communication skills and a talent for building strong stakeholder relationships Experience in security assurance across services like SOC, SIEM, IAM, and more Professional certifications (CISM, CISSP, ISO27001 Audit) highly desirable You’ll be part of a dynamic, purpose-driven team in a pivotal role protecting our business from regulatory risk. More ❯
skills with the ability to explain technical concepts to non-technical stakeholders Experience with supplier management and budget control Relevant IT certifications (e.g., CISSP, CISM, or equivalent) are preferred but not required. Experience working in a global organisation with multiple international offices is highly desirable More ❯
Governance and risk functions with a focus on identifying, assessing, and mitigating risks IT Risk and Compliance, Audit, or Quality certifications desirable (e.g. CISSP, CISM, CISA, CIA, CRISC, CGEIT, CIAC, ISO, etc.). Ability to develop and maintain risk registers, control libraries, and compliance documentation. Strong analytical skills to assess More ❯
Bournemouth, Dorset, United Kingdom Hybrid / WFH Options
LV=
other related policies Qualifications: •Bachelor's degree in informationsecurity, Computer Science, or a related field (or equivalent experience) •Professional certifications such as CISSP, CISM, or equivalent (or equivalent experience) •Extensive experience in informationsecurity management, including strategy development and operational oversight •Strong understanding of regulatory requirements and compliance standards More ❯
foundation in informationsecurity , with experience delivering security solutions for large-scale infrastructure or integration projects. Familiarity with leading security certifications , such as CISSP, CISM, IISP/CCP, TOGAF, or SABSA. Proven ability to design and implement secure architectures in complex, dynamic environments. Experience in identity management, network security, cloud More ❯
communication and engagement across departments. Experience with technology process, risk and control frameworks. IT Risk and Compliance, Audit, or Quality certifications desirable (e.g. CISSP, CISM, CISA, CIA, CRISC, CGEIT, CIAC, ISO, etc.). Excellent interpersonal, consultative and communication skills. Ability to interact effectively at all levels with clients, consultants, vendors More ❯
on-site. Key Skill Requirements: Experience in IT leadership, AI Technology and Digital Strategy. Strong understanding of data protection regulations and CyberSecurity best practice. CISM/CISA/CISSP etc are a plus. What you'll do: Information Technology and Leadership: Develop and execute digital strategies and IT policies, aligning More ❯
on-site. Key Skill Requirements: Experience in IT leadership, AI Technology and Digital Strategy. Strong understanding of data protection regulations and CyberSecurity best practice. CISM/CISA/CISSP etc are a plus. What you'll do: Information Technology and Leadership: Develop and execute digital strategies and IT policies, aligning More ❯
Defender suite) and Palo Alto (e.g., Cortex XDR, Prisma) solutions. Comprehensive knowledge of cybersecurity solutions, services, and industry trends. Relevant certifications such as CISSP, CISM, Microsoft Security Certifications, or Palo Alto Certifications (e.g., PCNSE, Cortex XDR) are highly desirable. Bachelor's degree in informationsecurity, Computer Science, or a related More ❯
vendors, such as Palo Alto, Cisco, Crowdstrike, Fortinet, Zscaler and Netskope. Security Vendor Accreditations will be advantageous. Independent and relevant certifications (such as CISSP, CISM) are advantageous. Knowledge of industry frameworks such as NIST, DORA, Regulatory Compliance, Governance and standards are desired but not essential. Essential Attributes Self-driven and More ❯
existing security products (e.g. Microsoft Defender vs. CrowdStrike). Collaborate closely with the Security Operations Centre (SOC) team. Professional certifications such as CISSP or CISM are highly desirable. More ❯
existing security products (e.g. Microsoft Defender vs. CrowdStrike). Collaborate closely with the Security Operations Centre (SOC) team. Professional certifications such as CISSP or CISM are highly desirable. More ❯
Manchester Area, United Kingdom Hybrid / WFH Options
Oscar
to technical risks Present and advise stakeholders as the cybersecurity SME. Required Skills E5 Security-Up Compliance Microsoft Security Architect Expert (SC1000 CISSP/CISM Certification BizzDesign/Archi, or UML Visualisation Experience ISO 27001 Apply Now! If you are a Security Architect specialising in Microsoft Security, ready to embark More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Oscar
to technical risks Present and advise stakeholders as the cybersecurity SME. Required Skills E5 Security-Up Compliance Microsoft Security Architect Expert (SC1000 CISSP/CISM Certification BizzDesign/Archi, or UML Visualisation Experience ISO 27001 Apply Now! If you are a Security Architect specialising in Microsoft Security, ready to embark More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Oscar Associates (UK) Limited
to technical risks Present and advise stakeholders as the cybersecurity SME. Required Skills E5 Security-Up Compliance Microsoft Security Architect Expert (SC1000 CISSP/CISM Certification BizzDesign/Archi, or UML Visualisation Experience ISO 27001 Apply Now! If you are a Security Architect specialising in Microsoft Security, ready to embark More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms More ❯
AWS, Azure, GCP security review experience. ISO 27001 auditing/implementation experience. Experience of scoping penetration tests. Other cyber security certifications such as Security+, CISM, CISSP, ECSA, CREST CCT. What We Can Offer: We’re determined to create an engaging work culture that delivers a healthy work-life balance and More ❯
skills and keen attention to details. Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) CertifiedInformationSecurityManager (CISM) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information assurance system architecture and engineer (IASAE) It is prerequisite More ❯
Project management skills are a strong plus. Preferred Certifications: ForgeRock Certified Specialist/Professional Ping Identity Certified Professional Relevant IAM or Security certifications (CISSP, CISM, etc. More ❯