Linux system administration and virtualization technologies (VMware, Hyper-V). Previous experience within the finance or banking sector is highly advantageous. Certifications (Desirable): CISA, CISSP, CCSP Microsoft Certifications (MCSA, MCSE, MCITP) VMware CertifiedProfessional Cisco Certifications (CCNA, CCNP) Languages: Fluent English required; Mandarin proficiency strongly preferred but not mandatory. More ❯
all levels. Requirements: Good experience of managing InformationSecurity compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP/HCIP for security or higher certification will be preferred. Experience with cloud environments and infrastructure (e.g., ZSTACK, VMware, etc.). More ❯
all levels. Requirements: Good experience of managing InformationSecurity compliance and ISO27001 certification. Hands-on experience in maintenance and configuration of Firewall and switch. CISSP, CCNP/HCIP for security or higher certification will be preferred. Experience with cloud environments and infrastructure (e.g., ZSTACK, VMware, etc.). More ❯
skills. Excellent written and verbal communication skills, with demonstrated experience presenting risk insights to executive leadership and board members. Relevant senior security certifications (e.g., CISSP, CISM, CRISC, CISA, ISO 27001 Lead Implementer/Auditor) are highly desirable. More ❯
Excellent organisational, communication, and documentation skills Ability to work independently and cross-functionally in a fast-paced environment Industry certifications such as CISA, CRISC, CISSP, CISMis preferred Our employees are talented people, distinguished by excellence. You will be able to demonstrate a willingness to embrace the Company values of More ❯
grasp of ISO27001, NIST, UK GDPR, and security frameworks Knowledge of vendor management and vulnerability assessments Bonus points for certifications like ISO27001 Lead Implementer, CISSP, or CISM What’s in it for you? Private healthcare & life insurance Generous pension scheme (up to 10% employer contribution) 25–28 days holiday More ❯
Bachelor's degree in Computer Science or a related field. Professional certifications or advanced degrees in Cyber or InformationSecurity, such as IEC62443 expert, CISSP, CISM, CISA, CIPT, CIPM, CRISC, or other relevant certifications. Experience in cyber risk and/or vulnerability management roles. Experience in OT security roles. More ❯
degree in computer science or information security. At least 7 years of experience in the Application Security or Application Development. Certifications such as CSSLP, CISSP, CEH, OSCP, CISM, etc. are preferred. Certifications from AppSec vendors are beneficial. Experience in driving cyber security business and capability. Knowledge of Security principles More ❯
s) in: Computer Science, Computer Security or Computer Forensics (or equivalent/extensive industry experience). Professional industry recognised certifications e.g. SANS, CEH, RHCE, CISSP, CISM etc. or equivalent experience. Good understanding of ITIL principles and able to apply them. More ❯
all roles and levels Nice To Haves (see above): Prior experience working within a global media, entertainment organization or fortune 100 company Security certification (CISSP, CISA, GSEC) or comparable certification Education: Bachelor's degree in Computer Science, InformationSystems, Software, Electrical or Electronics Engineering, or comparable field of study More ❯
Hands-on with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+, CEH, or CISSP are a plus Perks: Hybrid work (2–3 days in-office) Learning budget + paid certs Bonus, pension, private health, and more 🚀 Ready to More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Explore Group
Hands-on with SIEM tools, cloud security (AWS/Azure), firewalls Knowledge of security frameworks and regulations (FCA, GDPR) Certs like Security+, CEH, or CISSP are a plus Perks: Hybrid work (2–3 days in-office) Learning budget + paid certs Bonus, pension, private health, and more 🚀 Ready to More ❯
improve security posture. Required Skills & Experience: Security Expertise: Extensive experience in IT/security roles, particularly within financial services. Certifications: Relevant certifications such as CISSP, CEH. Cloud Security: Experience in configuring and managing Microsoft Azure environments and cloud. More ❯
strategy and manage cyber risk. Desire to work with large organisations trying to solve the latest cyber security problems. Relevant certifications, such as M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture More ❯
ability to deliver high quality work. A valid right to work in the UK. Eligible to obtain UK SC clearance. CISA, CRISC, CISM or CISSP certification advantageous. Who we are: We're a business with a global reach that empowers local teams, and we undertake hugely exciting work that More ❯
audiences. What experience you'll bring: 7+ Years experience in a Cyber/InformationSecurity Role. Hold a current and relevant Security Certifications (e.g., CISSP, CISM). Extensive knowledge of security best practices, frameworks, and standards (e.g., NIST, ISO 27001). Proven experience as a Security Architect, with a More ❯
such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP). Preferred Technical and Professional Experience Relevant industry certifications such as CISSP, CISM, or CCSP. Bachelor's or Master's degree in Computer Science, InformationSecurity, or a related field. More ❯
CEH, E CIH), or network forensics (GIAC Network Forensic Analyst (GNFA), NICCS Certified Network Forensics Examiner (CNFE . Hold one Security Management certification (ISC2CISSP, CISM) or obtain such certification within the first two years as a Cyber Incident Response Lead. This role has a regular Monday - Friday schedule More ❯
detail and analytical skills; able to synthesize large amounts of data and formulate appropriate conclusions Professional qualifications such as CertifiedInformation System SecurityProfessional (CISSP), Certified Cloud SecurityProfessional (CCSP), and Amazon Web Services (AWS) certifications About the Team J.P. Morgan is a global leader in financial services, providing More ❯
and team members. Preferred qualifications: Advanced degrees such as an MBA or a Master's in Cyber Security, or equivalent experience. Professional certifications like CISSP, CISM, or CEH. Experience with UEBA, machine learning and AI in threat detection. Familiarity with global financial systems and regulations. A track record of More ❯
Controls, BSI, MITRE ATT&CK) Demonstrated ability to lead cross-functional teams and manage large-scale cybersecurity initiatives Relevant certifications such as PMP, CISM, CISSP, ISO 27001 Lead Implementer/Auditor are highly desirable Bachelor's or Master’s degree in Cybersecurity, InformationSystems, Engineering, or related field Understanding More ❯
Controls, BSI, MITRE ATT&CK) Demonstrated ability to lead cross-functional teams and manage large-scale cybersecurity initiatives Relevant certifications such as PMP, CISM, CISSP, ISO 27001 Lead Implementer/Auditor are highly desirable Bachelor's or Master’s degree in Cybersecurity, InformationSystems, Engineering, or related field Understanding More ❯
track informationsecurity risk. Ability to develop policies, standards, and guidelines. ISO27001:2022 Lead Implementer and lead auditor certifications are a must. CISA, CISM, CISSP, or CRISC certifications are desirable. Candidate Characteristics: Exceptional communication and interpersonal skills. Analytical mindset with the ability to identify, assess, and mitigate risks. Good More ❯
CK framework. Skilled in incident response, threat hunting, SLA management, and executive communication. Preferred Qualifications Degree in Computer Science, InfoSec, or related field. Certifications: CISSP, CISM, GIAC (e.g., GCFA, GNFA), or OT certs (e.g., GICSP, ISA/IEC 62443). Familiarity with cloud security tools, IT/OT integration More ❯