degree in Cybersecurity, Information Technology, or a STEM subject (or equivalent experience). Essential o Security Assurance certifications such as CCP, SIRA o Security certifications such as CISSP, SSCP, CISM, CRISC, CCSP, SABSA, or SANS GIAC (GSEC, GCCC, GCPM). o Demonstrable experience in designing and implementing secure infrastructure or cloud architectures. o Proven experience with risk assessment methodologies and More ❯
Reading, Berkshire, England, United Kingdom Hybrid/Remote Options
Certain Advantage
NIST CSF, CIS, COBIT , or equivalent. Strong client-facing skills, with the ability to communicate technical concepts to non-technical audiences. Relevant industry certifications such as CISSP, CISA, CRISC, CISM, or CISMP . Excellent communication skills and fluency in English. Desirable Degree in a related discipline (e.g. InformationSecurity, IT, Risk Management). Exposure across multiple industry sectors. Additional certifications More ❯
problem-solving, communication, and documentation skills Desirable Skills/Experience: Although not essential, the following skills are desired by the client: Preferred Qualifications Relevant certifications (e.g., CyberArk Defender, CISSP, CISM) Experience in cloud environments (AWS, Azure, GCP) and hybrid infrastructures Knowledge of DevSecOps practices and CI/CD pipeline integration If you are interested in this opportunity, please apply now More ❯
Computer Science, InformationSecurity, or a related field, or equivalent industry experience. Relevant certifications, including but not limited to: CertifiedInformation Systems Security Professional (CISSP) CertifiedInformationSecurityManager (CISM) CertifiedInformation Systems Auditor (CISA) Certified Ethical Hacker (CEH) CompTIA Security+ Systems SecurityCertified Practitioner (SSCP) Skills & Competencies - Behavioural Competencies: Adaptability to evolving business needs and risk profiles. Strong decision More ❯
Paddington, Sheldon Square, Greater London, United Kingdom Hybrid/Remote Options
Morson Edge
Computer Science, InformationSecurity, or a related field, or equivalent industry experience. Relevant certifications, including but not limited to: CertifiedInformation Systems Security Professional (CISSP) CertifiedInformationSecurityManager (CISM) CertifiedInformation Systems Auditor (CISA) Certified Ethical Hacker (CEH) CompTIA Security+ Systems SecurityCertified Practitioner (SSCP) Skills & Competencies - Behavioural Competencies: Adaptability to evolving business needs and risk profiles. Strong decision More ❯
assignments using well known security frameworks, standards and methodologies such as ISO27001, NIST CSF, CIS Top 18 and COBIT. Industry certifications such as CISSP/CISA/CRISC/CISM/CISMP. More ❯
assignments using well known security frameworks, standards and methodologies such as ISO27001, NIST CSF, CIS Top 18 and COBIT. Industry certifications such as CISSP/CISA/CRISC/CISM/CISMP. More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid/Remote Options
Tenth Revolution Group
security principles Knowledge of container security tools (Aqua, Twistlock, Trivy) Understanding of frameworks like NIST or ISO 27001 Excellent analytical and communication skills Bonus Points Certifications such as CISSP, CISM, or CKS Experience building MVPs or working in agile, early-stage environments Cloud security knowledge (AWS, Azure, or GCP) To apply for this role please submit your CV or contact More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Hays Specialist Recruitment Limited
and key stakeholders with a wide geographical reach Previous experience of working in a Technology Group function, consisting of several market units governed centrally Relevant Professional Certifications (CISSP/CISM/CRISC) Expert in how to do Risk Management, including putting together Risk heat maps Exceptional Stakeholder Management and communication skills Capability to build the IT & Cyber process and move More ❯
Sheffield, South Yorkshire, England, United Kingdom
KBC Technologies UK LTD
all levels. Demonstrated success in project governance, change management, and process improvement. Qualifications Degree in a technology-related discipline (e.g. BSc Computer Science ). Professional certifications such as CISA, CISM or equivalent (preferred). Additional audit certifications (e.g. ISO Lead Auditor ) desirable. Skills & Competencies Mandatory: GRC Process expertise . Excellent verbal and written communication skills. Ability to simplify complex technical More ❯
Manchester, Lancashire, England, United Kingdom Hybrid/Remote Options
Michael Page Technology
Extensive experience in security risk management, particularly in third-party and supplier contexts. Strong understanding of frameworks such as ISO27001, ISO27005, SOC2, and NIST. Holds certifications such as CISSP, CISM, or CRISC. Telecoms sector experience is a plus. Skilled in stakeholder engagement and translating technical risks into business language. Job Offer Discretionary bonus Private Medical Insurance Max. 6% pension contributed More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
Proactive Appointments
both technical and non-technical stakeholders. Key Responsibilities Security Governance & Risk Technical Security Oversight Supplier and Third-Party Security Assurance Advisory and Awareness Desirable Relevant certifications such as CISSP, CISM, CRISC, CEH, CompTIA Security+, or equivalent experience. Experience working in healthcare, charity, or public sector environments. Familiarity with NCSC CAF and NHS DSPT frameworks. Experience working with SOCs and incident More ❯
scope, priority, and impact, while making recommendations for efficient remediation. Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. To apply, please submit your latest CV for review. More ❯
IPS and vulnerability scanners. Experience in Protective Monitoring & SOC operation Experience in network security principles, firewalls, and access control mechanisms. Preferred Qualifications: - Industry certifications such as CompTIA Security+, CISSP, CISM, CEH, or GIAC are highly desirable. To apply, please submit your latest CV for review. More ❯
Coventry, West Midlands, England, United Kingdom Hybrid/Remote Options
Lorien
identity lifecycle management, Zero Trust, and governance compliance. Financial services or regulated environment experience preferred. Desirable skills Familiarity with Agile delivery methodologies. SailPoint certification Identity Security Cloud Engineer, CISSP, CISM, or similar. Collaboration experience with MS Teams\Zoom collaboration. Identity AI adoption for risk-based access analytics and behavioural anomaly detection. Should this position be of interest please submit your More ❯
cloud platforms such as Azure, GCP or AWS. Proficiency in any programming languages . Professional certifications in CyberArk and/or informationsecurity (e.g., CyberArk Defender, CyberArk Sentry, CISSP, CISM) Must have CyberArk Implementation hands on experience. Privileged Access Management tool technical certification More ❯