Experience Minimum of 3 to 5 years of experience in the IT security industry, preferably working in a SOC/NOC environment. Preferably holds Cyber Security Certification e.g. ISC2CISSP, GIAC, SC-200, Certified SOC Analyst Experience with Cloud platforms (AWS and/or Microsoft Azure) Excellent knowledge of Microsoft Office products, especially Excel and Word Reports to SecurityMore ❯
and problem-solving skills. Strong communication and collaboration skills. Excellent team player and strong interpersonal skills. Ability to work effectively in a fast-paced, dynamic environment. Good to Have CISSP, CEH and/or equivalent and higher certification. Security product knowledge (e.g., Cisco, Checkpoint, Palo Alto, SIEM). Cloud and infra-Security knowledge (e.g., AWS, Azure, CISSP, PAM More ❯
apps. 5+ years in a senior security engineering or architect role. Experience leading technical teams or acting as a technical lead on security initiatives. Certifications such as AZ-500, CISSP, CCSP, GIAC, or similar highly advantageous. Engineer-first mentality: solves security problems through systems thinking and automation. Strategic, yet pragmatic: balances best practice with business context. Proactive, communicative, and More ❯
Ability to provide pragmatic security solutions tailored to business needs. Ability to explain complex security concepts to both technical and non-technical audiences. What would be great to have CISSP, CISM, 62443 cyber security certificates Cyber Assessment Framework, NIST CSF, NIST SP 800-82, IEC ISA 99/62443, CIS Controls Strong understanding of IT and OT security risks More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
dynamic, fast-paced environment with a proactive approach to security threats. Willingness to participate in an on-call rotation for incident response. Desirable Skills & Qualifications Professional certifications such as CISSP, CISM, CEH, GIAC. Familiarity with ITIL Service Management processes (Change, Incident & Problem Management). Experience in eDiscovery and digital forensics. Knowledge of operational security controls and product stacks. What More ❯
End-User Behaviour Analytics (EUBA) and Insider Risk Management A good overall understanding of cyber and informationsecurity Certifications such as Microsoft SC-400, AZ-500, MS- 900, or CISSP preferred Please note that if you are NOT a passport holder of the country for the vacancy you might need a work permit. Check our Blog for more information. More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
ScottishPower
degree educated, with significant experience of inputting into the IT security strategy of an organisation of similar size and scale to ScottishPower, and preferably hold relevant industry qualifications (e.g., CISSP, CISM and ISO27001). You’ll have proven experience and knowledge of - Security Risk Management including the development, recommendation, and delivery of remediation plans Assessing technical designs across multiple More ❯
way. Strong attention to detail and the ability to deliver high quality work. A relevant and recognised professionalSecurity/Risk/Compliance certification supporting the role, such as CISSP, CICM, GCIH, etc. Who we are: We're a business with a global reach that empowers local teams, and we undertake hugely exciting work that is genuinely changing the More ❯
with moderate supervision Strong problem-solving and communication skills Understanding of software development processes and architectural patterns Awareness of business requirements and their impact on software Cybersecurity certifications (e.g., CISSP, CEH, OSCP) are a plus Knowledge of AI and machine learning in security is a plus Technical Skills: Strong proficiency in C++, C, and Assembly Experience with secure coding More ❯
home. What you bring: Bachelor's or Master's degree in computer science, informationsystems, cybersecurity, or related field (or equivalent practical experience), plus relevant security certifications such as CISSP, CISM, or CRISC Proven track record at senior level leading and managing cybersecurity team, including recruiting, training, and supervising staff with demonstrated ability to build and develop high-performing More ❯
is advantageous Comfortable creating design documentation and presenting to clients Key Responsibilities: Specialised technical knowledge and experience of cyber security as evidenced by relevant industry qualifications (e.g. GICSP, GCIP, CISSP, CISM) Knowledge in cyber security frameworks and standards as well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks More ❯
a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
in consulting and client delivery. You'll have access to a wide array of training programs and certifications in areas such as: Programming: Java, Kotlin, Node.js, Spring Boot Cybersecurity: CISSP, CISM Agile Delivery: Scrum Master, Product Owner, Scaled Agile Framework This flexibility allows you to build expertise in domains that align with your interests and our clients' needs. Les More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
BT Security
and ensuring delivery of business benefits Have experience in being a subject matter expert in a technology field Qualifications: Possess a recognised formal security qualification in security such as CISSP, CISM, or have equivalent experience such as 5+ years in a security role Benefits On target 10% on target bonus BT Pension scheme, minimum 5% Employee contribution, BT contribution More ❯
to AI architectures. Develop and tailor cybersecurity frameworks to meet client-specific governance and regulatory requirements. Required Experience and Attributes Extensive experience with AWS security. Relevant security certifications (e.g., CISSP, AWS CertifiedSecurity Specialty). Strong understanding of generative AI and securing GenAI implementations. Experience liaising with CSO/CISO teams and managing cybersecurity consultants. Proficiency in GRC frameworks More ❯
provide mitigation advice, and manage expectations when needed. Requirements: Minimum 4 years of penetration testing experience CREST CRT and CPSA certified (preferred) Other Security certifications: OSCP, OSWP, HTB, CBBH, CISSP (Bonus) Red Team experience (Bonus) Strong knowledge of OWASP Top 10, MITRE ATT&CK, CVSS, and secure coding practices Strong scripting and automation skills using Python, PowerShell, or Bash More ❯
Johnston Carmichael Chartered Accountants and Business Advisers
professionals Collaborate with risk assurance, external audit, and advisory teams to deliver integrated solutions Stay ahead of regulatory and technological developments impacting IT risk and assurance. About You CISA, CISSP, CA qualification or equivalent Proven experience in IT Audit within a professional services or consulting environment Strong understanding of ITGCs, application controls, cybersecurity, data privacy, and ERP systems Excellent More ❯
professionals Collaborate with risk assurance, external audit, and advisory teams to deliver integrated solutions Stay ahead of regulatory and technological developments impacting IT risk and assurance About You CISA, CISSP, CA qualification or equivalent Proven experience in IT Audit within a professional services or consulting environment Strong understanding of ITGCs, application controls, cybersecurity, data privacy, and ERP systems Excellent More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Capgemini
a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
a vast array for different training and certifications in a variety of areas: cloud technologies (AWS, Azure, GCP), programming (Java, Kotlin, NodeJS, Spring Boot), DevOps (Terraform, Kubernetes, Docker), Cybersecurity (CISSP, CISM) and Agile delivery (Scrum Master, Product Owner, Scaled Agile Framework). Capgemini Invent offers you the flexibility to develop various areas of knowledge in technical domains aligned both More ❯
working on Critical Infrastructure projects involving OT Cyber Security Experience working as a Consultant, engaging with clients to understand and meet their needs Relevant certifications such as GISCP or CISSP The salary is approximately £100,000, depending on experience. If you believe you are a good fit, please get in touch for a full discussion about the company and More ❯
Ensure different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Certifications such as CEH, OSCP, CISSP are advantageous. Vulnerability Testing Scan systems for vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test from a secure coding perspective. Ensure compliance with More ❯
as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures Relevant certifications such as CSSLP, OSWE, GWAPT, CISSP , or equivalent are advantageous. #J-18808-Ljbffr More ❯