vulnerability management Familiarity with ISO 27001/27002 and related standards Awareness of modern threats, malware, and security analytics Experience (5+ years) in cyber security roles preferred Desirable certifications: CISSP, CISM, CCSP, CRISC (or equivalent) Experience across areas such as AD, PKI, SIEM, SOAR, cryptography, or virtualization (VMware) Eligibility for SC Clearance is mandatory. Eligibility to work in the More ❯
or Google Cloud Security. Background in client-facing roles or consulting, with the ability to communicate complex technical concepts clearly and effectively to clients Relevant cybersecurity certifications, such as CISSP, GIAC (e.g., GCIA, GCIH), or Splunk certification (e.g., Splunk Core Certified Power User), are highly desirable. Other Skills Excellent interpersonal and communication skills, with the ability to build strong More ❯
track record in automating security controls, implementing zero-trust models, and supporting 24x7 security operations. Strong understanding of compliance frameworks and risk management strategies. Preferred Qualifications Certifications such as CISSP, CCSP, CISM, AWS/Azure Security Specialty, or equivalent. Experience with tools like Okta, Azure AD, CrowdStrike, Tanium, Zscaler, Vault, and other modern security platforms. Familiarity with DevSecOps principles More ❯
and engaging with others to deliver. Technically astute, with in good knowledge of IT Operation and infrastructure. Desired Certifications (one or more is a plus): CISSP (CertifiedInformationSystemsSecurityProfessional) CISM (CertifiedInformationSecurity Manager) CompTIA Security+ CEH (Certified Ethical Hacker More ❯
in managing or supporting an InformationSecurity Management System (ISMS) based on frameworks such as ISO 27001, NIST, or SOC2. Professional certification in informationsecurity governance and management (e.g., CISSP, CISM, CISA) preferred. Minimum of 2 years' experience in informationsecurity, including carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and More ❯
in managing or supporting an InformationSecurity Management System (ISMS) based on frameworks such as ISO 27001, NIST, or SOC2. Professional certification in informationsecurity governance and management (e.g., CISSP, CISM, CISA) preferred. Minimum of 2 years’ experience in informationsecurity, including carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and More ❯
in managing or supporting an InformationSecurity Management System (ISMS) based on frameworks such as ISO 27001, NIST, or SOC2. Professional certification in informationsecurity governance and management (e.g., CISSP, CISM, CISA) preferred. Minimum of 2 years’ experience in informationsecurity, including carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and More ❯
in managing or supporting an InformationSecurity Management System (ISMS) based on frameworks such as ISO 27001, NIST, or SOC2. Professional certification in informationsecurity governance and management (e.g., CISSP, CISM, CISA) preferred. Minimum of 2 years’ experience in informationsecurity, including carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and More ❯
in managing or supporting an InformationSecurity Management System (ISMS) based on frameworks such as ISO 27001, NIST, or SOC2. Professional certification in informationsecurity governance and management (e.g., CISSP, CISM, CISA) preferred. Minimum of 2 years’ experience in informationsecurity, including carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and More ❯
london (city of london), south east england, united kingdom
dnevo Partners
in managing or supporting an InformationSecurity Management System (ISMS) based on frameworks such as ISO 27001, NIST, or SOC2. Professional certification in informationsecurity governance and management (e.g., CISSP, CISM, CISA) preferred. Minimum of 2 years’ experience in informationsecurity, including carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and More ❯
services or another regulated sector. Strong understanding of security governance, risk management, and compliance frameworks. Excellent knowledge of cyber security technologies, architecture, and emerging threats Relevant certifications such as CISSP, CISM, CISA, or equivalent. Due to the high volume of applications received we are unable to respond to everyone directly. If you are not contacted within 7 working days More ❯
services or another regulated sector. Strong understanding of security governance, risk management, and compliance frameworks. Excellent knowledge of cyber security technologies, architecture, and emerging threats Relevant certifications such as CISSP, CISM, CISA, or equivalent. Due to the high volume of applications received we are unable to respond to everyone directly. If you are not contacted within 7 working days More ❯
of member firms' staff and leadership to enable effective informationsecurity activities and processes in line with the cyber readiness program Domain-specific certifications such as CISM, CCISO, CISA, CISSP aren't a prerequisite however are well regarded. Fluency in English is required; fluency in Dutch is preferred What can we offer you? We believe in the power of More ❯
infrastructure, IDS/IPS AI security (ISO42001 desirable), ITHC scoping and remediation Threat modelling (Kill Chain, attack trees), HLD/LLD reviews Certifications: SABSA, TOGAF, AWS/Azure Architect, CISSP, CISM. Working towards or holding CIISEC Full Membership or UK Cyber Security Council registration (Chartered/Principal). What's in it for You Flexible Working: Remote-first with More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Sanderson
infrastructure, IDS/IPS AI security (ISO42001 desirable), ITHC scoping and remediation Threat modelling (Kill Chain, attack trees), HLD/LLD reviews Certifications: SABSA, TOGAF, AWS/Azure Architect, CISSP, CISM. Working towards or holding CIISEC Full Membership or UK Cyber Security Council registration (Chartered/Principal). What's in it for You Flexible Working: Remote-first with More ❯
NIST, ISO 27001). Bachelor's degree in Computer Science, Information Technology, or equivalent experience. Minimum of 5 years in a security architecture role. Professional certifications such as SABSA, CISSP, CISM, or TOGAF are highly desirable. More ❯
designer role. Familiarity with industry standards and frameworks such as NIST, ISO 27001, TOGAF. Strong documentation skills with experience writing SDDs, architecture diagrams, and technical specifications. Certifications such as CISSP, SABSA, TOGAF, CCSP, or AWS/Azure Security are a plus More ❯
or position will be crucial. In addition to the above the following are desirable: Consulting or equivalent background. Understanding of malware and the modern threat landscape. Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, EC-Council etc. or equivalent). Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker More ❯
ISO27001, or NIST frameworks. Experience with patch/vulnerability management governance. Ability to communicate technical risks in business language. Proven ability to run client-facing reviews or presentations. Desirable CISSP, CISM, or equivalent certifications. Experience delivering or auditing compliance frameworks. Familiarity with RMM/XDR/EDR, SIEM, and vulnerability scanning platforms. Experience leading small teams (mentoring, guiding). More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Devonshire Hayes Recruitment Specialists Limited
solutions. Experience with ZTNA, CTI, threat modelling is beneficial. Bachelor’s degree in informationsecurity, Computer Science, or a related field, or relevant industry experience. Relevant security certifications (e.g., CISSP, CISM, CEH) are highly desirable. Proven experience in an informationsecurity role, preferably in a cloud-based environment. More ❯
RPKI validation, DNS/DNSSEC, etc) Qualifications 10+ years of experience in cybersecurity , with proven leadership of multi-domain security functions (Enterprise IT, Cloud, Networks, Compliance). Professional certifications (CISSP, CISM, CCSP, CCNP Security, or equivalent). Strong communicator with credibility at executive, technical, and regulatory levels; with customer-focused mindset with emphasis on trust, resilience, and service assurance. More ❯
how it applies to information and cyber security A knowledge of card payment system security as defined in PCI-DSS V4.0 Qualifications A security certification such as CISM, CISMP, CISSP or equivalent would be desirable. A relevant IT or security-based degree or equivalent practical experience. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
McCabe & Barton
how it applies to information and cyber security A knowledge of card payment system security as defined in PCI-DSS V4.0 Qualifications A security certification such as CISM, CISMP, CISSP or equivalent would be desirable. A relevant IT or security-based degree or equivalent practical experience. More ❯
london, south east england, united kingdom Hybrid / WFH Options
McCabe & Barton
how it applies to information and cyber security A knowledge of card payment system security as defined in PCI-DSS V4.0 Qualifications A security certification such as CISM, CISMP, CISSP or equivalent would be desirable. A relevant IT or security-based degree or equivalent practical experience. More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
McCabe & Barton
how it applies to information and cyber security A knowledge of card payment system security as defined in PCI-DSS V4.0 Qualifications A security certification such as CISM, CISMP, CISSP or equivalent would be desirable. A relevant IT or security-based degree or equivalent practical experience. More ❯