ability to manage competing priorities across multiple teams. Qualifications & Experience: Minimum of 3 years’ experience in a similar security architecture or consulting role. Essential: CISSP or CISM certification Industry-recognised higher education qualification Desirable: Cloud security certifications (AWS, Azure, GCP) ITIL, ISO27001 or other service delivery certifications More ❯
experience with industry security standards (CCM, NIST, ISO, PCI, CIS, etc.) You should have certification in Information/Cloud Security, for example CCSP, CCSK, CISSP, CISA etc. You should have the ability to navigate operational security issues, applying due rigour and security best practice to arrive at sensible recommendations More ❯
london (tottenham), south east england, United Kingdom
Palo Alto Networks
years of deep technical knowledge and technical support with a strong customer focus or related experience Advanced certifications such as CCIE/JNCIE/CISSP– an advantage Excellent written and spoken communication skills, strength with establishing relationships Ability to independently debug broad, complex, and unparalleled networks with mixed media More ❯
years of deep technical knowledge and technical support with a strong customer focus or related experience Advanced certifications such as CCIE/JNCIE/CISSP– an advantage Excellent written and spoken communication skills, strength with establishing relationships Ability to independently debug broad, complex, and unparalleled networks with mixed media More ❯
years of deep technical knowledge and technical support with a strong customer focus or related experience Advanced certifications such as CCIE/JNCIE/CISSP– an advantage Excellent written and spoken communication skills, strength with establishing relationships Ability to independently debug broad, complex, and unparalleled networks with mixed media More ❯
estate for threats and alerts and are capable of responding to issues Person Specification: Possesses relevant and current industry qualifications and certifications (e.g. CISM, CISSP). Educated to degree level in a relevant technical area or equivalent industry experience Security domain specific experience showing progression through a number of More ❯
. Familiarity with cloud Technology and IT infrastructure. Framework Expertise: Strong knowledge of NIST frameworks (CSF, 800-53) and CIS Controls . Certifications: CRISC, CISSP, CISM, or CISA preferred (equivalent experience considered). More ❯
Excellent communication and collaboration skills to engage with engineering, product, and leadership teams. Preferred Qualifications Security certifications such as OSCP, GIAC (GWEB, GWAPT, GCSA), CISSP, or CSSLP. Experience working in SaaS, and multi-tenant cloud environments. Knowledge of machine learning security (AI/ML model risks, LLM security best More ❯
Familiarity with regulatory frameworks: NIST, GDPR, etc. Proficiency in technical documentation (MS Word, Visio, PowerPoint, Excel). Strong stakeholder engagement and communication skills. Desirable: CISSP, CISM, CompTIA Security+, or a recognised Vendor Certification. If you are passionate about cryptography and PKI, and you're ready to take the next More ❯
improvements. Participate in security audits and assessments. Stay updated with the latest cybersecurity trends, threats, and technologies. Qualifications Relevant certifications (e.g., CompTIA Security+, CEH, CISSP) are desirable. Technical Proficiency Strong understanding of IT security tools (SIEM, EDR, XDR), threat detection, and log analysis. Familiarity with scripting (Python, PowerShell, KQL More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Experis UK
Terraform, PowerShell, Ansible) Software-defined networking DevOps practices and CI/CD pipelines Service desk software customisation Web administration/development Certifications such as CISSP, CCNA/CCNP, M365/Azure Cyber Security, or AWS architecture qualifications are highly desirable. Work Environment 40 hours per week (flexible start/ More ❯
eye for detail. Ability to adapt to changing regulations and industry trends. Willingness to travel as needed. Bonus points for: Professional certifications (e.g. CISA, CISSP, CISM, CRISC). Experience with regulatory frameworks (e.g. NIST, PCI DSS, SOX). The Riverflex Advantage: Competitive Salary & Benefits: We offer a competitive compensation More ❯
related administration and support roles Must be able to attain and hold National Security Vetting to a minimum of SC level Desirable ITIL, CISA, CISSP an advantage but not required Expertise in incident management, troubleshooting, and system performance monitoring Experience with SAP S/4HANA Public Cloud edition Proficiency More ❯
manage multiple projects and workstreams in a fast-paced environment. Strong problem-solving skills and the ability to drive strategic initiatives. Relevant certifications (e.g., CISSP, CISM, CRISC, PMP, PRINCE2 ) are a plus. More ❯
Portsmouth, yorkshire and the humber, united kingdom
TalentHawk
manage multiple projects and workstreams in a fast-paced environment. Strong problem-solving skills and the ability to drive strategic initiatives. Relevant certifications (e.g., CISSP, CISM, CRISC, PMP, PRINCE2 ) are a plus. More ❯
and SASE knowledge. Cloud related certifications across AWS/GCP/Azure. Cloud IAM native experience across AWS/GCP/Azure. CISM/CISSP/CRISC/ISO 27001 LI/LA/CISA. Experience of core control frameworks, such as, NIST, SANS Top 20 CSC, ISO More ❯
in informationsecurity, specifically within security operations, with proven experience in a leadership or management role. Relevant certifications such as CISSP (CertifiedInformationSystemsSecurityProfessional), CISM (CertifiedInformationSecurity Manager), or CISA (CertifiedInformationSystems Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT More ❯
positively influence diverse stakeholders and team members. Excellent attention to detail and the ability to create clear, concise, and engaging presentations InformationSecurity certification (CISSP, CISM or equivalent) Experience in articulating IS risks in business language and advising on the appropriate risk management action Experience in informationsecurity management More ❯
across operational areas may be required. PERSON SPECIFICATION Knowledge: A Levels or equivalent. Recognised qualification in informationsecurity, data protection, or risk (e.g. CISM, CISSP, CRISC, BCS DPO, etc.). In-depth understanding of ISO 27001, NIST, or other relevant security frameworks. Up-to-date knowledge of data protection More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Cyber Talent Limited
vulnerability scanners, and code analysis tools (SonarCloud, Snyk, Chekov) Strong knowledge of network security, encryption, identity and access management, and application security. Certifications (Preferred): CISSP, CISM, or equivalent for security architecture expertise. Certifications in cloud security (e.g., CCSP) or DevSecOps methodologies. Please click APPLY NOW and I will send More ❯
a bonus. Experience with Microsoft Defender products and Microsoft Sentinel is advantageous. Certifications (Desirable but not Essential): CISMP (Advantageous) SC-900, AZ-900 (Advantageous) CISSP, CISM (Advantageous) SC-200, SC-300, SC-400, AZ-500 (Advantageous More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
FCDO Services
a culture of good practice. Naturally, youll have a substantial track record in informationsecurity and information risk management, with professional qualifications such as CISSP/CESG and CISA/CISM/CRISC, plus expertise in ISO27001 compliance. But its your communication and stakeholder management skills that set you More ❯
Bracknell, Berkshire, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
zScaler. Experience securing cloud platforms with tools like CASB, CSPM, SSPM, especially GCP and Security Command Center. Formal security qualifications such as a degree, CISSP, or similar. Additional Information: The application process involves uploading a CV and answering questions, which should be prepared in advance. Internal applicants can view More ❯
us: Degree in either Computer Science, InformationSecurity, Law or Privacy Professional qualifications and industry experience in InformationSecurity/Cyber, such as CISM, CISSP and CISA are highly desirable Knowledge of current informationsecurity related standards or regulations Deep and ever-evolving experience in Cyber and InformationSecurityMore ❯
Three Lines of Defence Model and its application. Knowledge of vulnerability management and Identity and Access management. A recognised IS qualification (e.g. CISA, CISM, CISSP, ISO 27001 Lead Auditor). Our Values: • We care about the safety of everyone. • We respect each other and the wider communities we work More ❯