Crawley, England, United Kingdom Hybrid / WFH Options
DGH Recruitment
cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information Security Specialist (Information Security and Cyber Security More ❯
Crawley, West Sussex, South East, United Kingdom Hybrid / WFH Options
DGH Recruitment
cybersecurity tools. - Experience conducting or supporting internal security audits or assessments. - Solid understanding of IT infrastructure (e.g. networking, Active Directory, endpoint security). - Certifications such as CISSP, CISM, CISA, Security+, or equivalent (highly advantageous) Information Security Lead In accordance with the Employment Agencies and Employment Businesses Regulations 2003, this position is advertised based upon DGH Recruitment Limited having first More ❯
placement within the term of the finance agreement. Step 1 - Accredited Online Training The first step is completing a selection of professional, accredited and industry recognised courses from CompTIA which is the global leader in IT Technician, Networking and Cybersecurity training. The training is delivered via multimedia rich video tutorials, practice labs, presentations and quizzes through a portal … is what line managers need you to have to be effective and confident in your role. Step 3 - Official exams You will then go on to sit the CompTIA A+ and the CompTIA Network+ exams to give you the official certifications which will be recognised not only in the UK, but worldwide. The CompTIA … is specifically designed to qualify you to move into the cybersecurity field. This official, accredited training consists of online training, practical training and an official exam (CompTIASecurity+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once More ❯