etc.). Demonstrated experience leading security incident investigations and crisis response. Excellent leadership, communication, and project management skills. Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly preferred. P r eferred Skills: Experience managing global SOC operations. Familiarity with cloud security operations (AWS, Azure, GCP). Proficiency with More ❯
skills for technical and non-technical audiences. Proficiency in MS Office and data visualisation tools like Power BI. Continual professional development and certifications (CISSP, GIAC, CISA, CISM) desirable. More ❯
skills for technical and non-technical audiences. Proficiency in MS Office and data visualisation tools like Power BI. Continual professional development and certifications (CISSP, GIAC, CISA, CISM) desirable. More ❯
skills for technical and non-technical audiences. Proficiency in MS Office and data visualisation tools like Power BI. Continual professional development and certifications (CISSP, GIAC, CISA, CISM) desirable. More ❯
Bachelor's Degree in Computer Science, Information Technology, Information Security or similar, or equivalent industry experience. Industry certifications such as:CISSP/CISM,SANS GIAC Certifications, C.E.H/L.P.T,Other relevant certs OUR RECRUITMENT PROCESS: Initial Screening: A quick chat with our Talent Acquisition Partner to understand your background and More ❯
a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Security certifications such as CompTIA Security +, CISSP, CISA, CRISC, CCNA, GIAC, or equivalent or working towards certification is preferred. Knowledge of Risk Management life cycles based on an established framework: ISO 27001, SANS, NIST SP More ❯
reports and situational awareness updates Review escalations and follow incident response plans Conduct trend analysis and develop defense signatures Desired Skills: Certifications such as GIAC, GCIH, GCIA, ITIL Familiarity with NIST frameworks, Cyber Kill Chain Experience with case management, SOAR, SIEM, EDR tools Experience with multinational organizations and automation scripting More ❯
and with the newest trends in cyber security area. Professional training and acquisition of crucial security certificates - from Offensive Security through ISC2, SANS and GIAC certifications. Access to the forefront cyber security products and solutions. Variety of competitive benefits, certifications and trainings to strengthen your skills either in your workplace More ❯
Linux). Familiarity with common security frameworks and compliance requirements (e.g., NIST, ISO 27001, GDPR, PCI-DSS) Relevant certifications (e.g., CEH, OSCP, CISSP, CISM, GIAC) are strongly preferred. More ❯
dynamic environment Education and Experience Required BS/BA in Computer Science, Engineering, or a related technical field Security-related certifications preferred (CISSP, CEH, GIAC, etc.) Experience in enterprise security solutions, technical consulting, or sales engineering Competitive compensation Community-driven culture with employee events Generous time off Comprehensive private insurance More ❯
Requirements: Must hold or be eligible to achieve a minimum of Security Clearance (SC) level. Nice to have certifications (e.g., SC-200, AZ-500, GIAC) are desirable. Strong problem-solving and analytical skills. Excellent communication for clear documentation and team collaboration. Please follow Wheaton's Law. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
The Guide Dogs for the Blind Association
You should have or be working towards professional security and technical certifications such as CISSP, CISA, CCNA, SSCP, CEH, or CREST CPSA/CRT, GIAC . Knowledge of Microsoft security suite, vulnerability scanning, working knowledge of network infrastructure or scripting languages like Python and PowerShell would be advantageous. More than More ❯
south west london, south east england, United Kingdom Hybrid / WFH Options
The Guide Dogs for the Blind Association
You should have or be working towards professional security and technical certifications such as CISSP, CISA, CCNA, SSCP, CEH, or CREST CPSA/CRT, GIAC . Knowledge of Microsoft security suite, vulnerability scanning, working knowledge of network infrastructure or scripting languages like Python and PowerShell would be advantageous. More than More ❯
west london, south east england, United Kingdom Hybrid / WFH Options
The Guide Dogs for the Blind Association
You should have or be working towards professional security and technical certifications such as CISSP, CISA, CCNA, SSCP, CEH, or CREST CPSA/CRT, GIAC . Knowledge of Microsoft security suite, vulnerability scanning, working knowledge of network infrastructure or scripting languages like Python and PowerShell would be advantageous. More than More ❯
Analyst Certification Microsoft Certified Security Operations Analyst Associate EC-Council ECIH (Incident Handling) Multi-cloud Security Fundamentals training (AWS/Azure/GCP) GCIH (GIAC Certified Incident Handler) What’s on offer?: Gym Membership Scheme Holidays – starting at 24 days + Bank Holidays Pension Plan Ongoing training and development, with More ❯
Analyst Certification Microsoft Certified Security Operations Analyst Associate EC-Council ECIH (Incident Handling) Multi-cloud Security Fundamentals training (AWS/Azure/GCP) GCIH (GIAC Certified Incident Handler) What’s on offer?: Gym Membership Scheme Holidays – starting at 24 days + Bank Holidays Pension Plan Ongoing training and development, with More ❯
engineering or architect role. Experience leading technical teams or acting as a technical lead on security initiatives. Certifications such as AZ-500, CISSP, CCSP, GIAC, or similar highly advantageous. Engineer-first mentality: solves security problems through systems thinking and automation. Strategic, yet pragmatic: balances best practice with business context. Proactive More ❯
CISM, CISA, CISSP, CCSP, Microsoft certifications (MS-500, AZ-500, AZ-700, SC-200, SC-300), CompTIA Security+ and Cloud+, Cloud Security Alliance CCSK, GIAC CTI, GIAC CFR Benefits £45,000 - £60,000 per annum Generous Pension Scheme - We invest in your future with employer contributions of up to More ❯
CISM, CRISC, CISA, ITCA) . Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) . Information Systems Security Architecture Professional (ISSAP) . GIAC Security Leadership Certificate (GSLC) . Information Systems Security Engineering Professional (ISSEP) . Informationassurance system architecture and engineer (IASAE) . It's a prerequisite to More ❯
security best practice approaches. Passion for security testing and continual development within this area. Related Industry accreditations such as CREST, Offensive Security, SANS/GIAC or equivalent recognised qualifications with relevant IT Security experience Experience at managing and/or conducting a wide range of testing in different environments with More ❯
South Croydon, London, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
security best practice approaches. Passion for security testing and continual development within this area. Related Industry accreditations such as CREST, Offensive Security, SANS/GIAC or equivalent recognised qualifications with relevant IT Security experience Experience at managing and/or conducting a wide range of testing in different environments with More ❯
security best practice approaches. * Passion for security testing and continual development within this area. * Related Industry accreditations such as CREST, Offensive Security, SANS/GIAC or equivalent recognised qualifications with relevant IT Security experience * Experience at managing and/or conducting a wide range of testing in different environments with More ❯
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. So, if you feel your skills and experience align More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯