cyber intelligence. * Strong technical background in cybersecurity, including hands-on experience in security monitoring, threat detection, and digital forensics. * Certifications such as GCTI, GCIA, GCIH, CISSP, or equivalent (preferred). * Experience working with global teams and managing security incidents across multiple regions. * Knowledge of cloud security (AWS, Azure, GCP) and More ❯
cyber intelligence. Strong technical background in cybersecurity, including hands-on experience in security monitoring, threat detection, and digital forensics. Certifications such as GCTI, GCIA, GCIH, CISSP, or equivalent (preferred). Experience working with global teams and managing security incidents across multiple regions. Knowledge of cloud security (AWS, Azure, GCP) and More ❯
response, threat intelligence, and multi-tenant SOCs Excellent leadership, communication, and client engagement skills Bonus Points for Certifications such as CISSP, CISM, GIAC (GSOM, GCIH), Microsoft SC-200 Experience in MSP or MSSP environments Passion for continuous learning and innovation in cybersecurity Why Join Us? Work with industry-leading tech More ❯
and ISO 27001. 🎓 Qualifications & Certifications Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience. Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+. 🌟 Why Work With Us? 💸 Competitive Salary & comprehensive benefits package. 🎓 Professional Development support, including certification sponsorship. 🏡 Flexible Working – hybrid options available. 🧠 Innovative More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Franklin Fitch
and ISO 27001. 🎓 Qualifications & Certifications Bachelor’s degree in Cybersecurity, IT, or a related field – or equivalent experience. Certifications such as GIAC GMON, GCIA, GCIH, CEH, CySA+, or Security+. 🌟 Why Work With Us? 💸 Competitive Salary & comprehensive benefits package. 🎓 Professional Development support, including certification sponsorship. 🏡 Flexible Working – hybrid options available. 🧠 Innovative More ❯
Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are More ❯
Control Management Security Tools: SIEM, IDS/IPS/WAF, Firewalls, and Endpoint Protection Cloud Security Concepts Relevant certifications (CISSP, CISM, CEH, OSCP, GIAC, GCIH, GCFA, or similar) preferred Tradition do not accept agency CV’s. Please do not forward CV’s to our employees or Talent team. Tradition are More ❯
are/have: Fluency in both speaking and writing English Third Level qualification (or equivalent) in information technology, Information Security or Engineering CISSP, CCSP, GCIH, GIAC (SANS), CCNP, Splunk certificates and/or other relevant security/Network type engineering certifications Experience of analysis and correlation toolsets. Including data extraction More ❯
proactive risk management. - Certifications (Preferred): - Certified Information Systems Security Professional (CISSP) - Certified Information Security Manager (CISM) - GIAC Security Operations Certified (GSOC) - CertifiedIncidentHandler (GCIH) Additional Information: - Work Environment: - This role may require availability outside of standard business hours, including evenings and weekends, to respond to critical security incidents. - The More ❯
Information Systems, related field or equivalent training and/or experience. Hold an industry recognised information security qualification such as GIAC/GCIA/GCIH, CISSP or CompTIA Advanced Security Practitioner (CASP+) and/or SIEM-specific training and certification. An understanding and knowledge of compliance and regulatory frameworks such More ❯
basic XDR platforms. Familiar with OSINT techniques for threat intelligence and incident investigation. Holds or is working toward relevant certifications such as CISSP, CySA+, GCIH, and CASP, with a degree/diploma in Cyber Security or equivalent experience. Experienced in SOC environments and eligible for SC/DV clearance with More ❯
and Professional Experience University Degree/Diploma in Cyber Security or Equivalent experience Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH Desirable IT certifications such as CASP or ITIL Experience in a SOC or SOC equivalent SC/DV clearance Other Requirements Be willing to undertake More ❯
wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling More ❯
detection Familiarity with threat actors, TTPs, and incident response processes Ability to clearly communicate technical risks to non-technical audiences Relevant certifications (e.g., GCTI, GCIH, GCIA) are a plus This is a great opportunity for someone looking to take the next step in a cyber-focused career in a complex More ❯
and Professional Experience University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH (Desirable). IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements Full Driving Licence. More ❯
and Professional Experience: University Degree/Diploma in Cyber Security or Equivalent experience. Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH Desirable. IT certifications such as CASP or ITIL. Experience in a SOC or SOC equivalent. SC/DV clearance. Other Requirements: Full Driving Licence. Fluent More ❯
Malware analysis experience and digital forensics experience is a plus Certification of Cyber Security, Forensic and Incident Response is a plus (CISSP, ECSA, GISP, GCIH, GCFE, GCFA) We need you to be flexible, fast moving, adaptable and down-to-earth and an expert in multi-tasking. Very good communication skills More ❯
ATT&CK Bonus: You've worked with version control for detection rules, or done some detection-as-code ✅ Nice-to-Haves Certs like GCIA, GCIH, CEH, GNFA, GCFA Familiarity with frameworks like Sigma or KQL A side interest in threat hunting or malware behavior 📈 What You’ll Impact How quickly More ❯
and log analysis. - University Degree/Diploma in Cyber Security or Equivalent experience - Other IT certifications or experience such as CISSP, COMPTIA CySA+, GCIA, GCIH To be considered please submit an up to date CV. Due to the nature and urgency of this post, candidates holding or who have held More ❯
Managed security service provider (MSSP) experience is a plus Certifications or work toward any of the following is strongly desired: GIACCertifiedIncidentHandler (GCIH) GIACCertified Intrusion Analyst (GCIA) GIACCertified Forensic Analyst (GCFA) GIACCertified Forensic Examiner (GCFE) GIAC Network Forensic Analyst (GNFA) Cisco Certified Network Associate (CCNA More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
analysis and its integration into response strategies. Ability to manage multiple high-priority incidents in a fast-paced environment. Certifications such as CGIH, CISM, GCIH, or GCFA are highly desirable. More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯
threat landscapes. A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber More ❯