Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
ability to convey complex technical concepts to non-technical stakeholders. Desirable criteria: Knowledge of Automated Access Control Systems Qualifications and Accreditations Essential criteria: Relevant Security Architecture qualification (e.g., CISSP, CISM or equivalent). Demonstrable experience working on technical projects and managing stakeholders. Demonstrable experience of working within security standards and frameworks Desirable criteria: Degree in Computer Science, Information Technology, Cyber More ❯
Staffordshire, United Kingdom Hybrid / WFH Options
Gleeson Recruitment Group
infrastructure support Excellent communication skills, patient and clear with non-IT users Proactive and self-starting mindset, someone who "gets on with it" Desirable Certifications: AZ-500, CISSP, CCSP, CISM Experience with compliance initiatives like Cyber Essentials Any coding/scripting ability (PowerShell/KQL/Python) Working Pattern Fully remote with occasional head office visits Flexible approach to working More ❯
similar) required Knowledge of relevant security/governance frameworks (NIST CSF, ISO27001, CobiT, ) required Experience in service build up a plus Security Governance/Risk Management certification (CISSP, CGEIT, CISM, CRISC ) is a plus Qualified individuals with a disability may request a reasonable accommodation if you are unable or limited in your ability to use or access the Hitachi Energy More ❯
Experience managing crisis situations and leading diverse teams. Strong English writing and verbal communication skills. Attention to detail and ability to build high-performing teams. Relevant certifications (e.g., CISSP, CISM, CSSLP, CEH). Valid right to work in the UK and eligibility for UK SC clearance We're a business with a global reach that empowers local teams, and we More ❯
initiatives. Demonstrable knowledge of cybersecurity principles, theories, practices, and techniques, including offensive security is essential. Technical proficiency with Defender, Intune, Azure, and D365 is required. Certifications such as CISSP, CISM, CISA, or CEH are preferred. Experience in implementing and adhering to controls within a growing organization, especially in new territories, would be beneficial. Additionally, experience in security architecture would be More ❯