with industry security standards (ISO27001, NIST, CCM etc) Network and infrastructure experience. API gateway security, WAF and IDS, SSO, SAML etc At least one professional security certification e.g. CISSP, CEH, GCIH, GCFA , CSSLP etc or working towards Pre-requisites: Excellent analytical skills with the ability to see the bigger picture Excellent communication skills with the ability to influence multiple stakeholders More ❯
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
a supportive, inclusive, and collaborative culture. Assess the team’s capabilities and identify areas of improvement – constantly! Hold relevant certifications such as some of: CISSP, CISA, CYSA+, Security+, CISM, CEH, Microsoft Security (SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerability management tools, SIEMs More ❯
in a cloud-based environment, specifically Microsoft 365 Excellent problem-solving skills and the ability to work under pressure in a fast-paced environment. Relevant certifications (e.g., CISSP, CISM, CEH, Proofpoint certifications) are highly desirable. Proficiency in scripting or automation (e.g., Python, PowerShell) for security operations is an advantage. Mandatory Skills: Proofpoint Email Security.Experience: 5-8 Years.Reinvent your world. We More ❯
management • Can assist and provide technical input to research, discover, implement hardware and software • Understands importance and fundamentals of logistics and evidence handling • CertifiedEthicalHacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: o Offensive Security Certified Professional (OSCP) o GIAC Response and Industrial Defense (GRID … o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce CouncilCertifiedEthicalHacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC Information Security Fundamentals) o CISSP (Certified Information System Security Professional) • Additional certifications at an equivalent may also be considered. More ❯
management • Can assist and provide technical input to research, discover, implement hardware and software • Understands importance and fundamentals of logistics and evidence handling • CertifiedEthicalHacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: o Offensive Security Certified Professional (OSCP) o GIAC Response and Industrial Defense (GRID … o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce CouncilCertifiedEthicalHacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC Information Security Fundamentals) o CISSP (Certified Information System Security Professional) • Additional certifications at an equivalent may also be considered. More ❯
management • Can assist and provide technical input to research, discover, implement hardware and software • Understands importance and fundamentals of logistics and evidence handling • CertifiedEthicalHacker (CEH), GIAC Certified Incident Handler (GCIH), or relevant IT technology certification Examples of other certifications include: Offensive Security Certified Professional (OSCP) GIAC Response and Industrial Defense (GRID) CERT Certified Computer Security Incident Handler ECC CEH (Electronic Commerce CouncilCertifiedEthicalHacker) GCIH (GIAC Certified Incident Handler) GISF (GIAC Information Security Fundamentals) CISSP (Certified Information System Security Professional) • Additional certifications at an equivalent may also be considered. More ❯
that you develop with teammates, stakeholders, and intelligence consumers These Qualifications Would be Nice to Have: JCAC (Joint Cyber Analysis Course), Network+, Security+, CertifiedEthicalHacker (CEH), Microsoft Networking, Computer Network Administrator (CNA), Certified Information Systems Security Professional (CISSP), Information Systems Security Engineering Professional (ISSEP), CertifiedEthical Hacking, and Certified Information Systems Auditor More ❯
Linux Operating Systems Strong analytical skills Strong verbal and written communication skills DESIRED SKILLS: Knowledge of and experience with securing cloud-based systems CertifiedEthicalHacker (CEH) certification Scripting knowledge Understanding of regular expressions EDUCATION AND EXPERIENCE: Twenty (20) years experience as an ISSE on programs and contracts of similar scope, type, and complexity is required Master More ❯
standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetration testing and vulnerability assessments; certifications such as CEH (CertifiedEthicalHacker) are an advantage Solid hands-on experience managing and administering SIEM platforms for threat detection and incident analysis. Strong interpersonal and communication skills, with the More ❯
countermeasures. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), CertifiedEthicalHacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
STAR 2259 Cloud Architect Position Requires ACTIVE TS/SCI Clearance with Polygraph Chantilly The maximum number of FTEs is two (2). Actual FTE bid, labor category, and skill level is at the discretion of the Contractor. INTRODUCTION: The More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
A-Level or equivalent (required) HND or Degree in Computer Science, Ethical Hacking, or Digital Forensics (preferred) One or more of the following certifications: OSCP , OSWA , GPEN , GWAPT , CEH , CRT , CCT-WEB , CCT-INF, CSSL, CCSM Work Authorisation: We are not able to support work visas. Benefits: Casual dress Cycle to work scheme Free parking Financial support for professional More ❯
a similar role ️ Strong knowledge of security frameworks, risk management, and cybersecurity protocols ️ Experience with firewalls, VPNs, IDS/IPS, and endpoint security solutions ️ Certifications such as CISSP, CISM, CEH, or equivalent highly valued ️ Excellent communication skills to interact with technical and non-technical stakeholders More ❯
/IPS, VPNs, SIEM) ️ Experience with cloud security and hybrid environments (AWS, Azure, GCP) ️ Hands-on experience with security incident response and vulnerability management tools ️ Certifications such as CISSP, CEH, CompTIA Security+, or Cisco Security certifications are highly desirable More ❯
security and infrastructure operations Experience with security tools (e.g., SIEM, IDS/IPS, endpoint security) Familiarity with ISO 27001, GDPR, or other compliance framework. Security certifications (e.g., CISSP, Security+, CEH) are an advantage C1+German and good English proficiency Benefits Secure position in a well-established organization Flexible working model (on-site and hybrid options) Access to professional development platforms and More ❯
including how attackers operate and how to spot signs of compromise (e.g., suspicious files, unusual behaviour, or known attack patterns) Relevant cyber security or networking certifications (e.g., CompTIA Security+, CEH, Cisco, etc.) Qualifications & Clearance: Must be a sole British national SC cleared and eligible for DV clearance (or already DV cleared) What We Offer: Competitive salary based on experience Annual More ❯
communicate to senior leaders and technical peers Experience with RMF, STIGs, SCAP, or NIST frameworks Ability to document and explain complex security processes clearly Relevant certifications such as Security+, CEH, CISSP, GCIA are a plus More ❯
an advantage Development & Progression This role provides structured career progression toward senior leadership, supported by ongoing personal and professional development opportunities. Access to paid training, certifications (e.g. CISSP, CISM, CEH), and tailored leadership programs ensure continuous skill advancement and career growth. Key Attributes Transparent, proactive, and collaborative work style Adaptive problem-solver with a commitment to innovation Growth mindset, committed More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
MISP, Analyst Notebook, or TIP/SIEM platforms (e.g., Splunk) Preferred Qualifications: Prior DoD or IC experience in CTI or cyber operations Certifications such as GCIA, GCTI, GREM, GCFA, CEH, or Security+ Experience with malware analysis, reverse engineering, or digital forensics Familiarity with cyber policy and compliance frameworks (e.g., NIST, DoD RMF, STIGs) Work Environment: Primary location: Huntsville, AL - on More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
OSAAVA Services
MISP, Analyst Notebook, or TIP/SIEM platforms (e.g., Splunk) Preferred Qualifications: Prior DoD or IC experience in CTI or cyber operations Certifications such as GCIA, GCTI, GREM, GCFA, CEH, or Security+ Experience with malware analysis, reverse engineering, or digital forensics Familiarity with cyber policy and compliance frameworks (e.g., NIST, DoD RMF, STIGs) Work Environment: Primary location: Huntsville, AL - on More ❯
independently and as part of a team. o Strong attention to detail and a commitment to delivering high-quality work. Preferred Qualifications: Certifications: Relevant industry certifications such as OSCP, CEH, CISSP, or GPEN. Experience: Prior experience in a DoD or intelligence community environment is highly desirable. Knowledge: Familiarity with offensive security techniques and frameworks, such as Metasploit or Cobalt Strike. More ❯
Intrusion Detection and Response, Cybersecurity Incident Responder/Handler type role. Minimum of one IAT Level 1 security industry specific certifications (8570 Baseline Certifications) i.e. A+, Network+, Security +, CEH, CySA+, GCIH, GCIA, GCFE, GREM, GCFA, GSEC, CISSP, CCNA (Security) or equivalent Certifications. Full understanding of Tier 1 responsibilities/duties and how the duties feed into Tier 2. The More ❯
min. 5 years of experience in the field of cybersecurity and information risk management. You have a master degree or equivalent by experience. Having cybersecurity related certification (e.g. CISSP, CEH, CISM, CISA, GIAC, GSEC) is a plus. Having experience in leading and executing IT audit, IT internal control, and IT risk consulting engagements, leveraging IT governance and control frameworks such More ❯
with and influencing senior leaders and stakeholders. Educated to degree level standard or able to demonstrate working to degree level and ideally hold recognised Information Security qualification (e.g. CISSP, CEH, CISM, GIAC) Ability to complete UK Government Security Clearance (SC) process successfully What's in it for you We know that the support and commitment of our staff is key More ❯
transformations aligned with DoD and federal cybersecurity standards. Location: Mark Center, Alexandria, Virginia Clearance: TS/SCI Certifications: Preferred Certifications (One or more required): CompTIA Security+ CISSP CISM CCSP CEH CCSK Requirements: U.S. Citizenship TS/SCI Advanced degree in Computer Science, Cybersecurity, Systems Engineering, or a related technical field. (Additional years of experience and cybersecurity certifications may substitute for More ❯