Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
NIST CSF, ISO 27001), regulatory requirements (NIS2, GDPR), and OT standards (IEC 62443, OG86). • Strong vendor and stakeholder management skills. Preferred: • Professional certifications such as CISSP, CISM, or SANS GIAC. • Deep understanding of both enterprise IT and industrial control systems (ICS/SCADA) in upstream energy. • Proven experience in managing SOC operations, incident response, and threat intelligence. What More ❯
Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and hybrid architectures. Bonus Points For: Certifications such as CISSP, CISM, or SANS GIAC. Experience in MSSP environments or large-scale enterprise SOCs. Knowledge of automation and scripting (Python, PowerShell, etc.). Why This Role? Work on high-impact projects with real More ❯
Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and hybrid architectures. Bonus Points For: Certifications such as CISSP, CISM, or SANS GIAC. Experience in MSSP environments or large-scale enterprise SOCs. Knowledge of automation and scripting (Python, PowerShell, etc.). Why This Role? Work on high-impact projects with real More ❯
london (city of london), south east england, united kingdom
Anson McCade
Ability to engage with both technical and non-technical stakeholders. Familiarity with cloud environments (Azure, AWS, GCP) and hybrid architectures. Bonus Points For: Certifications such as CISSP, CISM, or SANS GIAC. Experience in MSSP environments or large-scale enterprise SOCs. Knowledge of automation and scripting (Python, PowerShell, etc.). Why This Role? Work on high-impact projects with real More ❯
crucial. In addition to the above the following are desirable: Consulting background. Understanding of malware and the modern threat landscape. Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, EC-Council etc. or equivalent). Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.). Role based More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
crucial. In addition to the above the following are desirable: Consulting background. Understanding of malware and the modern threat landscape. Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, EC-Council etc. or equivalent). Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.). Role based More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Oliver James
across different locations and levels of experience. Desirable Qualifications Previous consulting experience or working with enterprise clients. Relevant industry certifications (e.g. CISSP, CISM, GCIH, GCIA, Microsoft Security , or other SANS/GIAC accreditations). Experience with DevOps tooling (e.g. Git, Azure DevOps, Jenkins, Kubernetes, Ansible). Knowledge of role-based access control (RBAC) and modern access governance principles. Remote More ❯
IDS/IPS, SIEM and Wireless security. Knowledge of information security principles and best practices. Experience in managing information security risk. Familiar with information security frameworks such as NIST, SANS Top 20 CSC, OWASP, ISO27001, and CyberEssentials. Proven working knowledge of industry IT compliance standards, particularly in design and implementation. Understanding of Operational Technology and the challenges involved in More ❯
IDS/IPS, SIEM and Wireless security. Knowledge of information security principles and best practices. Experience in managing information security risk. Familiar with information security frameworks such as NIST, SANS Top 20 CSC, OWASP, ISO27001, and CyberEssentials. Proven working knowledge of industry IT compliance standards, particularly in design and implementation. Understanding of Operational Technology and the challenges involved in More ❯
members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT More ❯
well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. • Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & Access Management Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident More ❯
Experience in technology audit, infrastructure, or resilience risk areas. Degree in Computer Science, Engineering, IT, or related field. Relevant audit and technology certifications (e.g., CISA, CGEIT, CISSP, CISM, CompTIA, SANS, ISC2). Hold the right to work in the UK is mandatory. Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go More ❯
Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
La Fosse
and ensure integration with SIEM and monitoring systems. Demonstrated proficiency in network/system security (firewalls, IDS/IPS, micro-segmentation), IAM (RBAC, ABAC, JWT), secure coding practices (OWASP, SANS), and hands-on experience with tools like Trellix, Ivanti, ClearSwift. Deep knowledge of Kubernetes and container security (RBAC, network policies, runtime protection), CI/CD pipeline hardening (Git, SonarQube More ❯
in IT/Information Security with a strong focus on security architecture across diverse platforms 2+ years of leadership experience managing security architecture teams Professional certification (CISSP, CCSP, or SANS GIAC) Extensive experience designing secure architectures in cloud, on-premises, and hybrid environments Global organisation experience Audit and compliance expertise Exceptional communication skills with the ability to influence at … all levels Desirable Computer Science degree or related field Additional certifications (CISA, CISM, CCIE, CRISC, SANS credentials) Legal or professional services sector experience What's On Offer Competitive salary (£110-135k) and comprehensive benefits package Opportunity to work on high-profile, industry-shaping matters First-rate training and development programs Inclusive, supportive working environment Flexible working arrangements focused More ❯
to detect, response and utilise related platform and applications to perform cyber security initiatives. Qualifications Essential Masters level degree or equivalent level of experience. Evidence of continuous professional development. SANS FOR508 GCFA/SANS SEC504 GCIH Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such it More ❯
of endpoint security; ability to ensure security compliance of endpoint devices in various circumstance. Qualifications Essential Masters level degree or equivalent level of experience. Evidence of continuous professional development. SANS FOR572/GIAC GNFA or SANS FOR508/GIAC GCFA Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order More ❯