ability to present complex and sensitive issues to senior management, and influence change. Preferred qualifications capabilities and skills Degree and background in Technology Related professional certification such as CISA, CISSP, or CIA #J-18808-Ljbffr More ❯
and best practices. Experience with security auditing and compliance. Excellent problem-solving and analytical skills. Strong communication and teamwork abilities. Relevant certifications such as CertifiedInformationSystemsSecurityProfessional (CISSP) or IBM Certified Specialist. Person specification: Negotiating, client facing, communication, assertive, team leading/team member skills, supportive. #J-18808-Ljbffr More ❯
strategy, architecture, solution design and Sec in DevSecOps. Who we’re looking for The successful candidate will be able to demonstrate the below: - Industry recognised security and architecture accreditation (CISSP-ISSAP, TOGAF, SABSA, SANS (GICSP), Senior CAP (Architect) or similar) - Extensive demonstratable cyber technology and domain technology specific experience, ideally supported by vendor specific accreditations - Experience leading a high More ❯
Docker, Kubernetes, etc.). Familiarity with security frameworks and standards (e.g., CIS benchmarks, NIST 800-53, SOC 2). Relevant certifications are a plus (e.g., AWS Security Specialty, CCSP, CISSP). What we offer Play a key role in shaping the cloud and infrastructure security landscape of a global SaaS and IoT product environment. Work closely with cloud and More ❯
varying levels of experience An eagerness and track record in establishing and leading high-performance teams and supporting and coaching individual team members Relevant industry certification such as CISA, CISSP, CISM, CGEIT, ITIL, PMP, PRINCE2 or other specialised IT certifications What we look for You’ll be a trusted business advisor to our clients, specialising within the Technology Risk More ❯
Ensure different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Certifications such as CEH , OSCP , CISSP are advantageous. Vulnerability Testing Scan systems for vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test from a secure coding perspective. Ensure compliance with More ❯
requirements. Integration Testing Ensure different modules interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Certifications like CEH, OSCP, CISSP are advantageous. Vulnerability Testing Scan systems for vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test from a secure coding perspective. Ensure compliance with More ❯
Testing Ensure different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Certifications like CEH, OSCP, CISSP are advantageous. Vulnerability Testing Scan systems for vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding perspective. Ensure compliance More ❯