experience analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs. 14. Demonstrated experience creating concise and well-structured written assessments. 15. Certifications: CISSP Certification. 16. Software Development Support: 17. Demonstrated experience with Front-end web development tools such as Node and NPN. 18. Demonstrated experience using Java Script Object Notion (JSON) for More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown PLC
development and keeping pace with the evolving security landscape.Qualifications Relevant degree in computer science, informationsecurity, or a related field (or equivalent professional experience). Professional certifications such as CISSP, CSSLP, CASP+, CASE, CASS, CISM, CCSP, or SABSA preferred. Also, any OffSec certification would be advantageous. Additional certifications in cloud security (CCSK, AWS/Azure Security Specialty) and agile More ❯
NIST CSF, CIS Controls v8) HMG/NCSC policies and guidance Cloud security (AWS, Azure) Microservice architectures PKI, Cryptography, Privileged Access Management Certifications: SABSA, TOGAF, AWS/Azure Architect, CISSP, CISM (or working towards CIISEC/UK Cyber Security Council registration). Soft Skills: Strong analytical thinking, communication, teamwork, and adaptability. What's in it for You Flexible Working More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
and keeping pace with the evolving security landscape. Qualifications Relevant degree in computer science, informationsecurity, or a related field (or equivalent professional experience). Professional certifications such as CISSP, CSSLP, CASP+, CASE, CASS, CISM, CCSP, or SABSA preferred. Also, any OffSec certification would be advantageous. Additional certifications in cloud security (CCSK, AWS/Azure Security Specialty) and agile More ❯
Employment Type: Permanent, Part Time, Work From Home
track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications: Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, and other modern security platforms. Familiarity with DevSecOps principles More ❯
experience 3+ years' experience performing IT Audit or security control testing. 8+ years' of experience in InformationSecurity and/or Information Technology. Professional certification such as CISA, CISM, CISSP, ISO 27001 Lead Auditor, or equivalent. Familiarity with industry standards and frameworks e.g., NIST 800-53, ISO 27001/27002, CIS Controls, COBIT. Experience with control testing methodologies, risk More ❯
experience 3+ years' experience performing IT Audit or security control testing. 8+ years' of experience in InformationSecurity and/or Information Technology. Professional certification such as CISA, CISM, CISSP, ISO 27001 Lead Auditor, or equivalent. Familiarity with industry standards and frameworks e.g., NIST 800-53, ISO 27001/27002, CIS Controls, COBIT. Experience with control testing methodologies, risk More ❯
experience 3+ years' experience performing IT Audit or security control testing. 8+ years' of experience in InformationSecurity and/or Information Technology. Professional certification such as CISA, CISM, CISSP, ISO 27001 Lead Auditor, or equivalent. Familiarity with industry standards and frameworks e.g., NIST 800-53, ISO 27001/27002, CIS Controls, COBIT. Experience with control testing methodologies, risk More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Bering Straits Native Corporation
Experience with working with senior management both corporate and government. • Hands on experience with MS office suite • Ability to track PTO and create work schedules Preferred Certifications such as CISSP, GCIH, GCIA, CEH, or equivalent. Experience in DevSecOps, CI/CD pipeline integration. Knowledge of threat hunting methodologies and tools. NECESSARY PHYSICAL REQUIREMENTS The physical demands described here are More ❯