Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note applications are likely to close soon so please act quickly if you would like to be considered. More ❯
Cyber Security, Engineering, or a related field. Formal project management training: PRINCE2 Practitioner , APM PMQ , or Agile Project Management . Additional certifications desirable: ITIL , Lean Six Sigma , Change Management , CISSP , CISM , or CompTIA Security+ . Please note applications are likely to close soon so please act quickly if you would like to be considered. More ❯
Skills/Experience Although not essential, the following skills are desired by the client: Qualifications & Certifications: ? Masters or doctorate degree in cybersecurity, computer science, software engineering, or related field. ? CISSP/CISM certification or other broad cybersecurity industry-recognised certificate. ? SABSA or TOGAF certified preferred. If you are interested in this opportunity, please apply now with your updated CV More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
processes, and technology effectively Strong influencing and negotiation skills; able to motivate others Experience driving cultural and behavioural change You will also benefit from having: Recognised IS qualification (e.g. CISSP, CISM) or relevant degree/experience in InformationSecurity Experience in operational or strategic leadership within commercial or regulated environments Skilled in managing informationsecurity incidents and investigations Good More ❯
and single sign-on across different organisations or domains. Securing, controlling, and monitoring access to critical systems by privileged users. Implementing secure authentication mechanisms like Kerberos, OAuth, and SAML. CISSP/CISM certification SABSA or TOGAF certified preferred If you are interested in this opportunity, please apply now with your updated CV in Microsoft Word/PDF format. Disclaimer More ❯
Penwortham, Lancashire, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
across the business - Technical documentation creation - Mentoring junior members of the team - The ability to obtain UK Government security clearance to SC - Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ - Cyber security framework knowledge such as MITRE ATT&CK Qualifications: Relevant IT degree or business degree or equivalent experience PREFERRED For more information please contact Lauren More ❯
Preston, Lancashire, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
across the business - Technical documentation creation - Mentoring junior members of the team - The ability to obtain UK Government security clearance to SC - Relevant industry and vendor qualifications such as CISSP, CISM, CompTIA security+ - Cyber security framework knowledge such as MITRE ATT&CK Qualifications: Relevant IT degree or business degree or equivalent experience PREFERRED For more information please contact Lauren More ❯
Cloud native toolings. Assisting in preparation of demonstrable journeys on the configured PAM tooling Qualifications & Certifications: Masters or doctorate degree in cybersecurity, computer science, software engineering, or related field. CISSP/CISM certification or other broad cybersecurity industry-recognised certificate. SABSA or TOGAF certified preferred. Platform & Technology: BizzDesign, Archi, or generic UML visualisation experience for high-level designs. High More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
KBC Technologies UK LTD
Proficiency in authentication protocols (Kerberos, OAuth, SAML) and federated identity management . Experience in enterprise & solution architecture, with strong communication skills across technical and non-technical SMEs. Qualifications & Tools CISSP/CISM certification required; SABSA/TOGAF preferred. Working proficiency with Confluence (documentation) and JIRA (task management). 8–10 years of relevant experience. Apply now or reach out More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
8+ years of experience in informationsecurity, with a focus on technical cyber security. Minimum of 5 years' experience in a network/cloud security environment. Certifications such as CISSP, CCSP, OSCP, SANS or equivalent. Certification in one or more cloud vendor offerings (AWS, GCP, Azure, OCI). More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
ITIL Foundation certified. Strong stakeholder management and communication skills. High attention to detail and ability to manage multiple priorities. Proficiency with Microsoft Office tools. Desirable Skills: Security certifications (e.g., CISSP, CISM). Experience with Unix/Windows systems. Knowledge of PKI, certificate management, and compliance standards. Familiarity with SharePoint, Confluence, and JIRA. Project/change management experience. To apply More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
VANLOQ LIMITED
with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications Masters or Doctorate in Cybersecurity, Computer Science, Software Engineering, or related discipline. Industry certifications such as CISSP, CISM, SABSA, or TOGAF. Contract Details Duration: 6 months (potential extension) Location: Sheffield hybrid working (3 days per week on-site) IR35: Inside More ❯
/PAM architecture (e.g., CyberArk, Delinea, OneIdentity). Strong understanding of solution design, risk management, and technical governance. Proficiency with tools like BizzDesign, Jira, and Confluence. Relevant certifications (e.g., CISSP, CISM) are desirable. Please click here to find out more about our Key Information Documents. Please note that the documents provided contain generic information. If we are successful in More ❯
protect organisational data. Proven knowledge of techniques, approaches, and processes of digital threats; ability to detect, monitor, analyse and prevent digital threats. Qualifications Essential CertifiedInformationSystemsSecurityProfessional (CISSP) - or equivalent knowledge Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order) 1975 and as such it will be necessary for More ❯