career goals are completed in 4 easy steps. Step 1 - Accredited Online Training The first step is completing a selection of professional, accredited and industry recognised courses from CompTIA which is the global leader in IT Technician, Networking and Cybersecurity training. The training is delivered via multimedia rich video tutorials, practice labs, presentations and quizzes through a portal โฆ is specifically designed to qualify you to move into the cybersecurity field. This official, accredited training consists of online training, practical training and an official exam (CompTIASecurity+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once โฆ Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIASecurity+, Ethical Hacker More โฏ
City of London, London, United Kingdom Hybrid / WFH Options
Stack Recruitment
as an Information Security Analyst in a commercial tech environment ๐ Degree in Computer Science, Information Systems, or related field ๐ Certifications such as CISSP, CISM, CEH, or CompTIASecurity+ (desirable) ๐ง Strong analytical mindset and attention to detail ๐งฎ Proficient in operating systems, firewalls, encryption, VPNs, and SIEM tools ๐ฃ๏ธ Excellent communicator, able to engage both technical and non-technical audiences More โฏ
london (city of london), south east england, united kingdom Hybrid / WFH Options
Stack Recruitment
as an Information Security Analyst in a commercial tech environment ๐ Degree in Computer Science, Information Systems, or related field ๐ Certifications such as CISSP, CISM, CEH, or CompTIASecurity+ (desirable) ๐ง Strong analytical mindset and attention to detail ๐งฎ Proficient in operating systems, firewalls, encryption, VPNs, and SIEM tools ๐ฃ๏ธ Excellent communicator, able to engage both technical and non-technical audiences More โฏ
of NCSC cyber security principles and good practice. Familiarity with change and configuration management from a cyber perspective. Working knowledge of ISO 27001 or NIST standards. Relevant certifications (e.g., Security+, CySA+, CISMP) are desirable. If you are interested, please apply at first instance More โฏ