Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
Strategic Resources European Recruitment Consultants Ltd
and have a proven track record in cyber security operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯