continuously improve upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: CertifiedInformation System SecurityProfessional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud SecurityProfessional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of More ❯
operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as CompTIA Security+, SSCP, CEH, GSEC, or CISSP (or actively working toward one) Experience with cloud security in AWS, Azure, or GCP environments Knowledge of scripting or automation (e.g., Python, PowerShell) for More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Intec Select
operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and communication skills Security certifications such as CompTIA Security+, SSCP, CEH, GSEC, or CISSP (or actively working toward one) Experience with cloud security in AWS, Azure, or GCP environments Knowledge of scripting or automation (e.g., Python, PowerShell) for More ❯
security incidents. Education: Bachelor's degree in informationsecurity or related field or equivalent; combination of education and experience. Must have Cybersecurity certification(s) (CISSP, Sec+, CCSP, CEH) or equivalent. Our Mission & Values For more than 50 years, Realty Income has been guided by our mission to invest in More ❯
communication skills for technical and non-technical audiences. Proficiency in MS Office and data visualisation tools like Power BI. Continual professional development and certifications (CISSP, GIAC, CISA, CISM) desirable. More ❯
communication skills for technical and non-technical audiences. Proficiency in MS Office and data visualisation tools like Power BI. Continual professional development and certifications (CISSP, GIAC, CISA, CISM) desirable. More ❯
intelligence. * Strong technical background in cybersecurity, including hands-on experience in security monitoring, threat detection, and digital forensics. * Certifications such as GCTI, GCIA, GCIH, CISSP, or equivalent (preferred). * Experience working with global teams and managing security incidents across multiple regions. * Knowledge of cloud security (AWS, Azure, GCP) and More ❯
management skills. A proactive, growth-oriented mindset with the ability to scale IT processes for a rapidly growing company. Preferred Qualifications Certifications: CompTIA Security+, CISSP, CISM, or equivalent. Experience working in the fintech industry or other highly regulated environments. Knowledge of automation tools and scripting languages. Why Join Us More ❯
CK, CIS, etc.). • Demonstrated experience leading security incident investigations and crisis response. • Excellent leadership, communication, and project management skills. • Relevant certifications such as CISSP, CISM, GIAC, or equivalent are highly preferred. Preferred Skills: • Experience managing global or follow-the-sun SOC operations. • Familiarity with cloud security operations (AWS More ❯
SolarWinds and Zabbix, and also, knowledge of Virtualization technology such as EXSi, KVM, Proxmox and Hyper-V. Relevant industry certifications such as CCNA, CCNP, CISSP, CISM, CEH, CompTIA Security+, AZ500 and GCP PCSE are highly desirable. Excellent analytical and problem-solving skills with the ability to troubleshoot complex issues. More ❯
tests to build a security-conscious workplace culture. Ideal Experience Degree in computer science, informationsecurity, or related fields (or equivalent certifications) Preferred certifications: CISSP, CEH, GSEC Familiarity with network protocols, operating systems, and security principles Proficiency with security tools like LogRhythm, Qualys, SCCM, Intune, Microsoft 365, AD, and More ❯
in securing cloud platforms (e.g., AWS, Azure, Google Cloud) Standards and Frameworks: Familiarity with NIST, CIS, ISO 27001, and other security standards Certifications (preferred): CISSP, CISM, CISA, SABSA, TOGAF Soft Skills: Strong analytical, communication, and problem-solving skills Desirable Skills: Experience in Agile/Scrum methodologies Familiarity with DevSecOps More ❯
and procedures. Specific GRC related professional training or an academic level equivalent in a related subject with a recognised informationsecurity related certification (e.g., CISSP, CompTIA, CISA, CISM, CRISC, MSc InformationSecurity, degree or other formal technical qualifications in a related area such as networking, cyber security, Information Technology More ❯
providing technical input and risk assessments. A valid right to work in the UK. Eligible to obtain UK SC clearance. CISA, CRISC, CISM or CISSP certification a must. Who we are: We're a business with a global reach that empowers local teams, and we undertake hugely exciting work More ❯
cloud security, specifically AWS, Azure, and Google Cloud Platform (GCP). You will have an advantage if you also have: Relevant certifications such as CISSP, CISM, CEH, or cloud-specific certifications (e.g., AWS CertifiedSecurity - Specialty, Microsoft Certified: Azure Security Engineer Associate, Google Professional Cloud Security Engineer) are highly More ❯
non-technical audience. Good analytical skills to translate complex GRC activities into clear and actionable insight. Preferred Qualifications Relevant security certifications (e.g. CISA, CRISC, CISSP) are a plus. Expertise in cyber security working for financial institutions or other critical infrastructures. Expertise in working within global organizations with offices around More ❯
security incidents; contribute to the development and maintenance of incident response plans, ensuring that they are up-to-date and effective. ️ Is This You? CISSP, CISA, or CISM certification is strongly recommended, but not required. ISO 27001/27701/42001, SOC-2, PCI DSS, and GDPR knowledge, experience More ❯
or related subject; or genuine equivalent experience working in cyber-security, GRC, security audit etc Professional certifications (currently held) including but not limited to CISSP, CCSP, CISM, CRISC, CISA Qualifications/experience in auditing against/implementing multiple security standards and frameworks, such as ISO 27001/2, NIST More ❯
/Certifications B.S. in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent). Security certifications such as CompTIA Security +, CISSP, CISA, CRISC, CCNA, GIAC, or equivalent or working towards certification is preferred. Knowledge of Risk Management life cycles based on an established framework: ISO More ❯
years' experience in a Governance, Risk and Compliance role, with at least 5 years in a leadership or managerial position Relevant certifications such as CISSP, CISM, CCSP, CISA, CRISC or equivalent experience Expertise and practical knowledge and understanding of industry security frameworks and guidance such as NIST More ❯
in the context of information security. Bachelor's degree in informationsecurity, Cybersecurity, IT, Risk Management, or a related field. Professional Certifications such as CISSP, CISM, CRISC, or ISO 27001 LI/LA, AWS security are highly preferred. If you're looking for a role where you can be More ❯
the ability to influence and collaborate across all levels of the organization. Strong analytical, problem-solving, and decision-making skills. Relevant certifications such as CISSP, CISM, or equivalent are highly desirable. More ❯
with software engineering best practices (source code reviews, source code management, build processes, testing, release and change management, automation) - Holds industry certifications such as CISSP, CISA, CISM, or CCSP Implementation experience in one or more of the following: Next Generation Firewalls, Web Application Firewalls, Intrusion Detection/Prevention, Incident More ❯
Vulnerability Management Identity and Access Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our More ❯
Vulnerability Management Identity and Access Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our More ❯