. SC Clearance (essential); must be eligible for DV clearance . UK nationality only (sole nationality required for this role). Relevant certifications (e.g. CompTIA Security+, CySA+, AWS, MS, SANS, CISSP ) are desirable but not essential-hands-on experience is key. Security Clearance Requirements This role requires current SC clearance and eligibility for Developed Vetting (DV) . To meet More ❯
members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
IPS, micro-segmentation, and host security. Hands on experience with the following security products Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT and Cookie based authentication. Incident detection and response in MOD environments. Security compliance and regulatory More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling third-party vendors and external security partnerships for large More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. • Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & Access Management Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
Bolton, Lancashire, England, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
FPSG Connect
to hold security certification such as CISSP, CISM Desirable to hold PenTest certification such as CEH, GIAC Desirable to understand risk driven architecture such as Sherwood/SABSA/SANS Highly desirable to have exposure to DevSecOps functions. For clarification: This role is NOT GRC, neither is it a SOC role, rather it is more suited to a Security … Security Consultant, Security Architect, Security Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetration testing, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we More ❯
well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & Access Management Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident More ❯
SK10, Butley Town, Cheshire East, Cheshire, United Kingdom
Royal London
at the enterprise level. Demonstrated successful implementation of security control frameworks and standards such as ISO 27001, COBIT, ITIL, NIST. Certification in Information Security relevant areas such as CISSP, SANS and/or equivalent business experience in a matrix Organisation. High level of personal integrity with the ability to professionally handle highly sensitive and confidential situations. Ability to easily More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
Damco Spain SL
essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go More ❯
knowledge skills & competences: As a Domain Expert for SECO, the candidate must be an expert in software development security (methodologies) and associated tools. Must have technical experience: Vulnerabilities : - OWASP - SANS Threat modelling: STRIDE Development : - Proficient in at least one major programming language (Java/Javascript/Python/C#/Swift/Go) Public Cloud technology: - Azure - Azure DevOps More ❯