continuously improve upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: CertifiedInformation System SecurityProfessional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud SecurityProfessional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of more »
to multi-task and prioritize workload Experience in a team-oriented, collaborative environment Able to work after-hours and on call as needed Certifications: CISSP, GSEC, CRISC, OSCP, GCTI, GEVA, Security+, Vendor Certifications more »
to multi-task and prioritize workload Experience in a team-oriented, collaborative environment Able to work after-hours and on call as needed Certifications: CISSP, GSEC, CRISC, OSCP, GCTI, GEVA, Security+, Vendor Certifications more »
Certification Experience with NIST assurance/EDR IT Certifications, including Network+, Security+ Protective Monitoring/SOC Certifications, including CySA+ Cyber Security Certifications, including CISMP, CISSP Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity and Cloud Experience with SIEM platforms, including IBM QRadar, Microsoft Sentinel and LogRhythm more »
london, south east england, United Kingdom Hybrid / WFH Options
Capita
Certification Experience with NIST assurance/EDR IT Certifications, including Network+, Security+ Protective Monitoring/SOC Certifications, including CySA+ Cyber Security Certifications, including CISMP, CISSP Experience with various Microsoft Technologies, including Microsoft Defender for Endpoint, Identity and Cloud Experience with SIEM platforms, including IBM QRadar, Microsoft Sentinel and LogRhythm more »
best practices. Person Specification Education and qualifications Essential Master's Degree or equivalent professional technical qualification Evidence of continuous professional development Desirable CCP/CISSP (or other relevant security certification) ITIL Security Management Skills and abilities Essential Understanding of, and practical experience of applying the GDPR or Data Protection more »
Greater London, England, United Kingdom Hybrid / WFH Options
Anson McCade
relevant field that demonstrates your interest in IT, cloud and cyber security • Amazon AWS, Google Cloud or Microsoft Azure cloud architect professional qualifications • ISC2CISSP accreditation or equivalent internationally recognised membership • Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS more »
london, south east england, United Kingdom Hybrid / WFH Options
Anson McCade
relevant field that demonstrates your interest in IT, cloud and cyber security • Amazon AWS, Google Cloud or Microsoft Azure cloud architect professional qualifications • ISC2CISSP accreditation or equivalent internationally recognised membership • Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS more »
reduce the risk posed to the company. You will hold professional qualifications within security e.g Security+, AWS Security or MS Azure Security and ideally CISSP (although for the right candidate we can support the gaining of this qualification). Key responsibilities include: Security Monitoring and Incident Response Monitoring systemsmore »
london, south east england, United Kingdom Hybrid / WFH Options
Korn Ferry
reduce the risk posed to the company. You will hold professional qualifications within security e.g Security+, AWS Security or MS Azure Security and ideally CISSP (although for the right candidate we can support the gaining of this qualification). Key responsibilities include: Security Monitoring and Incident Response Monitoring systemsmore »
out-of-hours work as required. Qualifications and Experience: Bachelor's degree in Cybersecurity, Computer Science, or related field. Relevant professional certifications such as CISSP, CISM, GIAC, or equivalent are preferred. Strong working experience with Sentinel. Familiarity with industry frameworks and standards such as NIST, ISO 27001, and CIS more »
Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
leading cloud platforms Proficiency in cloud security tools and automation Professional certifications in cloud architecture from Amazon AWS, Google Cloud, or Microsoft Azure ISC2CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, and IDAM systemsmore »
leading cloud platforms Proficiency in cloud security tools and automation Professional certifications in cloud architecture from Amazon AWS, Google Cloud, or Microsoft Azure ISC2CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, and IDAM systemsmore »
and SIEM technologies eg Microsoft Sentinel An interest in automation of Security operation function including artificial intelligence An understanding of Microsoft security product portfolio CISSP/CISM (Desired) CCSP/SSCP (Desired) Proven experience in Cybersecurity and IT Operations (Required) DLP, EDR/XDR, CASB, E-mail Security, SWG more »
security posture. COBIT (Control Objectives for Information and Related Technologies ): Understand the framework for governance and management of enterprise IT. Preferred Qualification: SANS Certification CISSP, CISA, or CRISC About Capita Technology and Software Solutions (TSS) and CISO Capita Technology and Software Solutions (TSS) is a newly formed global shared more »
london, south east england, United Kingdom Hybrid / WFH Options
Capita
security posture. COBIT (Control Objectives for Information and Related Technologies ): Understand the framework for governance and management of enterprise IT. Preferred Qualification: SANS Certification CISSP, CISA, or CRISC About Capita Technology and Software Solutions (TSS) and CISO Capita Technology and Software Solutions (TSS) is a newly formed global shared more »
European/Global regulatory environment governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, InformationSecuritymore »
with a proven track record of delivering secure, compliant and robust systems and procedures. Prior experience using Azure and Microsoft cloud products and a CISSP, CISA, CISM, ISO 27001 lead auditor/implementor or similar accreditation would be highly advantageous to your application. This is an excellent opportunity for more »
with a proven track record of delivering secure, compliant and robust systems and procedures. Prior experience using Azure and Microsoft cloud products and a CISSP, CISA, CISM, ISO 27001 lead auditor/implementor or similar accreditation would be highly advantageous to your application. This is an excellent opportunity for more »
compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the more »
compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and Vulnerability Management is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This role offers an exciting opportunity to contribute to the more »