of ISO 27001 beneficial but not essential. Understanding of UK data protection law and its practical application within a security programme. Security certifications (e.g. CISSP, CISM, CCSP, GIAC/SANS, AWS Security Specialty, or similar) are a plus. Ability to build effective working relationships across technical and non-technical stakeholders. Strong analytical, communication, and problem-solving skills. Experience supporting More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … with external parties. You will stand out if you bring Bachelors degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … external parties. You will stand out if you bring Bachelor's degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
vulnerability management program Strong technical expertise in implementing a Prioritizationformula to vulnerabilities and misconfigurations and translating these into risks Excellent knowledge of Vulnerability Management frameworks such as NIST/SANS The following general characteristics are required: A team player with the ability to work independently and unsupervised Ability to own delegated tasks and see them through to completion Ability More ❯
and providing remediation options for application and technology risks Knowledge of Agile methodologies is a must Knowledge of backend and frontend web application vulnerabilities Knowledge of OWASP Top 10, SANS Top 25 etc Experience working in AWS/Azure/GCP would be beneficial Knowledge of Ci/CD pipelines Thorough understanding of SAST, DAST (including fuzzing), endpoint and More ❯
should also have a proven experience and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital … and IAST tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we More ❯
large-scale computing, modeling, cybersecurity, and anomaly detection. OR a Master's Degree in Statistics, Mathematics, Computer Science, or a related field. Certifications such as Lenel, CISSP, CISA, CISM, SANS, GCIA, GCIH, OSCP, Security+. Microsoft is an equal opportunity employer. All qualified applicants will receive consideration without regard to age, ancestry, color, family or medical leave, gender identity or More ❯
. SC Clearance (essential); must be eligible for DV clearance . UK nationality only (sole nationality required for this role). Relevant certifications (e.g. CompTIA Security+, CySA+, AWS, MS, SANS, CISSP ) are desirable but not essential-hands-on experience is key. Security Clearance Requirements This role requires current SC clearance and eligibility for Developed Vetting (DV) . To meet More ❯
members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT More ❯
on efficiency, automation, and continuous improvement. Strong documentation skills and experience working in cross-functional teams (e.g., HR, Legal, Risk). Relevant certifications preferred: ITPM, GCITP, PMP, CISSP, GCIH, SANS, GIAC Additional Information Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
IPS, micro-segmentation, and host security. Hands on experience with the following security products Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT and Cookie based authentication. Incident detection and response in MOD environments. Security compliance and regulatory More ❯
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling third-party vendors and external security partnerships for large More ❯
projects. - Have a passion to learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge of Linux/Unix tools More ❯
internal product and engineering teams Occasional travel may be required ( Strong problem-solving, written and oral communication skills in English Bonus Points: Recent (last 3 years) industry certifications with SANS, ISC2, Amazon, Microsoft, Google and other organizations within the Information Security domain Long term (6 months min) recent experience within a SOC performing analysis and triage of security incidents More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. • Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & Access Management Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident More ❯
PREFERRED QUALIFICATIONS - Experience triaging and developing security alerts and response automation, conducting front-line analysis, and providing escalation support. - 3+ years of information security experience. - Relevant industry certifications from SANS, ISC2, etc. - Strong demonstrated knowledge of Unix tools and architecture. - Experience working as part of a Computer Security Incident Response Team (CSIRT) - Familiarity/experience with AWS services and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
Bolton, Lancashire, England, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯