incident responses Experience in large, federated organizations; understanding of public and private sector cyber defence Bachelor’s degree in relevant fields or certifications like CISSP, CISM, GIAC Strong analytical, problem-solving, and communication skills Ability to work under pressure and convey technical info to non-technical audiences Knowledge of More ❯
Norwich, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
and threat intelligence. Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst CertifiedInformation System SecurityProfessional (CISSP), CertifiedInformationSecurity Manager (CISM), or another industry recognised cyber security certification. Full Membership of the Chartered Institute of InformationSecurity (CIISec) - highly desirable. More ❯
not exhaustive) Your skills and experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or InformationSecurity related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of informationsecurity principles and its potential More ❯
not exhaustive) Your skills and experiences: Hold a relevant degree (or equivalent experience) in a relevant STEM subject or InformationSecurity related Hold a CISSP (or able to achieve) Have relevant engineering lifecycle and Project Management knowledge and experience A thorough understanding of informationsecurity principles and its potential More ❯
and Insider Risk Management A good overall understanding of cyber and informationsecurity Certifications such as Microsoft SC-400, AZ-500, MS- 900, or CISSP preferred #J-18808-Ljbffr More ❯
Downham Market, Norfolk, East Anglia, United Kingdom
Kennedy Pearce Consulting
implementation, system administration, and software deployment Degree in IT, Computer Science, or a related field (or equivalent experience) Certifications such as ITIL, CompTIA, or CISSP are advantageous More ❯
skills including the ability to build consensus and to present complex presentations Basic knowledge with one or more scripting languages Certifications – PCNSA or similar, CISSP or similar, SANS GCIH or similar More ❯
APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software More ❯