cyber intelligence. * Strong technical background in cybersecurity, including hands-on experience in security monitoring, threat detection, and digital forensics. * Certifications such as GCTI, GCIA, GCIH, CISSP, or equivalent (preferred). * Experience working with global teams and managing security incidents across multiple regions. * Knowledge of cloud security (AWS, Azure, GCP) and More ❯
cyber intelligence. * Strong technical background in cybersecurity, including hands-on experience in security monitoring, threat detection, and digital forensics. * Certifications such as GCTI, GCIA, GCIH, CISSP, or equivalent (preferred). * Experience working with global teams and managing security incidents across multiple regions. * Knowledge of cloud security (AWS, Azure, GCP) and More ❯
common intrusion methods and cyber-attack tactics, techniques, and procedures (TTPs). Have at least one certification involving incident response, ethical hacking, cyber security (GCIH, E CEH, E CIH), or network forensics (GIAC Network Forensic Analyst (GNFA), NICCS Certified Network Forensics Examiner (CNFE . Hold one Security Management certification (ISC2 More ❯
hampshire, south east england, United Kingdom Hybrid / WFH Options
Computappoint
response, threat intelligence, and multi-tenant SOCs Excellent leadership, communication, and client engagement skills Bonus Points for Certifications such as CISSP, CISM, GIAC (GSOM, GCIH), Microsoft SC-200 Experience in MSP or MSSP environments Passion for continuous learning and innovation in cybersecurity Why Join Us? ✅ Work with industry-leading tech More ❯
and ISO 27001. 🎓 Qualifications & Certifications Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience. Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+. 🌟 Why Work With Us? 💸 Competitive Salary & comprehensive benefits package. 🎓 Professional Development support, including certification sponsorship. 🏡 Flexible Working – hybrid options available. 🧠 Innovative More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
and ISO 27001. 🎓 Qualifications & Certifications Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience. Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+. 🌟 Why Work With Us? 💸 Competitive Salary & comprehensive benefits package. 🎓 Professional Development support, including certification sponsorship. 🏡 Flexible Working – hybrid options available. 🧠 Innovative More ❯
Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are More ❯
Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are More ❯
Andover, Hampshire, United Kingdom Hybrid / WFH Options
Deloitte - Recruitment
from both an analyst and engineering perspective (Monitoring, Use Case and content creation, upgrades and troubleshooting). Ideally have professional certification such as GIACGCIH, CISSP, CISM or ISO 27001. Experience working in a Defence environment. Experience of managing and/or mentoring technical personnel. Knowledge of on-boarding new More ❯
are/have: Fluency in both speaking and writing English Third Level qualification (or equivalent) in information technology, Information Security or Engineering CISSP, CCSP, GCIH, GIAC (SANS), CCNP, Splunk certificates and/or other relevant security/Network type engineering certifications Experience of analysis and correlation toolsets. Including data extraction More ❯
proactive risk management. - Certifications (Preferred): - Certified Information Systems Security Professional (CISSP) - Certified Information Security Manager (CISM) - GIAC Security Operations Certified (GSOC) - CertifiedIncidentHandler (GCIH) Additional Information: - Work Environment: - This role may require availability outside of standard business hours, including evenings and weekends, to respond to critical security incidents. - The More ❯
Information Systems, related field or equivalent training and/or experience. Hold an industry recognised information security qualification such as GIAC/GCIA/GCIH, CISSP or CompTIA Advanced Security Practitioner (CASP+) and/or SIEM-specific training and certification. An understanding and knowledge of compliance and regulatory frameworks such More ❯
basic XDR platforms. Familiar with OSINT techniques for threat intelligence and incident investigation. Holds or is working toward relevant certifications such as CISSP, CySA+, GCIH, and CASP, with a degree/diploma in Cyber Security or equivalent experience. Experienced in SOC environments and eligible for SC/DV clearance with More ❯
and Professional Experience University Degree/Diploma in Cyber Security or Equivalent experience Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH Desirable IT certifications such as CASP or ITIL Experience in a SOC or SOC equivalent SC/DV clearance Other Requirements Be willing to undertake More ❯
wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling More ❯
familiarity with standard security frameworks such as MITRE, cyber kill chain and APT campaign strategies. One or more cyber security certifications such as GCIA, GCIH, GCFA, GNFA, CEH, ECSA preferred ... More ❯
and Professional Experience University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH (Desirable). IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements Full Driving Licence. More ❯
and Professional Experience: University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH Desirable. IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements: Full Driving Licence. Fluent More ❯
ATT&CK Bonus: You've worked with version control for detection rules, or done some detection-as-code ✅ Nice-to-Haves Certs like GCIA, GCIH, CEH, GNFA, GCFA Familiarity with frameworks like Sigma or KQL A side interest in threat hunting or malware behavior 📈 What You’ll Impact How quickly More ❯
and log analysis. - University Degree/Diploma in Cyber Security or Equivalent experience - Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH To be considered please submit an up to date CV. Due to the nature and urgency of this post, candidates holding or who have held More ❯
Managed security service provider (MSSP) experience is a plus Certifications or work toward any of the following is strongly desired: GIACCertifiedIncidentHandler (GCIH) GIACCertified Intrusion Analyst (GCIA) GIACCertified Forensic Analyst (GCFA) GIACCertified Forensic Examiner (GCFE) GIAC Network Forensic Analyst (GNFA) Cisco Certified Network Associate (CCNA More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯