Excellent communication, presentation, and interpersonal skills, with the ability to articulate technical concepts to non-technical audiences. Proven leadership and team management skills. Relevant professional certifications such as CISSP, CISM, ISO 27001 Lead Implementer or Lead Auditor are highly desirable. Experience with cloud security principles and practices. Familiarity with agile development methodologies. Experience in a software development environment. Strong analytical More ❯
best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in InformationSecurity, Computer Science, or a related field.- Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor.- Proven experience in informationsecurity management and conducting security audits.- Strong knowledge of informationsecurity frameworks and standards.- Excellent analytical and problem-solving skills.- Strong More ❯
Southampton, Hampshire, United Kingdom Hybrid / WFH Options
NICE
also have: A Master's degree in Cybersecurity, Risk Management, or related fields is a plus. Certifications (preferred or required): CertifiedInformation Systems Auditor (CISA) CertifiedInformationSecurityManager (CISM) CertifiedInformation Systems Security Professional (CISSP) ISO 27001 Lead Auditor or Implementer GIAC certifications (e.g., GIAC Certified Incident Handler - GCIH or GIAC Security Essentials - GSEC) What's in it for More ❯
Excellent communication, presentation, and interpersonal skills, with the ability to articulate technical concepts to non-technical audiences. Proven leadership and team management skills. Relevant professional certifications such as CISSP, CISM, ISO 27001 Lead Implementer or Lead Auditor are highly desirable. Desirable Attributes: Experience with cloud security principles and practices. Familiarity with agile development methodologies. Experience in a software development environment. More ❯
Excellent communication, presentation, and interpersonal skills, with the ability to articulate technical concepts to non-technical audiences. Proven leadership and team management skills. Relevant professional certifications such as CISSP, CISM, ISO 27001 Lead Implementer or Lead Auditor are highly desirable. Desirable Attributes: Experience with cloud security principles and practices. Familiarity with agile development methodologies. Experience in a software development environment. More ❯
london, south east england, united kingdom Hybrid / WFH Options
Sonata One
working knowledge of financial compliance frameworks (e.g., GLBA, SOX, FFIEC CAT, NYDFS). Familiarity with privacy regulations (GDPR, CCPA) and best practices in data governance. Certifications such as CISSP, CISM, CISA, CRISC, or Certified Data Protection Officer (CDPO) are highly desirable. We offer a collaborative and inclusive work culture that values innovation and diversity. Everyone has an important role to More ❯
cybersecurity projects, ensuring timely and cost-effective implementation. Stay up to date with evolving cybersecurity trends, regulations, and best practices. Degree in a relevant field or professional certification (CISSP, CISM, etc.). Strong understanding of cybersecurity challenges, industry standards (GDPR, ISO 27001, NIST CSF, Cyber Essentials), and risk management. Expertise in networking, operating systems, cloud computing, application security, and endpoint More ❯
london, south east england, united kingdom Hybrid / WFH Options
VML
running and managing heterogenous hardware (Apple, Intel), OS (OSX, Linux, Windows) and software environments. In-depth knowledge of cybersecurity principles, best practices, and relevant technologies. Professionally qualified e.g. CISSP, CISM or CISA. Experience with IT service management (ITSM) frameworks, such as ITIL. Other Skills & Abilities: Excellent leadership, communication, and interpersonal skills. Strong analytical, problem-solving, and decision-making abilities. Ability More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects and teams. Connect to your business -Enabling Functions Collaboration is central to everything we do at More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
of PowerBI or a similar dashboarding application. Knowledge of security systems (including working with SIEM data). SQL or database knowledge would be desirable. Relevant certifications such as CISSP, CISM, or CRISC (or equivalent) are preferred. Proven experience in managing and delivering technical projects and teams. Connect to your business -Enabling Functions Collaboration is central to everything we do at More ❯
compliance standards: ISO 27001, NIST, CIS, GDPR, HIPAA. Bonus: scripting/automation skills (Python, PowerShell, Bash). Deep understanding of Microsoft security technologies. Certifications such as CISSP, CEH, OSCP, CISM, or Security+ are highly desirable. Strong problem-solving, communication, and collaboration abilities. Ready to Make an Impact? Join us and be part of a security-first team committed to innovation More ❯
Experience developing cyber strategy and managing cyber risk in various organisational contexts. Desire to work with large organisations on the latest cyber security challenges. Relevant certifications like M.Inst.ISP, CISSP, CISM, CISA, or an MSc in cyber security or related fields. Practical experience in cyber architecture, GRC, threat management, vulnerability management, and security reviews. Attention to detail and strong problem-solving More ❯
contexts to develop cyber strategy and manage cyber risk. Desire to work with large organisations trying to solve the latest cyber security problems. Relevant certifications, such as M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management More ❯
initiatives. Familiarity with supply chain security due diligence and assessment processes. Ability to effectively engage and manage internal stakeholders to enhance informationsecurity maturity. Professional certifications such as CISSP, CISM, CISA, or CRISC are strongly preferred. Broad technical knowledge including SaaS, Cloud technologies, Software Development Life Cycle (SDLC), Vulnerability Management, Networking, and Identity and Access Management (IDAM). Other skills More ❯
london, south east england, united kingdom Hybrid / WFH Options
CLS Group
to apply them in diverse environments. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and More ❯
Crawley, Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
Directory and endpoint security, Outstanding communication skills verbally, written and face to face Hands-on experience with cybersecurity tools Any Informationsecurity certifications are highly desirable such as; CISSP, CISM, CISA Knowledge or experience of working in a regulated environment is desirable Experience of supporting a business with disaster recovery planning Experience of working within a Law firm or a More ❯
Crawley, West Sussex, United Kingdom Hybrid / WFH Options
Better Days Recruitment Ltd
Directory and endpoint security, Outstanding communication skills verbally, written and face to face Hands-on experience with cybersecurity tools Any Informationsecurity certifications are highly desirable such as; CISSP, CISM, CISA Knowledge or experience of working in a regulated environment is desirable Experience of supporting a business with disaster recovery planning Experience of working within a Law firm or a More ❯
Employment Type: Permanent
Salary: £65000 - £70000/annum Great company benefits
Cybersecurity, or related field (Masters preferred). 10+ years of progressive experience in informationsecurity, with at least 5 years in a leadership role. Industry certifications such as CISSP, CISM, CISA, or equivalent. In-depth knowledge of informationsecurity frameworks, risk management practices, and regulatory requirements. Strong leadership, communication, and stakeholder management skills. #J-18808-Ljbffr More ❯
contexts to develop cyber strategy and manage cyber risk. Desire to work with large organisations trying to solve the latest cyber security problems. Relevant certifications, such as M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management More ❯
london, south east england, united kingdom Hybrid / WFH Options
CLS-Group
to apply them in diverse environments. Qualifications and certifications: Degree in a technology discipline (Computer Science, Information Management, Computer Engineering, Cybersecurity or equivalent) Professional certifications such as CISSP, CISA, CISM, CRISC, SABSA, or equivalent. Deep expertise in risk management frameworks, including ISO 27001, NIST SP 800-53, and SANS Top 20 Critical Security Controls. Experience with cloud security solutions and More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
would take effect, after a 2 week office based induction.) Qualifications, Skills & Experience Bachelor's degree in Information Technology, Computer Science, or related field Professional security certifications (e.g., CISSP, CISM, or equivalent) Absolute minimum of 5 years experience in IT security roles with focus on infrastructure security Strong experience with Fortinet security products and solutions Advanced knowledge of Microsoft Active More ❯
contexts to develop cyber strategy and manage cyber risk. Desire to work with large organisations trying to solve the latest cyber security problems. Relevant certifications, such as M.Inst.ISP, CISSP, CISM, CISA or an MSc in cyber security or a related discipline. Practical experience across various areas of cyber security, such as cyber architecture, cyber GRC, cyber threat management, vulnerability management More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Thames Water Utilities Limited
delivering and maintaining critical and information asset registers. Risk Management: Exposure to or experience in information risk management practices. Desirable Technical Skills & Qualifications: Industry Certifications: Certifications such as CISSP, CISM, or CISA. Key Relationships & Interactions: CISO direct reports: Security Operations Manager, Security Architecture Manager, Security Governance Manager, Cyber Security Programme Manager, Cyber Resilience Manager CIO and CIO Direct Reports: Operational More ❯
and managing remote IT operations In-depth knowledge of IT infrastructure, cloud platforms, cybersecurity, and enterprise architecture Experience with governance frameworks (e.g., ITIL, COBIT) and relevant certifications such as CISM, CISSP, TOGAF, Agile, or PRINCE2 Excellent leadership, strategic thinking, and communication skills Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act (Exceptions Order More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
National Grid plc
Significant experience in cyber security Strong Cloud knowledge and demonstrable experience - (Azure) Relevant cyber security qualification(s), for example CertifiedInformation Systems Security Professional (CISSP), CertifiedInformationSecurityManager (CISM), Certified in Risk and Information Systems Control (CRISC) - CISSP preferred. Must possess expertise in one or more of the following key areas: Networking: Understand fundamental networking principles, potential attack vectors More ❯