assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
assessments. Proficient in information security risk and governance frameworks (ISO 27005, EBIOS) Information Security and/or Information Technology industry certification (CISSP, CISM, CRISC, GIAC, CISSP or equivalent). Responsibilities (will include but not be limited to): Review submission of IS Criticality Assessment (ISCA) questionnaire. Determine high level security requirements More ❯
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. So, if you feel your skills and experience align More ❯
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. So, if you feel your skills and experience align More ❯
Engineering, or a related technical discipline.Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent.Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms.Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK CNI More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
a related technical discipline. Recognised cybersecurity certifications: CISSP, CISM, CISA, GICSP, SABSA, or equivalent. Technical certifications or training aligned to OT security: IEC 62443, GIAC GRID/GICSP, SCADA/ICS security, or vendor-specific OT platforms. Understanding of relevant UK regulatory frameworks, including NIS/NIS2 Regulations and UK More ❯
Good reasoning skills and the ability to clearly identify key issues. Desirable: CISSP, CISM or other equivalent foundational security qualifications or experience. CEH, OSCP, GIAC or other penetration testing security qualifications or experience. SABSA, SANS or other technical architecture qualifications. SAFE, Scrum, or other Agile methodology experience. Data Protection, Risk More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
of the methodologies to conduct threat-modelling exercises on new applications and services At least one of: CISSP, CISA, CISM, TOGAF, relevant SANS/GIAC certifications or similar. Direct, hands-on experience or a strong working knowledge of vulnerability management tools. Experience within Higher Education desirable. More ❯
or equivalent experience) in Cybersecurity, Computer Science, Software Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or application security (CompTIA, ISC2, GIAC, ISACA, or CREST). Highly desirable are certifications related to secure development and cloud security (CSSLP, AZ-500, SC-100/SC-200, AWS Security More ❯
Bolton, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Reed Technology
Customer focus to ensure internal stakeholder needs are met Project Delivery background CISSP, CISM or other equivalent foundational security qualifications or experience CEH, OSCP, GIAC or other penetration testing security qualifications or experience SABSA, SANS or other technical architecture qualifications SAFE, Scrum, or other Agile methodology experience Data Protection, Risk More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
changing environment Qualification Broad technical knowledge of cyber security controls demonstrated by attainment of appropriate qualifications e.g. CISSP, ISO27001 Lead Implementor or relevant SANS GIAC or equivalent Knowledge of the NIST framework, PCI DSS, GDPR and NIS as well as NCSC cyber guidance. Experience working in an agile delivery environment More ❯
Degrees or Certifications ● Preference on one or more of the following technical certifications: Certified Information Systems Security Professional (CISSP), Offensive Security Certified Professional (OSCP), GIAC Certified Incident Handler (GCIH), GIAC Certified Forensic Analyst (GCFA), GIAC Reverse Engineering Malware (GREM), MCFE, EnCE or equivalent certifications ● Hands-on experience with Penetration Testing More ❯
Manager (CISM) Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) Health Care Information Security and Privacy Practitioner (HCISPP) GIAC Certified Intrusion Analyst (GCIA) GIAC Security Leadership Certificate (GSLC) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) InformationMore ❯
in Cybersecurity, Information Security, Computer Science, Network Engineering, or a related technical discipline. Recognised industry certifications in cybersecurity or infrastructure security (CompTIA, ISACA, ISC2, GIAC, Microsoft, CREST, Cisco Security, or equivalent). Certifications in security governance and frameworks: ISO/IEC 27001, NIST CSF, CAF, or CIS Controls. Additional vendor … AWS, Azure, Microsoft, GCP, Palo Alto, CrowdStrike, Tenable) are advantageous. OT/ICS/SCADA-focused certifications: IEC 62443, GRID/GRID+ (SANS/GIAC), GICSP, or equivalent industrial cybersecurity training are desirable. Essential skills Strong understanding of core cybersecurity principles, risk management, and control implementation in critical infrastructure environments. More ❯
standards etc. Relevant industry certifications like: Global Industrial Cybersecurity Professional (GICSP) Certified Information Systems Security Professional (CISSP) ISA/IEC 62443 Cybersecurity Fundamentals (IC32) GIAC Certified Incident Handler (GCIH) GIAC Cyber Incident Leader (GCIL) Personal: Besides the professional qualifications of the candidates, we place great importance in various forms of More ❯
e.g., OWASP API Top 10). Familiarity with DevSecOps practices and tools. One or more certifications: CSSLP, CISSP, OSWE, CREST CRT/CCT App, GIAC GWAPT. Apply Today: If you're a proactive security expert with a passion for secure software development, apply now to join a collaborative and mission More ❯
Experience of TIBER-EU engagements Valid right to work in the UK without sponsorship Any relevant certification is a plus but not essential: GRTP, GIAC, CRTA, CRTE, CCRTS, MRT, CRTP, OSCE, OSCP Perm hire £50-80k salary depending on experience level APPLY TODAY More ❯
london, south east england, United Kingdom Hybrid / WFH Options
TRIA
Experience of TIBER-EU engagements Valid right to work in the UK without sponsorship Any relevant certification is a plus but not essential: GRTP, GIAC, CRTA, CRTE, CCRTS, MRT, CRTP, OSCE, OSCP Perm hire £50-80k salary depending on experience level APPLY TODAY More ❯
detection/prevention systems. Familiarity/Knowledge of the Perdue Enterprise Reference Architecture (PERA) Certifications for SANS (SysAdmin, Audit, Network and Security) GIAC (GlobalInformationAssuranceCertification) Global Industrial Cyber Security Professional (GICSP), GIAC Response and Industrial Defense (GRID), Critical Infrastructure Protection are preferable. Certified SCADA Security Architect (CSSA) preferable More ❯