required Previous experience working with cyber security. Strong expertise in VPNs, firewalls, security tools, ITIL, ISO27001, and Cyber Essentials. Certifications such as CompTIA Security+, CISSP, CISM, ITIL, VMware, or Microsoft 365 are highly desirable. A strategic mindset with the ability to assess threats and implement security improvements. Excellent troubleshooting More ❯
Bridlington, North Humberside, North East, United Kingdom Hybrid / WFH Options
KD Recruitment Limited
required Previous experience working with cyber security. Strong expertise in VPNs, firewalls, security tools, ITIL, ISO27001, and Cyber Essentials. Certifications such as CompTIA Security+, CISSP, CISM, ITIL, VMware, or Microsoft 365 are highly desirable. A strategic mindset with the ability to assess threats and implement security improvements. Excellent troubleshooting More ❯
Employment Type: Permanent, Work From Home
Salary: £50,000 - £55,000 25 days holiday, Hybrid working, death in service x
Bridlington, Carnaby, East Riding of Yorkshire, United Kingdom Hybrid / WFH Options
KD Recruitment
required Previous experience working with cyber security. Strong expertise in VPNs, firewalls, security tools, ITIL, ISO27001, and Cyber Essentials. Certifications such as CompTIA Security+, CISSP, CISM, ITIL, VMware, or Microsoft 365 are highly desirable. A strategic mindset with the ability to assess threats and implement security improvements. Excellent troubleshooting More ❯
leeds, west yorkshire, yorkshire and the humber, United Kingdom
LT Harper - Cyber Security Recruitment
auditing against security frameworks such as the ISO 27001 and NIST, PCI and advising on appropriate controls. If you have certs such as, CISM, CISSP – Great, but not essential – this is a place where attitude is valued as much as aptitude (perhaps more). Great communication skills, both verbal More ❯
candidate with: 5+ years of experience in security testing and assurance. A degree in computer science or similar experience. Relevant professional qualifications such as CISSP or Accredited Security Testing Professional. Strong understanding of informationsecurity principles, emerging threats, compliance frameworks, and risk management practices. Proven experience in developing and More ❯
security architectures. Good experience in Integrated Threat Management. Experience in conducting security assessments and audits to identify and mitigate risks. Relevant certifications such as CISSP, CISM, or CEH. Proficient in developing and enforcing security policies and procedures. Cognizant is an equal opportunities employer, and we welcome all applications regardless More ❯
Key Requirements Required Skills Minimum of 5 years' experience in Cyber Security, preferably within a pre-sales or consulting role Professional certifications highly desirable: CISSP, CEH, CCSE, CCNA, or vendor-specific certifications (Microsoft, Cisco, Check Point, Palo Alto, Fortinet). Show a similar chronology of demonstrable hands-on experience More ❯
security vendors, such as Palo Alto, Cisco, Crowdstrike, Fortinet, Zscaler and Netskope. Security Vendor Accreditations will be advantageous. Independent and relevant certifications (such as CISSP, CISM) are advantageous. Knowledge of industry frameworks such as NIST, DORA, Regulatory Compliance, Governance and standards are desired but not essential. Essential Attributes Self More ❯
Architecture & Service Transition team to ensure a consistent approach to embedding security into projects. PERSONAL PROFILE • Relevant academic or industry relevant qualifications such as CISSP, CISM • Experience and knowledge of InformationSecurity processes & technologies spanning networks, applications, mobile devices and web related technologies (web applications, web services, service orientated More ❯
Architecture & Service Transition team to ensure a consistent approach to embedding security into projects. PERSONAL PROFILE: Relevant academic or industry relevant qualifications such as CISSP, CISM. Experience and knowledge of InformationSecurity processes & technologies spanning networks, applications, mobile devices and web-related technologies (web applications, web services, service-oriented More ❯
experience, with strong knowledge of GITC and IT security controls. Experience with an accounting firm is preferred. Achieved or working towards CISA, CISM, or CISSP certification. University degree in technology, IT audit, or a related field. Fluent in spoken and written English (C1 level). Strong understanding of IT More ❯
experience, with strong knowledge of GITC and IT security controls. Experience with an accounting firm is preferred. Achieved or working towards CISA, CISM, or CISSP certification. University degree in technology, IT audit, or a related field. Fluent in spoken and written English (C1 level). Strong understanding of IT More ❯
and compare existing security products (e.g. Microsoft Defender vs. CrowdStrike). Collaborate closely with the Security Operations Centre (SOC) team. Professional certifications such as CISSP or CISM are highly desirable. More ❯
and compare existing security products (e.g. Microsoft Defender vs. CrowdStrike). Collaborate closely with the Security Operations Centre (SOC) team. Professional certifications such as CISSP or CISM are highly desirable. More ❯
and Insider Risk Management A good overall understanding of cyber and informationsecurity Certifications such as Microsoft SC-400, AZ-500, MS- 900, or CISSP preferred More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Context
with extensive knowledge of IS standards including ISO and NIST. Security assessment frameworks (threat modelling, controls assessment, risk assessment) Ideally hold a relevant qualifications; CISSP, CISM or similar. Understanding of TOGAF methodology would be beneficial, although is not a requirement. Some travel required between Birmingham and London. More ❯
Transition team to ensure a consistent approach to embedding security into projects. What do you need? Relevant academic or industry relevant qualifications such as CISSP, CISM Experience and knowledge of InformationSecurity processes & technologies spanning networks, applications, mobile devices and web related technologies (web applications, web services, service orientated More ❯
Transition team to ensure a consistent approach to embedding security into projects. What do you need? * Relevant academic or industry relevant qualifications such as CISSP, CISM * Experience and knowledge of InformationSecurity processes & technologies spanning networks, applications, mobile devices and web related technologies (web applications, web services, service orientated More ❯
architecture designs for systems intended for secure environments whilst ensuring the solution security design meets the customer functional and non-functional requirements. Essential Requirements: CISSP certification (or equivalent). Strong experience in cybersecurity architecture within MOD/government environments. Expertise in cyber risk management, security frameworks, and accreditation. Familiarity More ❯
architecture designs for systems intended for secure environments whilst ensuring the solution security design meets the customer functional and non-functional requirements. Essential Requirements: CISSP certification (or equivalent). Strong experience in cybersecurity architecture within MOD/government environments. Expertise in cyber risk management, security frameworks, and accreditation. Familiarity More ❯
and procedures • Data protection and privacy • Security change management • Understanding business continuity resilience and incidence response • Networks, core infrastructure and systems Desirable qualifications include: CISSP, CISM, CRISC, CCP #LI-UKA Together, as owners, let's turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect More ❯
Security Standards (ISO27002, NIST CSF). Understanding of SOC processes, Microsoft stack, and security frameworks. Knowledge of compliance guidelines and solution design. Relevant certifications (CISSP, CISM, CompTIA, CCNA) a plus. Familiar with vendors like Microsoft, Crowdstrike, Sophos, Fortinet, and Palo Alto. If this sounds like the job for you More ❯
Sentinel, Defender suite) and Palo Alto (e.g., Cortex XDR, Prisma) solutions. Comprehensive knowledge of cybersecurity solutions, services, and industry trends. Relevant certifications such as CISSP, CISM, Microsoft Security Certifications, or Palo Alto Certifications (e.g., PCNSE, Cortex XDR) are highly desirable. Bachelor's degree in informationsecurity, Computer Science, or More ❯