vulnerability management best practices. Hands-on experience with SIEM tools (e.g., Splunk, QRadar, Sentinel), vulnerability scanners (e.g., Nessus, Qualys), and other security platforms. Relevant certifications such as CISSP, CISM, CEH, GIAC, or GCIA are highly desirable. Excellent problem-solving, communication, and team leadership skills. Ability to work under pressure and manage multiple priorities effectively. Preferred Skills: Experience in regulated industries More ❯
priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. To apply, please submit your latest CV for review. More ❯
and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or CertifiedEthicalHacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live mission-critical networks More ❯
and non-technical stakeholders. Qualifications: Relevant certifications such as Cisco CCNA (or above), CompTIA Security+, Certified Information Systems Security Professional (CISSP), or CertifiedEthicalHacker (CEH) are preferred. Experience: We are looking for candidates with experience in: Assessing network infrastructure requirements and associated cyber security controls. Hands-on configuration and maintenance of live mission-critical networks More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Experis
Collaboration - Work with IT and security teams to improve overall cybersecurity posture. Required Skills & Qualifications Technical Expertise - Strong knowledge of SIEM platforms, network security, and cybersecurity frameworks. Certifications - CISSP, CEH, GIAC, or vendor-specific SIEM certifications. Programming & Scripting - Familiarity with Python, PowerShell, or other scripting languages. Analytical Thinking - Ability to analyze large datasets and identify security threats. Communication Skills - Ability More ❯
security solutions in cloud, on-prem, and hybrid environments Strong background in infrastructure, networking, and systems hardening Familiar with regulatory and compliance frameworks Relevant certifications such as CISSP, CISM, CEH, or equivalent Strong communicator and critical thinker who thrives in fast-paced environments Join us to make a tangible impact on our clients cyber resilience. Interested? Please Click Apply Now More ❯
security solutions in cloud, on-prem, and hybrid environments Strong background in infrastructure, networking, and systems hardening Familiar with regulatory and compliance frameworks Relevant certifications such as CISSP, CISM, CEH, or equivalent Strong communicator and critical thinker who thrives in fast-paced environments Join us to make a tangible impact on our clients cyber resilience. Interested? Please Click Apply Now More ❯
KQL queries, analytic rules, data connectors, workbooks, etc. Proficiency with LogRhythm SIEM : AI Engine rules, SmartResponse, log source integration. Certifications such as Microsoft SC-200 , LogRhythm Certified Professional , CEH , GCIA , or CISSP are a plus. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
crisis situations and leading diverse teams. * Strong English writing and verbal communication skills. * Attention to detail and ability to build high-performing teams. * Relevant certifications (e.g., CISSP, CISM, CSSLP, CEH). * Valid right to work in the UK and eligibility for UK SC clearance Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
CySA+) or a similar certification GIAC Cyber Threat Intelligence (GCTI) or a similar certification GIAC Reverse Engineering Malware (GREM) or a similar certification CertifiedEthicalHacker (CEH) Offensive Security Certified Professional (OSCP) or a similar certification*HM will accept 2 of the above qualifications* Data analysis and visualisation Understanding of Cybersecurity Concepts and Threat Intelligence Internet More ❯