in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) and/or Certified Ethical Hacker (CEH). Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies including MPLS, SD WAN. Knowledge of cloud providers security More ❯
Information Security, or a related field. A master's degree is a plus. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable. Scripting experience. FlexTrade Systems, Inc. is an equal opportunity employer and makes employment More ❯
stakeholders from different technology and business teams. Strong verbal and written communication skills. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). Strong knowledge of Operating System security and system hardening concepts such as CIS Benchmarks. Experience More ❯
tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security, Digital Forensics, EthicalHacking Computer Science, Software Development, Network Engineering Mathematics, Physics and other STEM subjects Other desirable certifications include : CISSP/CEH, CREST, OSCP/ More ❯
Aberdeen, Aberdeenshire, United Kingdom Hybrid / WFH Options
Cammach Bryant
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
Aberdeen, City of Aberdeen, United Kingdom Hybrid / WFH Options
Cammach Bryant
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
Strategic Resources European Recruitment Consultants Ltd
and have a proven track record in cyber security operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
field and have a proven track record in cybersecurity operations and threat analysis. Relevant certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or CompTIA Advanced Security Practitioner (CASP+) are highly desirable. Strong expertise in network security concepts, protocols, security standards and best practices is More ❯
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice More ❯
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice More ❯
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice More ❯
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM More ❯
to help set you up for success. Join a company that's making a real impact. In addition to our sustainability goals, we empower ethical hackers from all backgrounds to earn a living. Be yourself! Our international team celebrates individuality and places a strong focus on diversity and inclusion. More ❯
existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication and presentation More ❯
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Vanquis Bank Limited
in security monitoring and detection efforts. Should be working towards or have one or several the following certifications: Certified Cloud Security Professional (CCSP) Certified Ethical Hacker (CEH) Certified Information Systems Security Professional (CISSP) IT expertise coupled with understanding of financial services and impacting laws and regulations. Any recognised IT More ❯
ahead of cyber threats. The Role We are looking for an experienced Penetration Tester to join our team. You will conduct security assessments and ethicalhacking activities to identify vulnerabilities in client systems. This role requires a deep understanding of attack techniques, security frameworks, and risk mitigation strategies. … improve existing processes. Collaborate with clients to provide security recommendations and mitigation strategies. Stay up to date with the latest security threats, exploits, and hacking techniques. Assist in security awareness training and red team exercises. Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven … experience in penetration testing and ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are highly More ❯
Science, Technology, Engineering and Mathematics (STEM) at Regis College seeks an Adjunct Professor for the Fall semester specializing in Cybersecurity to teach CYS 230, Hacking and Penetration Testing. This course is an introduction to ethicalhacking and penetration testing. Areas of instruction include various tools and vulnerabilities More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯
Students or recent grads from computer science, IT, or cybersecurity programs • Learners who’ve completed online courses in cybersecurity fundamentals • Beginners with interest in ethicalhacking, system hardening, or security tools • Intermediate learners seeking practical, real-world security exposure No need to be a certified hacker — just bring More ❯