addition to the above the following are desirable: Consulting or equivalent background. Understanding of malware and the modern threat landscape. Relevant certifications (e.g. CISSP, certifications from Microsoft, ISC2, ISACA, SANS, GIAC, EC-Council etc. or equivalent). Exposure to/Understanding of DevOps tools and repositories (e.g. Git, Azure Dev Ops, Kubernetes, Docker, Jenkins, Ansible etc.). Role based More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
Arm Limited
wellbeing and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling third-party vendors and external security partnerships for large More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux for effective vulnerability assessment and penetration testing. Apply knowledge of OWASP Top 10 and SANS Top 25 vulnerabilities and communicate methodologies with development teams. Skills, Experience, and Abilities Required: Essential: Proficient with pen testing tools such as Cobalt Strike, Caldera, Atomic Red Team, Pentera … experience in information security, with a focus on technical cyber security. Minimum of 5 years' experience in a network/cloud security environment. Certifications such as CISSP, CCSP, OSCP, SANS or equivalent. Certification in one or more cloud vendor offerings (AWS, GCP, Azure, OCI). More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
complex technical security concepts to technical and non-technical audiences including executives. Perform technical quality reviews and conduct technical conversations directly with clients. Confident with OWASP Top 10 and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerability assessment … years of experience in information security, with a focus on Technical Cyber Security domain Minimum of 5 years experience in a network/cloud security environment. CISSP, CCSP, OSCP, SANS or equivalent desirable Certification in one or more cloud vendor offerings such as AWS, GCP, Azure, OCI. More ❯