auditor (CISA) Certified in Risk and Information Systems Control (CRISC) Years of Experience Minimum 3 years’ experience delivering GRC services in a consultancy or in-house securityMore ❯
field. • Minimum seven (7) years of professional experience in cybersecurity and IT infrastructure, including hands-on roles in network, systems, and security operations. • Relevant professional certifications preferred (e.g., CISSP, CISM, CISA, CCSP, ISO 27001 Lead Implementer/Lead Auditor, Okta certifications, CyberArk certifications). Technical Expertise Privileged Access Management (PAM): • Proven experience in designing, implementing, and managing privileged access and More ❯
data retention, and rapid recovery. • Ability to design and manage multi-tiered storage architectures that support vaulting, compliance, and business continuity. Certifications: Not required, but certifications such as CISSP, CISM, CISA, CCSP, or Dell EMC Proven Professional (especially with a focus on Superna or Data Protection) are highly encouraged. Skills and Abilities: Business Mathematical Skills - Ability to compute costs, ROI More ❯
best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in InformationSecurity, Computer Science, or a related field. - Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor. - Proven experience in informationsecurity management and conducting security audits. - Strong knowledge of informationsecurity frameworks and standards. - Excellent analytical and problem-solving skills. - Strong More ❯
best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in InformationSecurity, Computer Science, or a related field.- Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in informationsecurity management and conducting security audits.- Strong knowledge of informationsecurity frameworks and standards.- Excellent analytical and problem-solving skills.- Strong More ❯
Stakeholder management. Knowledge of cloud security. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and More ❯
Stakeholder management. Knowledge of cloud security. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Stott and May
in cloud security, DevSecOps, and secure software development lifecycle (SSDLC). Understanding of AI/ML systems security, including model attacks and data integrity risks. Relevant certifications preferred: CISSP, CISM, CISA, CEH, OSCP, CCSK, or blockchain security certifications. Desirable Skills & Experience Exceptional communication: Ability to articulate complex security concepts clearly to technical teams, senior management, and non-technical stakeholders. Strategic More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
Security Engineer (AZ-500), or the ability to demonstrate equivalent knowledge. Desirable Familiarity with the Microsoft security suite: Defender, InTune, Purview, EntraID, and Azure. Further certifications such as CISSP, CISM, or CRISC are advantageous Familiarity with PCI-DSS standards. Experience influencing cyber security investments and initiatives by providing expert advice to stakeholders and management. Educated to degree level or equivalent. More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
Security Engineer (AZ-500), or the ability to demonstrate equivalent knowledge. Desirable Familiarity with the Microsoft security suite: Defender, InTune, Purview, EntraID, and Azure. Further certifications such as CISSP, CISM, or CRISC are advantageous Familiarity with PCI-DSS standards. Experience influencing cyber security investments and initiatives by providing expert advice to stakeholders and management. Educated to degree level or equivalent. More ❯
risks into business-relevant language for both technical and non-technical stakeholders, including executive leadership. Education/Qualifications/Technical Competencies Essential Recognised cybersecurity certification: CISSP and/or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server/Desktop, RHEL/OEL Linux PowerShell and Python scripting Proven experience leading strategic security initiatives and process automation in large More ❯
years in a security architecture position. Strong understanding of security frameworks (ISO 27001, NIST, COBIT, ITIL). Experience with cloud environments (Azure, AWS, O365). Certifications such as CISSP, CISM, CISA, CRISC or equivalent. Experience in Agile/SAFe delivery environments and comfort acting as a Product Owner or similar. Why join You’ll be part of a collaborative architecture More ❯
GDPR, FCA, PRA), cloud-native security, and DevSecOps practices. Exceptional leadership, communication, and stakeholder engagement skills, with the ability to influence at Board and executive levels. Relevant certifications (CISSP, CISM, CCSP, CIPP/E, SABSA, or equivalent) preferred. Bachelor or equivalent qualification would be advantageous. At WTW, we believe difference makes us stronger. We want our workforce to reflect the More ❯
Excellent communication skills, capable of conveying technical information to both technical and non-technical audiences. Ability to work autonomously and collaboratively within cross-functional teams. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Preferred Qualifications Bachelor’s degree in Computer Science, InformationSecurity, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. Knowledge of More ❯
Excellent communication skills, capable of conveying technical information to both technical and non-technical audiences. Ability to work autonomously and collaboratively within cross-functional teams. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Preferred Qualifications Bachelor’s degree in Computer Science, InformationSecurity, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. Knowledge of More ❯