and broader risk governance. Location UK/Europe Person Specification Bachelor’s degree in IT/Computer Science desirable Technical certifications are desirable - CertifiedEthicalHacker (CEH) – ECCouncil; Certified Information Systems Auditor (CISA) – ISACA; Offensive Security Certified Professional (OSCP) – Offsec. Experience - essential Demonstrable compliance or operational experience in a similar role. Prior More ❯
Title: Cloud Security Architect Client: U.S. Army Location: Fort Belvoir, VA Responsibilities: • Responsible for guiding the design and implementation of secure solutions and services within the cloud. • Responsible for the successful configuration and implementation of cloud-based security solutions to More ❯
documentation that enables malware detection, signature creation, and mitigation. These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, CertifiedEthicalHacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), CertifiedEthical Hacking, and Certified Information Systems Auditor More ❯
Education: Bachelor's degree in a relevant field such as history, political science, sociology, or other social science disciplines. Preferred certifications: Security+ (SEC+), CertifiedEthicalHacker (CEH), Network+ (Net+), Certified Information Systems Security Professional (CISSP). Minimum 7 years' experience in cyber threat analysis. Clearance: Top Secret (TS) with Sensitive Compartmented Information (SCI) eligibility. Functional Requirements More ❯
regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), CertifiedEthicalHacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
technology skills, including proficiency with Mac, Windows, Linux, knowledge of OWASP top 10, web and mobile application security. Nice to haves: Your own bug bounty profile. Certificates such as CEH, CPT, CEPT, CPEN, OSWE, EWPT, or EWPTX are a plus. What is in it for you? Competitive salary 26 days of annual leave and Bank Holidays Top-notch Private Healthcare More ❯
The Sponsor supports a diverse set of corporate goals across the organization by conducting technical risk assessments and providing technical risk mitigation guidance on the use of various enabling technologies. The Sponsor requires subject matter expertise in technical risk analysis More ❯
Are you looking for a career where you can make a real difference in people's day? We are seeking an IT Cyber Security Analyst to join our team based in London, with hybrid working arrangements. Can you move people More ❯
1+ year of prior relevant experience. - Upbeat and positive attitude - Strong analytical and troubleshooting skills - Excellent written and verbal communication skills - Inquisitive, problem-solving oriented - Team player Desired Qualifications: - CEH, Security+ or relevant IT technology certification More ❯
file systems, memory structures, and common exploitation techniques. Ability to author clear, concise, and technically accurate documentation and reports. Preferred Qualifications: Relevant certifications such as GREM, OSCE, GXPN, or CEH Practical. Experience supporting federal cybersecurity programs or critical infrastructure defense. Familiarity with MITRE ATT&CK Framework, STIX/TAXII, and structured threat intelligence. Prior experience with threat hunting or supporting More ❯
adversary tactics, techniques, procedures, and technology. Correlating incident data to identify patterns and trends within cybersecurity incidents Preferred: Prior professional services or federal consulting experience Certifications (e.g., CompTIA Security+, CEH, CISSP) 10+ years experience within: Energy sector or other critical infrastructure industries. For individuals assigned and/or hired to work in California, Colorado, Hawaii, Jersey City, Nevada, New York More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetration testing CEH and Security+ or CSA+ Certification GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access More ❯
Information Security (IS) degrees may be considered relevant if the programs contain the amount and type of coursework equivalent to a Computer Science (CS) major. Certifications preferred: Sec+, Net+, CEH Must have experience in computer or information systems design/development/analysis roles, which may include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Woodside Staffing Solutions & Consulting
CCRI Team Lead and certification in penetration testing, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o CertifiedEthicalHacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Additional Qualifications: • Proven proficiency performing CCRI/vulnerability assessment/penetration testing on networks, databases, computer applications and IT frameworks. • Strong analytical … CCRI Team Lead and certification in penetration testing, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o CertifiedEthicalHacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Max Salary: 155K DLA DAI Apps Systems Support - Oracle More ❯
Microsoft Azure Lead Software Security Engineer with Development Background, .NET, Microsoft Stack Developer, DevSecOps, CISSP, CEH, CSSLP, Mainly Remote Software Security Engineer Lead is required to work for a fast-growing and exciting company based in Central London. However, this will mainly be remote and the expectation is to go into the office circa twice a week. Please read in … Experience Required: Demonstrable experience as a Systems Administrator or Software Developeror both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (CertifiedEthicalHacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product More ❯
Microsoft Azure Lead Software Security Engineer with Development Background, .NET, Microsoft Stack Developer, DevSecOps, CISSP, CEH, CSSLP, Mainly Remote Software Security Engineer Lead is required to work for a fast-growing and exciting company based in Central London. However, this will mainly be remote and the expectation is to go into the office circa twice a week. Please read in … Experience Required: Demonstrable experience as a Systems Administrator or Software Developer...or both! Expert knowledge of Cloud Software Security (NOT Networking or Infrastructure) Software Security related Certification such as CISSP, CEH (CertifiedEthicalHacker) or CSSLP (Certified Secure Software Lifecycle Professional) Passion for DevSecOps and with knowledge of Terraform, Bicep, Sonar Clous, Wiz, and other security product More ❯
analysis and recommendations. Strong understanding of compliance with Information Security laws, regulations, and policies. Preferred Certifications: CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (CertifiedEthicalHacker) CompTIA Security+ Security Qualifications: No security clearance required; Secret Clearance Preferred Must be a US Citizen Must pass a Federal Law Enforcement Background Investigation More ❯
writing skills Required Education: • BS Intelligence, Cybersecurity or related degree, or High School Diploma and 7 years of directly relevant experience. Desired Certifications: • CertifiedEthicalHacker (CEH) • CompTIA's Security Plus (SEC+) • Intelligence Analyst Certified (IAC) • Certified Threat Intelligence Analyst (C TIA) OPPORTUNITY Join an ELITE Cyber Team protecting the nation's critical infrastructure! This More ❯
excellent customer service and organization skills. • Possession of excellent oral and written communication skills. Preferred Certifications: • Certified Information Systems Security Professional (CISSP) • CertifiedEthicalHacker (CEH) • Certified SCADA Security Architect (CSSA) Related Control Systems. Abilities: • Exposure to computer screens for an extended period of time. • Sitting for extended periods of time. • Reach by extending hands More ❯
training courses. Ability to communicate effectively, both orally and in writing. Desired Qualifications: Bachelor's Degree in any Computer Science - related degree DIA - CMP- 2045: Privileged User Cybersecurity Responsibilities CEH (v10)- CertifiedEthicalHacker Joint Network Attack Course (JNAC) OSINT Awareness "AGILE" Course SAN: GCIH SANS: Penetration+ (PEN+) Red Hat Certified Professional OSCP/E: Offensive More ❯
large, complex networks. - Prior experience influencing internal stakeholders across organizational boundaries PREFERRED QUALIFICATIONS - Experience with programming languages such as Python, Java, C++ - CCSP (Certified Cloud Security Professional) or CEH (CertifiedEthicalHacker) or CFR (CyberSec First Responder) or Cloud+ or CySA+ (CompTIA Cybersecurity Analyst) or GCED (GIAC Certified Enterprise Defender) or GICSP (Global Industrial Cyber More ❯
security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM or CertifiedEthicalHacker (CEH) (desired). Security and Network technology experience. About us: We are an international engineering and construction company delivering state-of-the-art infrastructure and buildings projects for clients in the More ❯
Information Assistance Certification (GIAC) and GIAC Certified Incident Handler (GCIH). • Certification in one or more of the following: Certified Intrusion Analyst, CertifiedEthical Hacking (CEH) or Certified Information Systems Security Professional (CISSP) • DoD 8570.01 Information Assurance Technical 3 (IAT Level 3) certified • Foundational Cloud Certification • Must be familiar with RMF and its rules More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
leadership in a security functional role is essential. Recognised cyber security certifications and a track record of continuous professional development is preferred UK Cyber Security Council, NCSC, CISSP, CEH, SFIA etc. Deep technical knowledge of cyber security trends, threats, tools, and protocols -demonstratable vendor agnostic technical appreciation of both defensive and offensive Cyber Security with focus on Microsoft security More ❯
Splunk Certified Developer (nice to have) Splunk Enterprise Certified Admin (nice to have) Splunk Enterprise Security Certified Admin (nice to have) Any other Security Certifications (e.g. CEH, GIAC, CISSP, OSCP ) Soft Skills: Strong analytical skills to evaluate sophisticated multivariate problems and find a systematic approach to gain a quick resolution, often under stress Strong problem solving, documentation More ❯