Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
or required): Certified Information Systems Auditor (CISA) Certified Information Security Manager (CISM) Certified Information Systems Security Professional (CISSP) ISO 27001 Lead Auditor or Implementer GIAC certifications (e.g., GIAC Certified Incident Handler - GCIH or GIAC Security Essentials - GSEC) What's in it for you? Join an ever-growing, market disrupting, globalMore ❯
CISM, CRISC, CISA, ITCA) . Certified Information Security Manager (CISM) is essential. Certified Authorization Professional (CAP) . Information Systems Security Architecture Professional (ISSAP) . GIAC Security Leadership Certificate (GSLC) . Information Systems Security Engineering Professional (ISSEP) . Informationassurance system architecture and engineer (IASAE) . It's a prerequisite to More ❯
security best practice approaches. * Passion for security testing and continual development within this area. * Related Industry accreditations such as CREST, Offensive Security, SANS/GIAC or equivalent recognised qualifications with relevant IT Security experience * Experience at managing and/or conducting a wide range of testing in different environments with More ❯
host or network Knowledge of network communications, routing protocols, compliance standards, and internet applications Knowledge of system and network policies Relevant certifications such as GIAC GREM, GCFA, GNFA, or Offensive Security certifications like OSCP and OSCE Commitment to Non-Discrimination: All qualified applicants will receive consideration for employment without regard More ❯
assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. So, if you feel your skills and experience align More ❯
Engineering, or a related technical discipline.Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent.Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms.Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK CNI More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
Good reasoning skills and the ability to clearly identify key issues. Desirable: CISSP, CISM or other equivalent foundational security qualifications or experience. CEH, OSCP, GIAC or other penetration testing security qualifications or experience. SABSA, SANS or other technical architecture qualifications. SAFE, Scrum, or other Agile methodology experience. Data Protection, Risk More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
or equivalent experience) in Cybersecurity, Computer Science, Software Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or application security (CompTIA, ISC2, GIAC, ISACA, or CREST). Highly desirable are certifications related to secure development and cloud security (CSSLP, AZ-500, SC-100/SC-200, AWS Security More ❯
Bolton, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Reed Technology
Customer focus to ensure internal stakeholder needs are met Project Delivery background CISSP, CISM or other equivalent foundational security qualifications or experience CEH, OSCP, GIAC or other penetration testing security qualifications or experience SABSA, SANS or other technical architecture qualifications SAFE, Scrum, or other Agile methodology experience Data Protection, Risk More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
in Cybersecurity, Information Security, Computer Science, Network Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or infrastructure security (CompTIA, ISACA, ISC2, GIAC, Microsoft, CREST, Cisco Security, or equivalent). Certifications in security governance and frameworks: ISO/IEC 27001, NIST CSF, CAF, or CIS Controls. Additional vendor … AWS, Azure, Microsoft, GCP, Palo Alto, CrowdStrike, Tenable) are advantageous. OT/ICS/SCADA-focused certifications: IEC 62443, GRID/GRID+ (SANS/GIAC), GICSP, or equivalent industrial cybersecurity training are desirable. Essential skills Strong understanding of core cybersecurity principles, risk management, and control implementation in critical infrastructure environments. More ❯