Bournemouth, Dorset, United Kingdom Hybrid / WFH Options
LV=
other related policies Qualifications: •Bachelor's degree in informationsecurity, Computer Science, or a related field (or equivalent experience) •Professional certifications such as CISSP, CISM, or equivalent (or equivalent experience) •Extensive experience in informationsecurity management, including strategy development and operational oversight •Strong understanding of regulatory requirements and compliance standards More ❯
foundation in informationsecurity , with experience delivering security solutions for large-scale infrastructure or integration projects. Familiarity with leading security certifications , such as CISSP, CISM, IISP/CCP, TOGAF, or SABSA. Proven ability to design and implement secure architectures in complex, dynamic environments. Experience in identity management, network security, cloud More ❯
communication and engagement across departments. Experience with technology process, risk and control frameworks. IT Risk and Compliance, Audit, or Quality certifications desirable (e.g. CISSP, CISM, CISA, CIA, CRISC, CGEIT, CIAC, ISO, etc.). Excellent interpersonal, consultative and communication skills. Ability to interact effectively at all levels with clients, consultants, vendors More ❯
on-site. Key Skill Requirements: Experience in IT leadership, AI Technology and Digital Strategy. Strong understanding of data protection regulations and CyberSecurity best practice. CISM/CISA/CISSP etc are a plus. What you'll do: Information Technology and Leadership: Develop and execute digital strategies and IT policies, aligning More ❯
on-site. Key Skill Requirements: Experience in IT leadership, AI Technology and Digital Strategy. Strong understanding of data protection regulations and CyberSecurity best practice. CISM/CISA/CISSP etc are a plus. What you'll do: Information Technology and Leadership: Develop and execute digital strategies and IT policies, aligning More ❯
vendors, such as Palo Alto, Cisco, Crowdstrike, Fortinet, Zscaler and Netskope. Security Vendor Accreditations will be advantageous. Independent and relevant certifications (such as CISSP, CISM) are advantageous. Knowledge of industry frameworks such as NIST, DORA, Regulatory Compliance, Governance and standards are desired but not essential. Essential Attributes Self-driven and More ❯
existing security products (e.g. Microsoft Defender vs. CrowdStrike). Collaborate closely with the Security Operations Centre (SOC) team. Professional certifications such as CISSP or CISM are highly desirable. More ❯
existing security products (e.g. Microsoft Defender vs. CrowdStrike). Collaborate closely with the Security Operations Centre (SOC) team. Professional certifications such as CISSP or CISM are highly desirable. More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Oscar
to technical risks Present and advise stakeholders as the cybersecurity SME. Required Skills E5 Security-Up Compliance Microsoft Security Architect Expert (SC1000 CISSP/CISM Certification BizzDesign/Archi, or UML Visualisation Experience ISO 27001 Apply Now! If you are a Security Architect specialising in Microsoft Security, ready to embark More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Oscar
to technical risks Present and advise stakeholders as the cybersecurity SME. Required Skills E5 Security-Up Compliance Microsoft Security Architect Expert (SC1000 CISSP/CISM Certification BizzDesign/Archi, or UML Visualisation Experience ISO 27001 Apply Now! If you are a Security Architect specialising in Microsoft Security, ready to embark More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
to technical risks Present and advise stakeholders as the cybersecurity SME. Required Skills E5 Security-Up Compliance Microsoft Security Architect Expert (SC1000 CISSP/CISM Certification BizzDesign/Archi, or UML Visualisation Experience ISO 27001 Apply Now! If you are a Security Architect specialising in Microsoft Security, ready to embark More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
AWS, Azure, GCP security review experience. ISO 27001 auditing/implementation experience. Experience of scoping penetration tests. Other cyber security certifications such as Security+, CISM, CISSP, ECSA, CREST CCT. What We Can Offer: We’re determined to create an engaging work culture that delivers a healthy work-life balance and More ❯
skills and keen attention to details. Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) CertifiedInformationSecurityManager (CISM) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information assurance system architecture and engineer (IASAE) It is prerequisite More ❯
Project management skills are a strong plus. Preferred Certifications: ForgeRock Certified Specialist/Professional Ping Identity Certified Professional Relevant IAM or Security certifications (CISSP, CISM, etc. More ❯
london, south east england, United Kingdom Hybrid / WFH Options
KBC Technologies Group
Project management skills are a strong plus. Preferred Certifications: ForgeRock Certified Specialist/Professional Ping Identity Certified Professional Relevant IAM or Security certifications (CISSP, CISM, etc. More ❯
Government Security Clearance. Desirable Skills & Experience: Educated to degree level. Additional Professional certification such as SAP Certified Technology Professional, SAP Access Control 12.0, CISSP, CISM, or other relevant security certifications. Qualify the criteria of UK Security clearance. Strong understanding of Business process Controls for S/4 HANA and other More ❯
Government Security Clearance. Desirable Skills & Experience: Educated to degree level. Additional Professional certification such as SAP Certified Technology Professional, SAP Access Control 12.0, CISSP, CISM, or other relevant security certifications. Qualify the criteria of UK Security clearance. Strong understanding of Business process Controls for S/4 HANA and other More ❯
from start to finish and work independently. Open Group certification. Experience of developing long-term architectural strategies. One or more security certifications, e.g., CISSP, CISM, CCSP or CCSK. More ❯
client engagement. Qualifications A degree (or equivalent experience) in Cybersecurity, Systems Engineering, Electrical/Electronic Engineering, or a related technical discipline.Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent.Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific More ❯
engagement. Qualifications A degree (or equivalent experience) in Cybersecurity, Systems Engineering, Electrical/Electronic Engineering, or a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor More ❯
engagement. Qualifications A degree (or equivalent experience) in Cybersecurity, Systems Engineering, Electrical/Electronic Engineering, or a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor More ❯
engagement. Qualifications A degree (or equivalent experience) in Cybersecurity, Systems Engineering, Electrical/Electronic Engineering, or a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor More ❯
etc.). Strong leadership, stakeholder management, and strategic advisory skills. Experience building consulting teams and driving growth initiatives . Certifications such as CISSP, CISA, CISM, and CRISC are a plus. UK market experience is highly preferred. Why Join Riverflex? Growth & Impact: Build a new practice in a fast-growing consulting More ❯