DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: Offensive Security Certified Expert (OSCE) Offensive More ❯
DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: Offensive Security Certified Expert (OSCE) Offensive More ❯
DoD cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Auditor certifications: CEH CySA+ CISA GSNA CFR PenTest+ Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: Offensive Security Certified Expert (OSCE) Offensive More ❯
cybersecurity policies Strong ability to communicate clearly and succinctly in written and oral presentations Must possess one or more of the following DoD 8570.01-M CSSP Infrastructure Support certifications: CEH CySA+ GICSP SSCP CHFI CFR Cloud+ CND Must possess Offensive Security Certified Professional (OSCP) certification Must possess one or more of the following certifications: GIAC Exploit Researcher and Advanced More ❯
other documentation required for high-risk systems. • Demonstrated ability to lead cross-functional teams in high-security environments and collaborate with government leads and stakeholders. • Certifications such as CISSP, CEH, GPEN, or CNSS-related credentials. • In-depth knowledge of supply chain risk management and its impact on national security. • Experience with federal cybersecurity policies, including DHS 4300B. • Hands-on experience More ❯
Master's degree plus 6 years of relevant experience. Degree must be in Computer Science, Computer Engineering, Information Systems, or related discipline from an accredited college or university. CISSP, CEH, SEC+, NET+, GIAC GREM and/or CREA Certification is required OR completion of one or more of the Reverse Engineer/Intrusion Analyst Courses (SANS FOR610, GCIH, GIAC, GCIA More ❯
forensics, information assurance, and/or systems engineering. Foreign Language may count toward experience requirements. Desired: Relevant Certs or Specialized Training would include (but not limited to): JCAC graduate, CEH, CFR, CySA+, GCIH, CNDSP Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All More ❯
procedures and industry best practices on complex systems Expertise in vulnerability assessment, control allocation and risk mitigation Preferred Skills and Education: Other cyber certifications (CISSP-ISSAP, CISSP-ISSEP, CCSP, CEH, OSCP, etc.) Top Secret/SCI security clearance by the Federal Government Understanding of offensive security tactics, techniques and procedures Experience with Cyber Failure Mode, Effects, and Criticality Analysis (FMECA More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown
Security management. Training/Qualifications (desirable) Cyber Security Leadership Qualification (GIAC GSTRT, CISM) Bachelors degree or higher in Computer Science or related field. Technical CTI Qualification, e.g. GIAC CTI, CEH Cloud (AWS/Azure) Certification, such as AWS GCP, AZ-900 Interview process This role will be a two-stage interview process, consisting of a competency/behavioural based interview More ❯
Employment Type: Permanent, Part Time, Work From Home
Exploitation Analyst. Level 4: At least 11 years of demonstrated experience within the Department of Defense (DoD) as an Exploitation Analyst. Technical Bachelor's Degree Relevant Certifications: Sec+, Net+, CEH, JCAC course Security Clearance: A current government clearance, background investigation, and polygraph are required. The Swift Group and Subsidiaries are an Equal Opportunity/Affirmative Action employer. All qualified applicants More ❯
related degree. 5 years of demonstrated experience designing and implementing Wired and Wireless Technology. 5 years of demonstrated experience with securing emerging cloud and hybrid cloud environments and technologies. CEH certification More ❯
Must have or be working towards OSCP/CRT or equivalent. Enthusiastic about cybersecurity, with excellent communication skills and a willingness to learn and develop. Certifications like CPSA, Sec+, CEH, Pentest+, PPNT. Industry cybersecurity experience. Experience with vulnerability scanning technologies. Eligible to work in the UK. Compensation and benefits Along with a competitive salary, great teams, and exciting career opportunities More ❯
practice in a safe, controlled environment. Industry Standards Alignment: Ensure that the course content aligns with industry-recognized certifications, such as CompTIA Security+, CertifiedEthicalHacker (CEH), Certified Information Systems Security Professional (CISSP), and others. Lab and Practical Component Oversight Cyber Lab Management: Oversee and manage the cyber lab environment, including setting up virtualized networks, attack … in Cybersecurity or a related discipline or significant industry experience. Certifications Required: At least one industry-recognized cybersecurity certification, such as CompTIA Security+, CertifiedEthicalHacker (CEH), CISSP, GIAC, or equivalent. Preferred: Multiple certifications demonstrating expertise across various areas (e.g., CISM, CISA, OSCP, GPEN). Experience Industry Experience: Minimum of 3-5 years of professional experience in More ❯
contributor to UK defence for 30+ years. We utilise a wide range of specialist engineering knowledge in our work, which includes the opportunities in architecting/concepting, MBSE, cryptography, CEH, cyber and secure networking. This team provides you with the opportunity to develop and enhance your skills and knowledge, with the potential to lead into more senior technical and managerial More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Adecco
skills.* Ability to balance security priorities with business objectives.* Self-driven and detail-oriented. Qualifications & Experience * Degree in Information Security, Computer Science, or equivalent experience.* Industry certifications (CISSP, CISM, CEH) highly desirable.* Proven experience in an information security role, ideally in a cloud-first environment.Key Responsibilities Security Advisory* Provide expert security input throughout project lifecycles.* Ensure security requirements are integrated … would always speak to you before discussing your CV with any potential employer. Keywords: Cyber Security, Azure Security, Cloud Security, ISO 27001, NIST, CIS, ZTNA, Threat Modelling, CISSP, CISM, CEH, Risk Management, Security Consultant, Information Security More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Adecco
skills. * Ability to balance security priorities with business objectives. * Self-driven and detail-oriented. Qualifications & Experience * Degree in Information Security, Computer Science, or equivalent experience. * Industry certifications (CISSP, CISM, CEH) highly desirable. * Proven experience in an information security role, ideally in a cloud-first environment. Key Responsibilities Security Advisory * Provide expert security input throughout project lifecycles. * Ensure security requirements are … would always speak to you before discussing your CV with any potential employer. Keywords: Cyber Security, Azure Security, Cloud Security, ISO 27001, NIST, CIS, ZTNA, Threat Modelling, CISSP, CISM, CEH, Risk Management, Security Consultant, Information Security More ❯
security clearance. • One of the following certifications: Red Hat Certified System Administrator (RHCSA); Splunk Certified Administrator; SolarWinds Certified Professional (SCP); Arcsight; Elastic Stack; RedSeal; ACAS; Linux+; CEH; Microsoft365 Fundamentals, SolarWinds NetFlow Traffic Analyzer Secondary Skills - Nice to Haves Data analysis Job Description . Our Analysis Team conducts network research and network analysis through AFNet monitoring and performance More ❯
management • Can assist and provide technical input to research, discover, implement hardware and software • Understands importance and fundamentals of logistics and evidence handling • CertifiedEthicalHacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: Offensive Security Certified Professional (OSCP) GIAC Response and Industrial Defense (GRID) CERT Certified Computer Security Incident Handler ECC CEH (Electronic Commerce CouncilCertifiedEthicalHacker) GCIH (GIAC Certified Incident Handler) GISF (GIAC Information Security Fundamentals) CISSP (Certified Information System Security Professional) • Additional certifications at an equivalent may also be considered. More ❯
management • Can assist and provide technical input to research, discover, implement hardware and software • Understands importance and fundamentals of logistics and evidence handling • CertifiedEthicalHacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: o Offensive Security Certified Professional (OSCP) o GIAC Response and Industrial Defense (GRID … o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce CouncilCertifiedEthicalHacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC Information Security Fundamentals) o CISSP (Certified Information System Security Professional) • Additional certifications at an equivalent may also be considered. More ❯
management • Can assist and provide technical input to research, discover, implement hardware and software • Understands importance and fundamentals of logistics and evidence handling • CertifiedEthicalHacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: o Offensive Security Certified Professional (OSCP) o GIAC Response and Industrial Defense (GRID … o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce CouncilCertifiedEthicalHacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC Information Security Fundamentals) o CISSP (Certified Information System Security Professional) • Additional certifications at an equivalent may also be considered. More ❯
ROLE OVERVIEW//We are recruiting for an experienced IT Security and Resilience Specialist to join the IT Infrastructure Engineering Team. Which is part of the Technology Department, and the wider Business Services function based at the firm’s More ❯
ROLE OVERVIEW//We are recruiting for an experienced IT Security and Resilience Specialist to join the IT Infrastructure Engineering Team. Which is part of the Technology Department, and the wider Business Services function based at the firm’s More ❯
ROLE OVERVIEW//We are recruiting for an experienced IT Security and Resilience Specialist to join the IT Infrastructure Engineering Team. Which is part of the Technology Department, and the wider Business Services function based at the firm’s More ❯
ROLE OVERVIEW//We are recruiting for an experienced IT Security and Resilience Specialist to join the IT Infrastructure Engineering Team. Which is part of the Technology Department, and the wider Business Services function based at the firm’s More ❯