certification is desirable, e.g., CISSP, CISM, CISA, CRISC. Working knowledge of Risk Management life cycles based on an established framework: NIST CSF, NIST SP 800-53, ORX, ISO 27001, SANS, CERT, ENISA, CSA, OACA, ISACA. Proficiency in MS PowerPoint and Excel. Experience in broader MS Office suite, including Project and Visio is a plus Experience with enterprise GRC tools More ❯
of ISO 27001 beneficial but not essential. Understanding of UK data protection law and its practical application within a security programme. Security certifications (e.g. CISSP, CISM, CCSP, GIAC/SANS, AWS Security Specialty, or similar) are a plus. Ability to build effective working relationships across technical and non-technical stakeholders. Strong analytical, communication, and problem-solving skills. Experience supporting More ❯
technologies to monitor and protect data and equipment from attacks.We're Looking for Teammates With: Bachelor's degree in computer science or a related field is required. CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity More ❯
vulnerability management program Strong technical expertise in implementing a Prioritizationformula to vulnerabilities and misconfigurations and translating these into risks Excellent knowledge of Vulnerability Management frameworks such as NIST/SANS The following general characteristics are required: A team player with the ability to work independently and unsupervised Ability to own delegated tasks and see them through to completion Ability More ❯
members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT More ❯
on efficiency, automation, and continuous improvement. Strong documentation skills and experience working in cross-functional teams (e.g., HR, Legal, Risk). Relevant certifications preferred: ITPM, GCITP, PMP, CISSP, GCIH, SANS, GIAC Additional Information Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
IPS, micro-segmentation, and host security. Hands on experience with the following security products Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT and Cookie based authentication. Incident detection and response in MOD environments. Security compliance and regulatory More ❯
. SC Clearance (essential); must be eligible for DV clearance . UK nationality only (sole nationality required for this role). Relevant certifications (e.g. CompTIA Security+, CySA+, AWS, MS, SANS, CISSP ) are desirable but not essential-hands-on experience is key. Security Clearance Requirements This role requires current SC clearance and eligibility for Developed Vetting (DV) . To meet More ❯
Computer Engineering, or related field, or equivalent work experience Coding skills in at least one primary language, such as Java or Python and React Understanding of OWASP Top 10, SANS Top 20, NIST 800-53, CIS, CSC, or other security standards Utilize Static Application Security Testing tools (i.e. Checkmarx) to identify and remediate code vulnerabilities 1+ years as a More ❯
understanding of both common and emerging vulnerabilities including their manifestation in different architectures (web applications, thick clients, APIs, networked infrastructure etc) Familiarity with industry standard guidance OWASP Top 10, SANS Top 25, NIST/CSC, CIS, NCSC etc. Applied understanding of topics such as authentication, access control, encryption, cloud security, operating system security, network security, database security. Experience of More ❯
to meetorganisational objectives. Abilityto work calmly and effectively under pressure and have a can-do attitude. Broadcyber certifications or equivalent such as Cyber Foundation Pathway, CompTIA(N+, S+, CySA+), SANS (GSEC, GCIH, GMON, GCDA), Systems Administrations (ActiveDirectory), CISCO (CCNA, CCNP) and risk management. Working knowledge of Defence Joint Service Publications (440, 441,604). More ❯
a relevant field, such as cyber/information security, psychology/behavioural science, engineering or communications. Professional certification in human risk management, cyber security, or related fields, such as SANS Security Awareness Professional (SSAP), Infosec Certified Security Awareness Practitioner (CSAP), NICCS Certified Cybersecurity Awareness Professional (CCAP), CISSP, CISM While certifications are not mandatory, a demonstrable commitment to professional development More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF. Bonus Points: Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable. Some programming experience for example, C, Python, Go More ❯
East London, London, United Kingdom Hybrid / WFH Options
A&O Shearman
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … with external parties. You will stand out if you bring Bachelors degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
relevant leadership role, with a demonstrated track record of leading and mentoring a team of security architects. At least one relevant, industry-recognised professional certification, such as: CISSP CCSP SANS GIAC. Extensive experience in designing and implementing secure architectures across cloud, on-premises, and hybrid environments. Proven experience working in a global organization. Experience supporting audit and compliance activities … external parties. You will stand out if you bring Bachelor's degree in Computer Science or a related field. Additional certifications such as CISA, CISM, CCIE, CRISC, or other SANS credentials. Experience within the legal or professional services sector. What we can offer you We recognise that our people are our most valuable asset, which is reflected in the More ❯
learn, adapt, and evolve. Relevant certifications are highly valued, including (but not limited to): CREST: CRT, CCT-INF, CCT-APP EC-Council: ECSA, LPT Offensive Security: OSCP, OSEP, OSWE SANS/GIAC: GPEN, GWAPT, GXPN Excellent written and spoken English; additional languages are a plus. What is in it for you? Competitive salary and uncapped commission. 26 days of More ❯
and security strategy development Lead efforts to assess and mature security practices across the enterprise Stay abreast of industry trends, frameworks, and regulations (e.g., GDPR, ISO 27001/2, SANS Top 20 Critical Security Controls, NIST CSF, SP 800-53, PFMI, CPMI ISOCO and FFIEC handbook, SABSA) to ensure the organization is proactive in addressing emerging security threats and … Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and services Our commitment to employees: At CLS, we celebrate diversity and consider this to be one of our More ❯
software and development Proficiency in securing cloud technologies Proficiency in reading, writing, and auditing code and the ability to learn new languages/technologies. Experience with OWASP Top10 or SANS Top 25 Experience breaking down complex systems and applications to identify threats. Excellent ability to communicate, verbally and in writing, complicated technical issues and the risks they pose to More ❯
should also have a proven experience and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital … and IAST tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we More ❯
The Vulnerability Management Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of More ❯