s degree in computer science or information sciences, or in a similar field. Possess certifications from accredited bodies, including Microsoft SC-200, Certified SOC Analyst (CSA), CompTIACySA+, GIAC Security Operations Certified (GSOC), GIAC Continuous Monitoring Certification (GMON), GIAC Certified Incident Handler (GCIH), CCNA Cyber Ops, or other specialized security certification that assesses the candidates' security analysis More ❯
s degree in computer science or information sciences, or in a similar field. Possess certifications from accredited bodies, including Microsoft SC-200, Certified SOC Analyst (CSA), CompTIACySA+, GIAC Security Operations Certified (GSOC), GIAC Continuous Monitoring Certification (GMON), GIAC Certified Incident Handler (GCIH), CCNA Cyber Ops, or other specialized security certification that assesses the candidates' security analysis More ❯
NCSC cyber security principles and good practice. Familiarity with change and configuration management from a cyber perspective. Working knowledge of ISO 27001 or NIST standards. Relevant certifications (e.g., Security+, CySA+, CISMP) are desirable. If you are interested, please apply at first instance More ❯
impacts and actionable recommendations. Experience presenting technical risk findings to executive leadership, clients, and non-technical stakeholders. One or more of the following certifications: CISSP, CISA, CompTIACySA+ Permanent - Central London based More ❯