stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
stakeholders, and external partners. Demonstrated ability to create and maintain comprehensive documentation. Familiarity with vulnerability assessment tools and maintenance processes. Relevant certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Babcock
performance and inspire others Qualifications for the Information Assurance Officer Degree in Computer Science, InformationSecurity, or relevant experience Hold CertifiedInformationsecurityManager (CISM), Certifiedinformation systems security professional (CISSP) or similar high level qualification in InformationSecurity ISO27001 and ISO28001 Implementor/Assessor UK driving licence Security Clearance more »
Manager (CRM), and/or CertifiedInformation Privacy Technologist (CIPT), CertifiedInformation Systems Security Professional (CISSP), Information Governance Professional (IGP), CertifiedInformationSecurityManager (CISM) and CertifiedInformation Systems Auditor (CISA more »
management systems, especially in an ISO 9001 certified environment. Desirable Qualifications Degree in InformationSecurity, Computer Science, or related field. Relevant certifications (e.g., CISSP, CISM, ISO 27001 Lead Auditor). Benefits Competitive salary, dependent upon experience 33 days holiday 5% matched Employer pension scheme Up to 5% Gainshare bonus per more »
pressure to tight deadlines Self-motivated and ability to work largely unsupervised Professional qualifications Bachelor's degree in Computer Science, Engineering, or related field CISM, CISSP, CISA or similar professional qualification more »
field or equivalent training and/or experience. Professional InformationSecurity certification by a recognised professional body such as Certified in InformationSecurity Management (CISM), CertifiedInformation Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track record leading more »
assessing and managing risk in line with industry good practice (NIST, ISO 27001). Applicants need recognised industry security qualifications such as: CCP, CISSP, CISM (or be able to achieve) and significant experience using security baselines, mitigation and implementing security controls. Candidates with a deep understanding of the ongoing modernization more »
. Excellent leadership, communication, and interpersonal skills, with the ability to effectively collaborate with cross-functional teams and senior stakeholders. Relevant certifications (e.g., CISSP, CISM, CRISC, IAMCP) are a plus. Experience in consulting or professional services environment preferred. Benefits: Competitive salary and performance-based bonuses Comprehensive health and wellness benefits more »
from start to finish and work independently. Open Group certification. Experience of developing long term architectural strategies. One or more security certifications, e.g., CISSP, CISM, CCSP or CCSK. more »
autonomously. Positive attitude and willingness to learn. Detailed knowledge of IT and OT systems. Relevant degree or certifications in Cybersecurity or Engineering (e.g., CISSP, CISM, SEC+, GSEC). If you have the above experience, and are interested in finding out more, apply now more »
and encryption. Experience with cyber security frameworks and standards (e.g., NIST Cybersecurity Framework, ISO/IEC 27001, CIS Controls). Relevant certifications (e.g., CISSP, CISM, CISA) preferred. If your interested and have prior experience working within the Higher Education Sector, please apply now more »
SOX). - Knowledge of risk management, incident response, and compliance frameworks. - Experience working with globally distributed cross-functional teams. - Professional certifications such as CISSP, CISM, or CISA are highly desirable. - Travel Industry experience is highly desired Sound good? APPLY NOW more »