cyber intelligence. * Strong technical background in cybersecurity, including hands-on experience in security monitoring, threat detection, and digital forensics. * Certifications such as GCTI, GCIA, GCIH, CISSP, or equivalent (preferred). * Experience working with global teams and managing security incidents across multiple regions. * Knowledge of cloud security (AWS, Azure, GCP) and More ❯
common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs). Have at least one certification involving incident response, ethical hacking, cyber security (GCIH, E CEH, E CIH), or network forensics (GIAC Network Forensic Analyst (GNFA), NICCS Certified Network Forensics Examiner (CNFE . Hold one Security Management certification (ISC2 More ❯
hampshire, south east england, United Kingdom Hybrid / WFH Options
Computappoint
response, threat intelligence, and multi-tenant SOCs Excellent leadership, communication, and client engagement skills Bonus Points for Certifications such as CISSP, CISM, GIAC (GSOM, GCIH), Microsoft SC-200 Experience in MSP or MSSP environments Passion for continuous learning and innovation in cybersecurity Why Join Us? ✅ Work with industry-leading tech More ❯
and ISO 27001. 🎓 Qualifications & Certifications Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience. Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+. 🌟 Why Work With Us? 💸 Competitive Salary & comprehensive benefits package. 🎓 Professional Development support, including certification sponsorship. 🏡 Flexible Working – hybrid options available. 🧠 Innovative More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
and ISO 27001. 🎓 Qualifications & Certifications Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience. Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+. 🌟 Why Work With Us? 💸 Competitive Salary & comprehensive benefits package. 🎓 Professional Development support, including certification sponsorship. 🏡 Flexible Working – hybrid options available. 🧠 Innovative More ❯
Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are More ❯
Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
from both an analyst and engineering perspective (Monitoring, Use Case and content creation, upgrades and troubleshooting). Ideally have professional certification such as GIACGCIH, CISSP, CISM or ISO 27001. Experience working in a Defence environment. Experience of managing and/or mentoring technical personnel. Knowledge of on-boarding new More ❯
are/have: Fluency in both speaking and writing English Third Level qualification (or equivalent) in information technology, Information Security or Engineering CISSP, CCSP, GCIH, GIAC (SANS), CCNP, Splunk certificates and/or other relevant security/Network type engineering certifications Experience of analysis and correlation toolsets. Including data extraction More ❯
proactive risk management. - Certifications (Preferred): - Certified Information Systems Security Professional (CISSP) - Certified Information Security Manager (CISM) - GIAC Security Operations Certified (GSOC) - CertifiedIncidentHandler (GCIH) Additional Information: - Work Environment: - This role may require availability outside of standard business hours, including evenings and weekends, to respond to critical security incidents. - The More ❯
Information Systems, related field or equivalent training and/or experience. Hold an industry recognised information security qualification such as GIAC/GCIA/GCIH, CISSP or CompTIA Advanced Security Practitioner (CASP+) and/or SIEM-specific training and certification. An understanding and knowledge of compliance and regulatory frameworks such More ❯
basic XDR platforms. Familiar with OSINT techniques for threat intelligence and incident investigation. Holds or is working toward relevant certifications such as CISSP, CySA+, GCIH, and CASP, with a degree/diploma in Cyber Security or equivalent experience. Experienced in SOC environments and eligible for SC/DV clearance with More ❯
wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling More ❯
familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies. One or more cyber security certifications such as GCIA, GCIH, GCFA, GNFA, CEH, ECSA preferred ... More ❯
and Professional Experience University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH (Desirable). IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements Full Driving Licence. More ❯
and Professional Experience: University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH Desirable. IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements: Full Driving Licence. Fluent More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) ISO 27001 Lead Auditor or Implementer GIAC certifications (e.g., GIACCertifiedIncidentHandler - GCIH or GIAC Security Essentials - GSEC) What's in it for you? Join an ever-growing, market disrupting, global company where the teams - comprised of the More ❯
in the field of IT security monitoring and analysis, cyber threat analysis, and vulnerability analysis. A Global Information Assurance Certification (GIAC) CertifiedIncidentHandler (GCIH), GIACCertified Intrusion Analyst (GCIA), or equivalent certification would be advantageous. Intermediate knowledge of Information Security fundamentals, technologies, and design principles. Proven experience in securing More ❯
custom items. Required Qualifications, Skills, and Experience: 3 to 5 years of experience as a VAPT consultant. Certifications such as OSCP, OSCE, OSWE, GPEN, GCIH, GWAPT, GXPN, CREST, or similar. Experience with red teaming and internal VAPT drills. Familiarity with attacks including golden SAML attacks and constraint transfer attacks. Experience More ❯
experience Threat intelligence gathering and application Threat hunting execution Metrics creation and presentation. Technical and professional qualifications relevant to security incident response e.g. SANS GCIH or GCFA, or CertifiedIncident Responder Experience of detection and response within operational technology environments What we offer you Competitive Salary 18% Bonus Competitive Pension More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
MI5
a cyber security certification or education at a foundation level (for example, CompTIA A+, CompTIA Network,+, CompTIA Security+, OffSec, SOC200, GSEC, GCIA or GCIH certification). Alternatively, you will have 6 months experience in a cyber security role. Beyond your technical skills, you'll be an effective team worker … Candidates possessing cyber security relevant certifications or education at a foundation level (e.g. CompTIA A+, CompTIA Network,+, CompTIA Security+, OffSec, SOC200, GSEC, GCIA, GCIH) or 6 months experience in a cyber security role This will be assessed at CV sift. There is a wide range of extra support available More ❯
certifications like: Global Industrial Cybersecurity Professional (GICSP) Certified Information Systems Security Professional (CISSP) ISA/IEC 62443 Cybersecurity Fundamentals (IC32) GIACCertifiedIncidentHandler (GCIH) GIAC Cyber Incident Leader (GCIL) Personal: Besides the professional qualifications of the candidates, we place great importance in various forms of personality profile. These include More ❯
Job Description Cyber Threat Analyst Roles and Responsibilities Tier 2 Analyst You must hold a UK passport only due to security clearance requirements. Only single nationality applicants are accepted. (2nd passport holders, OCI & ILR candidates cannot be considered). You More ❯