of ISO 27001 beneficial but not essential. Understanding of UK data protection law and its practical application within a security programme. Security certifications (e.g. CISSP, CISM, CCSP, GIAC/SANS, AWS Security Specialty, or similar) are a plus. Ability to build effective working relationships across technical and non-technical stakeholders. Strong analytical, communication, and problem-solving skills. Experience supporting More ❯
technologies to monitor and protect data and equipment from attacks.We're Looking for Teammates With: Bachelor's degree in computer science or a related field is required. CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity More ❯
vulnerability management program Strong technical expertise in implementing a Prioritizationformula to vulnerabilities and misconfigurations and translating these into risks Excellent knowledge of Vulnerability Management frameworks such as NIST/SANS The following general characteristics are required: A team player with the ability to work independently and unsupervised Ability to own delegated tasks and see them through to completion Ability More ❯
members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT More ❯
on efficiency, automation, and continuous improvement. Strong documentation skills and experience working in cross-functional teams (e.g., HR, Legal, Risk). Relevant certifications preferred: ITPM, GCITP, PMP, CISSP, GCIH, SANS, GIAC Additional Information Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
IPS, micro-segmentation, and host security. Hands on experience with the following security products Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT and Cookie based authentication. Incident detection and response in MOD environments. Security compliance and regulatory More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
projects. - Have a passion to learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge of Linux/Unix tools More ❯
understanding of both common and emerging vulnerabilities including their manifestation in different architectures (web applications, thick clients, APIs, networked infrastructure etc) Familiarity with industry standard guidance OWASP Top 10, SANS Top 25, NIST/CSC, CIS, NCSC etc. Applied understanding of topics such as authentication, access control, encryption, cloud security, operating system security, network security, database security. Experience of More ❯
Experience in technology audit, infrastructure, or resilience risk areas. Degree in Computer Science, Engineering, IT, or related field. Relevant audit and technology certifications (e.g., CISA, CGEIT, CISSP, CISM, CompTIA, SANS, ISC2). Hold the right to work in the UK is mandatory. Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates More ❯
a relevant field, such as cyber/information security, psychology/behavioural science, engineering or communications. Professional certification in human risk management, cyber security, or related fields, such as SANS Security Awareness Professional (SSAP), Infosec Certified Security Awareness Practitioner (CSAP), NICCS Certified Cybersecurity Awareness Professional (CCAP), CISSP, CISM While certifications are not mandatory, a demonstrable commitment to professional development More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … with external parties. You will stand out if you bring Bachelors degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … external parties. You will stand out if you bring Bachelor's degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
to meetorganisational objectives. Abilityto work calmly and effectively under pressure and have a can-do attitude. Broadcyber certifications or equivalent such as Cyber Foundation Pathway, CompTIA(N+, S+, CySA+), SANS (GSEC, GCIH, GMON, GCDA), Systems Administrations (ActiveDirectory), CISCO (CCNA, CCNP) and risk management. Working knowledge of Defence Joint Service Publications (440, 441,604). More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go More ❯
software and development Proficiency in securing cloud technologies Proficiency in reading, writing, and auditing code and the ability to learn new languages/technologies. Experience with OWASP Top10 or SANS Top 25 Experience breaking down complex systems and applications to identify threats. Excellent ability to communicate, verbally and in writing, complicated technical issues and the risks they pose to More ❯
learn, adapt, and evolve. Relevant certifications are highly valued, including (but not limited to): CREST: CRT, CCT-INF, CCT-APP EC-Council: ECSA, LPT Offensive Security: OSCP, OSEP, OSWE SANS/GIAC: GPEN, GWAPT, GXPN Excellent written and spoken English; additional languages are a plus. What is in it for you? Competitive salary and uncapped commission. 26 days of More ❯
should also have a proven experience and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital … and IAST tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we More ❯
The Vulnerability Management Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of More ❯