specific certifications (AWS, Azure, Microsoft, GCP, Palo Alto, CrowdStrike, Tenable) are advantageous. OT/ICS/SCADA-focused certifications: IEC 62443, GRID/GRID+ (SANS/GIAC), GICSP, or equivalent industrial cybersecurity training are desirable. Essential skills Strong understanding of core cybersecurity principles, risk management, and control implementation in More ❯
Degree Level qualification(s) in: Computer Science, Computer Security or Computer Forensics (or equivalent/extensive industry experience). Professional industry recognised certifications e.g. SANS, CEH, RHCE, CISSP, CISM etc. or equivalent experience. Good understanding of ITIL principles and able to apply them. More ❯
against/implementing multiple security standards and frameworks, such as ISO 27001/2, NIST CSF, ISF CMMI, CIS, UK Govt/Defence standards, SANS Ability to translate technical requirements and their benefits to a non-technical audience and appeal to relevant stakeholders Experience in the production and briefing More ❯
learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge More ❯
IT and security best practice approaches. * Passion for security testing and continual development within this area. * Related Industry accreditations such as CREST, Offensive Security, SANS/GIAC or equivalent recognised qualifications with relevant IT Security experience * Experience at managing and/or conducting a wide range of testing in More ❯
learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge More ❯
clients and with the newest trends in cyber security area. Professional training and acquisition of crucial security certificates - from Offensive Security through ISC2, SANS and GIAC certifications. Access to the forefront cyber security products and solutions. Variety of competitive benefits, certifications and trainings to strengthen your skills either in More ❯
knowledge of internet protocols, firewalls, proxies, and intrusion detection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (Global Information Assurance Certification) Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), Critical Infrastructure More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Vantage Data Centers
knowledge of internet protocols, firewalls, proxies, and intrusion detection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (Global Information Assurance Certification) Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), Critical Infrastructure More ❯
working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
working knowledge of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
security products such as Trellix, Ivanti, ClearSwift and Yubikey will be a bonus Experience working with secure coding practices and vulnerabilities (OWASP Top 10, SANS Top 25) Security compliance and regulatory frameworks (e.g., NIST, CIS Benchmarks) Experience working with DevOps tools (e.g. Kubernetes, CI/CD pipelines, Ansible, Terraform More ❯
security products such as Trellix, Ivanti, ClearSwift and Yubikey will be a bonus Experience working with secure coding practices and vulnerabilities (OWASP Top 10, SANS Top 25) Security compliance and regulatory frameworks (e.g., NIST, CIS Benchmarks) Experience working with DevOps tools (e.g. Kubernetes, CI/CD pipelines, Ansible, Terraform More ❯
south west london, south east england, united kingdom
IO Associates
security products such as Trellix, Ivanti, ClearSwift and Yubikey will be a bonus Experience working with secure coding practices and vulnerabilities (OWASP Top 10, SANS Top 25) Security compliance and regulatory frameworks (e.g., NIST, CIS Benchmarks) Experience working with DevOps tools (e.g. Kubernetes, CI/CD pipelines, Ansible, Terraform More ❯
non-technical audience You stay up to date with industry trends and competitive solutions, products, and services You have industry certifications - e.g. CISSP, CCIE, SANSMore ❯
opportunities to improve the overall controls around data security. Keep informed of new and updated industry frameworks and regulations: GDPR, ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, SP 800-53, PFMI, CPMI ISOCO and FFIEC handbook. Keep informed of new and emerging security threats … CRISC, CCNA, GIAC, or equivalent or working towards certification is preferred. Knowledge of Risk Management life cycles based on an established framework: ISO 27001, SANS, NIST SP 800-53, CERT, ENISA. Working knowledge of the following frameworks and regulations: ISO 27001/2, SANS Top 20 Critical Security More ❯
experience and knowledge with any combination of the following: Threat modelling and risk assessments Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ) Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2) Working knowledge of cryptography … security into existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication More ❯
ensemble. GSK est un employeur garantissant l'égalité des chances. Cela garantit que tous les candidats qualifiés recevront une considération égale pour l'emploi sans distinction de race, de couleur, de religion, de sexe (y compris la grossesse, l'identité de genre et l'orientation sexuelle), de statut parental … GSK. En l'absence de cette autorisation écrite, toute action entreprise par l'entreprise/agence de recrutement sera considérée comme ayant été effectuée sans le consentement ou l'accord contractuel de GSK. GSK ne sera donc pas responsable des frais découlant de telles actions ou des frais découlant More ❯