Python, PowerShell, or Bash for security automation. Ability to write scripts for log analysis, threat hunting, or security automation is a plus. Certifications (Preferred, Not Required) CompTIASecurity+, CEH (Certified Ethical Hacker), GCIH (GIAC Certified Incident Handler), or similar certifications are desirable. Soft Skills & Work Environment Strong problem-solving skills and ability to think like an attacker. More ❯
Requirements: Education Bachelor’s degree in Information Security or similar. Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE, ISO27001 (Candidates with certifications will be given preferential reviews). NB: Communication will be limited to shortlisted applicants only. SBV recruitment is committed to transformation More ❯
and know what an IDS should and shouldn't be doing You can explain why “it’s probably fine” is a terrible risk assessment Relevant certs? CompTIASecurity+, Microsoft, ITIL, whatever makes sense - good to have, not everything The Not-So-Fine Print: You’ll need to travel now and again (we pay for it) Occasionally you More ❯
or security experience Experience with Microsoft 365/Azure; PowerShell skills preferred Knowledge of firewalls, cloud environments, IDS Ability to assess and communicate security risks effectively Certifications such as Security+, Microsoft, ITIL are advantageous Additional Information: Occasional travel required (expenses paid) Flexible working hours, including occasional late nights Support for professional growth and development Why Join Us? If you More ❯
IT or security experience Experience with Microsoft 365/Azure; PowerShell is a plus Knowledge of firewalls, cloud environments, and IDS Ability to assess risks accurately Relevant certifications (e.g., Security+, Microsoft, ITIL) are advantageous Additional Information: Occasional travel (expenses paid) Potential for late hours (with respect to work-life balance) Support for your professional growth Why Join Us? If More ❯
will hold, or be able to demonstrate equivalent experience at, a relevant technical level, such as: MCSA in Server 2012 or later CompTIA A+ CompTIASecurity+ ITIL Foundation Certificate in Service Management Desirable Qualifications Certified storage specialist with experience in Dell, HP, or EMC technologies Proficiency in VMware virtual environments and vSAN storage solutions Experience More ❯
Experience: Familiarity with public sector procurement and experience in police or fire services is a plus. Certifications: MCSA in Server or above CompTIA A+ CompTIASecurity+ ITIL Foundation Certificate in Service Management Desirable Qualifications: Certifications in Dell/HP/EMC storage, VMWare environments, Linux, Exchange, Azure, Intune, Microsoft Teams, and Skype for Business. Experience More ❯
career goals are completed in 4 easy steps. Step 1 - Accredited Online Training The first step is completing a selection of professional, accredited and industry recognised courses from CompTIA which is the global leader in IT Technician, Networking and Cybersecurity training. The training is delivered via multimedia rich video tutorials, practice labs, presentations and quizzes through a portal … is specifically designed to qualify you to move into the cybersecurity field. This official, accredited training consists of online training, practical training and an official exam (CompTIASecurity+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once … Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIASecurity+, Ethical Hacker More ❯
career goals are completed in 4 easy steps. Step 1 - Accredited Online Training The first step is completing a selection of professional, accredited and industry recognised courses from CompTIA which is the global leader in IT Technician, Networking and Cybersecurity training. The training is delivered via multimedia rich video tutorials, practice labs, presentations and quizzes through a portal … is specifically designed to qualify you to move into the cybersecurity field. This official, accredited training consists of online training, practical training and an official exam (CompTIASecurity+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once … Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIASecurity+, Ethical Hacker More ❯