can communicate effectively with both technical and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live More ❯
can communicate effectively with both technical and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or Certified Ethical Hacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live More ❯
such as completion of online courses (e.g., through platforms like Coursera, Udemy, or Cyber Discovery). Understanding of basic networking principles (e.g., IP Addressing, DNS, Firewalls). Exposure to ethicalhacking tools or cyber security software (e.g., Wireshark, Metasploit). Knowledge of cloud platforms (e.g., AWS, Azure, Okta, Salesforce). Basic understanding of computer systems, networks and cyber More ❯
Milton Keynes, Buckinghamshire, United Kingdom Hybrid / WFH Options
Graphnet Health
dashboards/scripts etc. - Work closely with the Security teams to analyse and help remediate on internal and SoC flagged issues, along with assisting in internal vulnerability checks/ethicalhacking - Continuous improvement and testing of DR/BCP to ensure high availability Able to work well as an individual and as part of a team Take part More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
methodologies, and red team capabilities. Collaborate across security teams and maintain strong client relationships. Support project delivery and manage multiple testing engagements. Requirements: Extensive experience in penetration testing and ethical hacking. Certifications such as OSCP, CRT, CSTM, or equivalent. Must hold Check Team Member (CTM) status Proficiency with offensive security tools and techniques. Strong communication, leadership, and client-facing More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
You will be responsible for identifying vulnerabilities, assessing risks, and helping us implement secure practices, including the integration of Trusted Execution Environments (TEEs) . Key Responsibilities: Perform white-hat (ethical) penetration testing on our cloud-hosted SaaS appliance. Identify and report vulnerabilities across application layers, APIs, and infrastructure. Collaborate with development teams (Go and Node.js) to remediate security issues. … modeling and risk assessments. Develop and maintain security testing tools and automation scripts. Stay current with emerging security threats, vulnerabilities, and mitigation techniques. Proven experience in penetration testing and ethical hacking. Strong understanding of cloud security (AWS, Azure, GCP). Familiarity with Go and Node.js application security. Experience with TEE technologies or confidential computing. Knowledge of OWASP Top More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
malicious activity CompTIA Cybersecurity Analyst (CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification Certified Ethical Hacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity Concepts and Threat … Internet infrastructure/security architecture If you are interested in the above role - Click the "Apply Now" button now for immediate review Cyber Security Analyst, Security Analyst, Security, OSCP, ETHICAL HACKER, Cyber Security Analyst, Cyber Security Analyst, DV CLEARANCE, DV CLEARED, CYBER ATTACK, Cyber Security Analyst As a member of the Disability Confident Scheme, Circle and our Client guarantees More ❯
many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training iour recruitment support team specialises in the … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker, Cyber Security Analyst, Trainee Cyber Security. More ❯
many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training iour recruitment support team specialises in the … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker, Cyber Security Analyst, Trainee Cyber Security. More ❯
Aylesbury, Buckinghamshire, England, United Kingdom
Course2Career
many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training iour recruitment support team specialises in the … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker, Cyber Security Analyst, Trainee Cyber Security. More ❯
many students on completion of the training we can get them straight into entry level cyber roles. Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training iour recruitment support team specialises in the … 2nd Line Support, IT Training Course, Cyber Training Course, Cyber Security Course, First Line Support, Second Line Support, IT Security Engineer, IT Engineer, CompTIA A+, CompTIA Network+, CompTIA Security+, Ethical Hacker, Cyber Security Analyst, Trainee Cyber Security. More ❯