tailored for individuals looking to gain practical, job-ready skills in protecting digital assets and systems. The bootcamp aims to enhance participants' abilities in areas such as network security, ethicalhacking, incident response, and security operations, enabling them to secure new or higher-value opportunities in the cybersecurity field. You will be responsible for delivering engaging and interactive … have working experience or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) EthicalHacking and Penetration Testing (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS More ❯
tuning via detailed log analysis, false positive detection and mitigation, and making tuning and configuration recommendations. The ideal candidate will have experience in SOC or CSIRT and AppSec or EthicalHacking for in-depth log analysis and have previously worked with at least three major WAF vendors such as Akamai, F5, AWS, GCP, etc. Key Responsibilities Identification and … strong understanding of web application security principles. Proven track record of proactively identifying and mitigating false positives to optimize WAF performance. Background in SOC or CSIRT and AppSec or EthicalHacking, demonstrating hands-on experience for the key responsibilities Proficiency in log analysis tools and techniques, with the ability to identify patterns and anomalies in web traffic Experience More ❯
a hands-on, penetration testing-focused training course to adult learners and career changers. What You'll Do: Teach live, online sessions focused on penetration testing , vulnerability scanning , and ethicalhacking Help learners understand core cyber principles and real-world offensive security techniques Deliver engaging and accessible training sessions remotely, Monday to Thursday, 6pm to 9pm (12 hours … teaching, 4 hours planning per week) What We're Looking For: Hands-on experience with penetration testing , network security , or ethicalhacking Experience teaching or mentoring others in a technical environment Must have the right to work in the UK This is an exciting chance to use your expertise to help train the next generation of cyber professionals More ❯
a hands-on, penetration testing-focused training course to adult learners and career changers. What You'll Do: Teach live, online sessions focused on penetration testing , vulnerability scanning , and ethicalhacking Help learners understand core cyber principles and real-world offensive security techniques Deliver engaging and accessible training sessions remotely, Monday to Thursday, 6pm to 9pm (12 hours … teaching, 4 hours planning per week) What We're Looking For: Hands-on experience with penetration testing , network security , or ethicalhacking Experience teaching or mentoring others in a technical environment Must have the right to work in the UK This is an exciting chance to use your expertise to help train the next generation of cyber professionals More ❯
a hands-on, penetration testing-focused training course to adult learners and career changers. What You'll Do: Teach live, online sessions focused on penetration testing , vulnerability scanning , and ethicalhacking Help learners understand core cyber principles and real-world offensive security techniques Deliver engaging and accessible training sessions remotely, Monday to Thursday, 6pm to 9pm (12 hours … teaching, 4 hours planning per week) What We're Looking For: Hands-on experience with penetration testing , network security , or ethicalhacking Experience teaching or mentoring others in a technical environment Must have the right to work in the UK This is an exciting chance to use your expertise to help train the next generation of cyber professionals More ❯
in Computer Science, Cybersecurity, Information Technology, or a related field is often advantageous. Entry-level certifications (optional but beneficial) that demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO 27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs More ❯
Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are an advantage Solid hands-on experience managing and administering SIEM platforms for threat detection and incident analysis. Strong interpersonal and communication skills, with the ability to collaborate … based in? Select Do you have experience working to ISO 27001 standards? Select Do you require sponsorship to work in the UK? Select Do you have work experience in EthicalHacking? Select Are you willing to work in the office 3 days a week? This is a mandatory requirement. Select More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
or equivalent experience Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
or equivalent experience Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
awareness training Requirements Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
awareness training Requirements Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
Demonstrable experience as a Systems Administrator or Software Developer...or both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product like Trivy Experience with cloud More ❯
good old fashioned Unix/Linux Systems Administrator…or someone who has worked as a Senior .NET Developer and has a Software Security Certification like: like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
Employment Type: Permanent
Salary: £75000 - £80000/annum Negotiable depending on experience
a good old fashioned Unix/Linux Systems Administrator...or someone who has worked as a Senior .NET Developer and has a Software Security Certification like: like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
a good old fashioned Unix/Linux Systems Administrator...or someone who has worked as a Senior .NET Developer and has a Software Security Certification like: like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
qualifications: Bachelor's degree or equivalent practical experience. 2 years of experience in similar SOC related roles, explicitly in responding to and actioning on security incidents. Certification in Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC) or Computing Technology Industry Association Security (CompTIA Sec ). Experience in technical troubleshooting and writing code in one or more programming languages. More ❯
Demonstrable experience as a Systems Administrator or Software Developeror both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product like Trivy Experience with cloud More ❯
a good old fashioned Unix/Linux Systems Administratoror someone who has worked as a Senior .NET Developer and has a Software Security Certification like:like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional),We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
a good old fashioned Unix/Linux Systems Administratoror someone who has worked as a Senior .NET Developer and has a Software Security Certification like:like CISSP, CEH (Certified Ethical Hacker) or CSSLP (Certified Secure Software Lifecycle Professional), We want someone with a development/some form of coding background who has blossomed into Software Security/Cloud Security More ❯
career path and learning budget to help set you up for success. Join a company that's making a real impact. In addition to our sustainability goals, we empower ethical hackers from all backgrounds to earn a living. Be yourself! Our international team celebrates individuality and places a strong focus on diversity and inclusion. We are the proud winners More ❯
career path and learning budget to help set you up for success. Join a company that's making a real impact. In addition to our sustainability goals, we empower ethical hackers from all backgrounds to earn a living. Be yourself! Our international team celebrates individuality and places a strong focus on diversity and inclusion. We are theproud winners of More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
Camden, Greater London, Camden Town, United Kingdom
ITOL Recruit
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯
This official, accredited training consists of online training, practical training and an official exam (CompTIA Security+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and future direction. Cybersecurity Role Once you have completed all the mandatory training in step four and have gained two More ❯