of ISO 27001 beneficial but not essential. Understanding of UK data protection law and its practical application within a security programme. Security certifications (e.g. CISSP, CISM, CCSP, GIAC/SANS, AWS Security Specialty, or similar) are a plus. Ability to build effective working relationships across technical and non-technical stakeholders. Strong analytical, communication, and problem-solving skills. Experience supporting More ❯
technologies to monitor and protect data and equipment from attacks.We're Looking for Teammates With: Bachelor's degree in computer science or a related field is required. CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity More ❯
and providing remediation options for application and technology risks Knowledge of Agile methodologies is a must Knowledge of backend and frontend web application vulnerabilities Knowledge of OWASP Top 10, SANS Top 25 etc Experience working in AWS/Azure/GCP would be beneficial Knowledge of Ci/CD pipelines Thorough understanding of SAST, DAST (including fuzzing), endpoint and More ❯
vulnerability management program Strong technical expertise in implementing a Prioritizationformula to vulnerabilities and misconfigurations and translating these into risks Excellent knowledge of Vulnerability Management frameworks such as NIST/SANS The following general characteristics are required: A team player with the ability to work independently and unsupervised Ability to own delegated tasks and see them through to completion Ability More ❯
ID, Palo Alto, Cisco), enterprise architecture and cloud architecture with one cloud platform. Preferred qualifications: Certification in one or more of the following: CompTIA Security ; CompTIA Network ; ISC2 (CISSP); SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT); CISCO (CCNA); EC-Council (CEH, LPT). Experience communicating remediation recommendations and strategies to technical staff, executive leadership, legal More ❯
ID, Palo Alto, Cisco), enterprise architecture and cloud architecture with one cloud platform. Preferred qualifications: Certification in one or more of the following: CompTIA Security+; CompTIA Network+; ISC2 (CISSP); SANS-GIAC certification (GSEC, GCIH, GCED, GCFA, GCIA, GNFA, GPEN, GWAPT); CISCO (CCNA); EC-Council (CEH, LPT). Experience communicating remediation recommendations and strategies to technical staff, executive leadership, legal More ❯
members on detection techniques and processes Qualification/Requirements Desired Qualifications: Bachelor's Degree in Computer Science or "STEM" Majors (Science, Technology, Engineering and Math) CISSP, CISM or related SANs or Industry certifications Desired Expertise: - Relevant Cyber or IT related experience in client and server environments. Infrastructure management and support - Understanding of CND-based analytical models (Kill Chain, ATT More ❯
on efficiency, automation, and continuous improvement. Strong documentation skills and experience working in cross-functional teams (e.g., HR, Legal, Risk). Relevant certifications preferred: ITPM, GCITP, PMP, CISSP, GCIH, SANS, GIAC Additional Information Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what More ❯
Huntingdon, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
IPS, micro-segmentation, and host security. Hands on experience with the following security products Trellix, Ivanti, ClearSwift, Yubikey Understanding of secure coding practices and common vulnerabilities (OWASP Top 10, SANS Top 25). Expertise in identity and access management (IAM), including RBAC, ABAC, JWT and Cookie based authentication. Incident detection and response in MOD environments. Security compliance and regulatory More ❯
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harvey Nash
and privacy policies and regulations General knowledge of security technology Nice to have: Experience with PowerBI Programming skills and experience (python, java, SQL) Technical network skills Knowledge of OWASP, SANS, NIST, ISO 27001, ISF or other security-related practices Previous Banking/Financial Industry experience CISSP, CISA, CRISC, CSSLP, SABSA certifications Skills & Competencies: Vulnerability management Risk reporting Programming Data More ❯
. SC Clearance (essential); must be eligible for DV clearance . UK nationality only (sole nationality required for this role). Relevant certifications (e.g. CompTIA Security+, CySA+, AWS, MS, SANS, CISSP ) are desirable but not essential-hands-on experience is key. Security Clearance Requirements This role requires current SC clearance and eligibility for Developed Vetting (DV) . To meet More ❯
managing a backlog of security findings and remediation work. Excellent knowledge of technology environments, including information security, building security, and defence solutions, backed by multiple industry certifications such as SANS/GIAC GSEC, ISC2 CISSP or SSCP, ISACA CISM or CISA. Considerable knowledge of business theory, business processes, management, budgeting, and business office operations. Excellent interpersonal, organisational and administrative More ❯
projects. - Have a passion to learn and thrive in a dynamic and constantly changing environment. - Experience with virtualisation technologies, especially with AWS services. - Relevant industry certifications such as CISSP, SANS, ISC2, CompTia, etc. - Maturity, judgment, negotiation/influence skills, analytical skills, and leadership skills. - Demonstrated knowledge of web protocols, common attacks, and working knowledge of Linux/Unix tools More ❯
Maidenhead, Berkshire, United Kingdom Hybrid / WFH Options
APM Terminals
essential. Proven self-learning abilities demonstrated through research, GitHub projects, bug hunting, active participation in public cybersecurity forums, or high scores on platforms like HTB, Immersive Labs, TryHackMe, and SANS CTF is desirable. Bonus Points: Knowledge of reverse engineering tools (disassemblers, decompilers, debuggers) and processes (unpacking malware, reconstructing code logic, etc) is desirable Some programming experience for example, C More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Proactive.IT Appointments Limited
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
security best practices, and system hardening. Solid understanding of IT systems and protocols such as networks, domain management, and virtualized environments. Holds or is working towards certifications like CISSP, SANS GCIA, CompTIA Security+, CCNA/CCNP, or similar. Knowledge of ISO27001, Cyber Essentials, and AAF frameworks is a plus. Due to the volume of applications received for positions, it More ❯
PREFERRED QUALIFICATIONS - Experience triaging and developing security alerts and response automation, conducting front-line analysis, and providing escalation support. - 3+ years of information security experience. - Relevant industry certifications from SANS, ISC2, etc. - Strong demonstrated knowledge of Unix tools and architecture. - Experience working as part of a Computer Security Incident Response Team (CSIRT) - Familiarity/experience with AWS services and More ❯
Access technologies and networking products. Experience in assessing controls based on COBIT or other leading technology risk management and governance control framework. Experience in assessing controls based on NIST, SANS, ISO27000 or other leading cyber security framework. Very good presentation and report writing skills. Producing draft reports that require minimal changes. Qualifications: University degree in a technology related discipline More ❯
well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc. • Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & Access Management Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident More ❯
well as a deep understanding of cyber security regulations as they apply to different sectors Analysis and management of risks and cybersecurity controls. Standards and methodologies: ISO 27000, NIST, SANS CSC, etc Understanding of Infrastructure, Networking and Cloud environments Knowledge in Identity & Access Management Knowledge in Backup & Recovery technologies and installation Previous experience working with or within an Incident More ❯
and work procedures related to project management (i.e., program management tools, e.g. MSFT Project/Visual Studio, Jira, Confluence, Slack). Relevant industry certifications (possibly PMP, SAFe, CSCP, CISSP, SANS/GIAC, CompTIA, Microsoft, Linux, Cisco) - Technology Breadth: able to demonstrate knowledge in a range of technologies from cloud migration patterns, microservices, security/governance, DevOps, and data analytics. More ❯
5+ years of experience in application security, with a proven track record of identifying and remediating vulnerabilities Expertise: Strong understanding of secure coding practices, including OWASP Top 10 and SANS 25 Most Critical Software Errors Automated Testing: Experience with static and dynamic application security testing tools Penetration Testing: Proficiency in penetration testing methodologies, including black-box, gray-box, and More ❯
at the enterprise level. Demonstrated successful implementation of security control frameworks and standards such as ISO 27001, COBIT, ITIL, NIST. Certification in Information Security relevant areas such as CISSP, SANS and/or equivalent business experience in a matrix Organisation. High level of personal integrity with the ability to professionally handle highly sensitive and confidential situations. Ability to easily More ❯