term data retention, and rapid recovery. • Ability to design and manage multi-tiered storage architectures that support vaulting, compliance, and business continuity. Certifications: Not required, but certifications such as CISSP, CISM, CISA, CCSP, or Dell EMC Proven Professional (especially with a focus on Superna or Data Protection) are highly encouraged. Skills and Abilities: Business Mathematical Skills - Ability to compute More ❯
UKAEA. A degree in Cybersecurity, Information Technology, or a STEM subject (or equivalent experience). Essential o Security Assurance certifications such as CCP, SIRA o Security certifications such as CISSP, SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk More ❯
Leeds, Yorkshire, United Kingdom Hybrid/Remote Options
Stott and May
expertise in cloud security, DevSecOps, and secure software development lifecycle (SSDLC). Understanding of AI/ML systemssecurity, including model attacks and data integrity risks. Relevant certifications preferred: CISSP, CISM, CISA, CEH, OSCP, CCSK, or blockchain security certifications. Desirable Skills & Experience Exceptional communication: Ability to articulate complex security concepts clearly to technical teams, senior management, and non-technical More ❯
practices. Qualifications & Skills: Education: Bachelors or Masters degree in Cybersecurity, Computer Science, or a related field. Experience: 3+ years in cybersecurity engineering, network security, or system security. Certifications (Preferred): CISSP, CEH, OSCP, GSEC, or equivalent. Technical Proficiency: Hands-on experience with firewalls (Palo Alto, Cisco, Fortinet), SIEM (Splunk, QRadar), and EDR solutions. Strong knowledge of cloud security (AWS, Azure More ❯
related field. • Minimum seven (7) years of professional experience in cybersecurity and IT infrastructure, including hands-on roles in network, systems, and security operations. • Relevant professional certifications preferred (e.g., CISSP, CISM, CISA, CCSP, ISO 27001 Lead Implementer/Lead Auditor, Okta certifications, CyberArk certifications). Technical Expertise Privileged Access Management (PAM): • Proven experience in designing, implementing, and managing privileged More ❯
Ability to translate technical risks into business-relevant language for both technical and non-technical stakeholders, including executive leadership. Education/Qualifications/Technical Competencies Essential Recognised cybersecurity certification: CISSP and/or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server/Desktop, RHEL/OEL Linux PowerShell and Python scripting Proven experience leading strategic security initiatives More ❯
/CD pipelines, infrastructure-as-code (IaC), and model deployment automation. What You'll Bring Bachelor's degree (or equivalent experience) required. CSSLP certification required; additional certifications such as CISSP, CCSP, or CCSK strongly preferred. 10+ years of progressive experience in informationsecurity, with demonstrated leadership experience managing or mentoring technical teams or security architects. Proven expertise supporting software More ❯
firewall desired. Stakeholder management. Knowledge of cloud security. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud More ❯
firewall desired. Stakeholder management. Knowledge of cloud security. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud More ❯
firewall desired. Stakeholder management. Knowledge of cloud security. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud More ❯
firewall desired. Stakeholder management. Knowledge of cloud security. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud More ❯
City, London, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
communication abilities. Familiarity with NIST, ISO 27001, and CIS Controls frameworks. Ability to work under pressure, prioritise effectively, and maintain attention to detail. Desirable: Professional certifications such as GSEC, CISSP, OSCP, CISA, CompTIA Sec+, or equivalent. Knowledge of ITIL processes and cyber governance frameworks. Experience with scripting, automation, and digital forensics. Awareness of PCI DSS, SDLC, and network analysis More ❯
London, Fleet Street, United Kingdom Hybrid/Remote Options
The Bridge IT Recruitment
communication abilities. Familiarity with NIST, ISO 27001, and CIS Controls frameworks. Ability to work under pressure, prioritise effectively, and maintain attention to detail. Desirable: Professional certifications such as GSEC, CISSP, OSCP, CISA, CompTIA Sec+, or equivalent. Knowledge of ITIL processes and cyber governance frameworks. Experience with scripting, automation, and digital forensics. Awareness of PCI DSS, SDLC, and network analysis More ❯
A strong understanding of cloud containers and/or serverless platforms (e.g., EKS, ECS, Lambda, Fargate). Big four consulting or Fortune 500 company experience. Relevant industry certification (e.g., CISSP, CEH, OSCP, Azure, AWS, CISM, CISA). USD 144 500.00 per year Compensation: Compensation includes a base salary of $144,900.00 - $241,500.00. The base salary may vary within More ❯
remediation. Excellent communication skills, capable of conveying technical information to both technical and non-technical audiences. Ability to work autonomously and collaboratively within cross-functional teams. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Preferred Qualifications Bachelor’s degree in Computer Science, InformationSecurity, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. More ❯
remediation. Excellent communication skills, capable of conveying technical information to both technical and non-technical audiences. Ability to work autonomously and collaboratively within cross-functional teams. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Preferred Qualifications Bachelor’s degree in Computer Science, InformationSecurity, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. More ❯
remediation. Excellent communication skills, capable of conveying technical information to both technical and non-technical audiences. Ability to work autonomously and collaboratively within cross-functional teams. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Preferred Qualifications Bachelor’s degree in Computer Science, InformationSecurity, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. More ❯
remediation. Excellent communication skills, capable of conveying technical information to both technical and non-technical audiences. Ability to work autonomously and collaboratively within cross-functional teams. Relevant certifications (e.g., CISSP, CISM, CEH) are highly desirable. Preferred Qualifications Bachelor’s degree in Computer Science, InformationSecurity, or a related discipline. Experience working in large enterprise environments with diverse IT infrastructure. More ❯
years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware analysis, APT detection, and regulatory frameworks (GDPR, PCI DSS). Familiarity with Infrastructure as Code tools and cloud platforms. Soft Skills Strong More ❯
years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware analysis, APT detection, and regulatory frameworks (GDPR, PCI DSS). Familiarity with Infrastructure as Code tools and cloud platforms. Soft Skills Strong More ❯
years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware analysis, APT detection, and regulatory frameworks (GDPR, PCI DSS). Familiarity with Infrastructure as Code tools and cloud platforms. Soft Skills Strong More ❯
years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware analysis, APT detection, and regulatory frameworks (GDPR, PCI DSS). Familiarity with Infrastructure as Code tools and cloud platforms. Soft Skills Strong More ❯
years in SOC operations, incident response, or threat intelligence. Practical experience with forensic investigations and security monitoring tools. Excellent written and verbal communication skills. Preferred Certifications such as CISSP, GIAC (GCIH, GCIA, GCTI). Experience with malware analysis, APT detection, and regulatory frameworks (GDPR, PCI DSS). Familiarity with Infrastructure as Code tools and cloud platforms. Soft Skills Strong More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
Azure Security Engineer (AZ-500), or the ability to demonstrate equivalent knowledge. Desirable Familiarity with the Microsoft security suite: Defender, InTune, Purview, EntraID, and Azure. Further certifications such as CISSP, CISM, or CRISC are advantageous Familiarity with PCI-DSS standards. Experience influencing cyber security investments and initiatives by providing expert advice to stakeholders and management. Educated to degree level More ❯