Manchester, North West, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
through the deployment where required; ability to write and review reports, procedures, and standards Desirable skills and experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
through the deployment where required; ability to write and review reports, procedures, and standards Desirable skills and experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
through the deployment where required; ability to write and review reports, procedures, and standards Desirable skills and experience: Industry recognized security qualification (e.g., CISSP, CISM, CISMP, SSCP, CISA, ISACA, CEH, CompTIA Security+, etc.) Industry recognized technology certification (e.g., MCSE, CCDP, CCIE, RHCA, etc.) Knowledge and understanding of UK government protective more »
Cambridge, England, United Kingdom Hybrid / WFH Options
Opus Talent Solutions
intrusion detection systems. Excellent communication and leadership skills, with the ability to collaborate effectively across diverse teams and stakeholders. Relevant certifications such as CISSP, CISM, or CRISC are highly desirable. Additional: You must be within a commutable distance of Cambridge to adhere to their hybrid working on 2 days per more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
protocols, including TCP/IP, DNS, and HTTP/S. Desirable attributes (not essential) • Professional certifications such as AWS CertifiedSecurity - Specialty, CISSP, or CISM preferred • Experience with security tools such as AWS GuardDuty, WAF, Security Hub, Inspector, Qualys, Wiz.io • Proficiency in scripting languages such as Python, Bash, or PowerShell more »
Greater London, England, United Kingdom Hybrid / WFH Options
Luware
or central logging solutions (MS Sentinel a plus) Qualifications in the field of Computer Science, or equivalent industry experience Recognised certifications such as CISSP, CISM, AZ-500, including knowledge of industry best-practice, guidelines and certification standards such as CIS, NIST, ISO 27001 and SOC 2 Server infrastructure support/ more »
NIST, ISO 2700X ) (Preferred) Experience in informationsecurity management reporting and related methodologies (Preferred) InformationSecurity and/or Information Technology industry certification (CISSP, CISM, or equivalent) (Preferred more »
architecture, policies, and procedures. Required Qualifications: Bachelor's degree in InformationSecurity, Computer Science, or a related field. Professional certifications in cybersecurity (eg, CISSP, CISM) are preferred. Minimum of 5 years of experience in security architecture with a strong focus on cryptographic solutions. Extensive experience with Thales HSMs and EDR more »
organisational environment. Proven ability to assess and mitigate informationsecurity risks, conduct security audits and assessments, and respond to security incidents. CISSP, CRISC, CCSP, CISM, PCI ISA, TOGAF or CISA are highly desirable. more »
and implementing successful security programs. Deep understanding of security frameworks and standards (e.g., NIST, CIS, ISO 27001). Recognised InformationSecurity qualifications (e.g., CISA, CISM, CISSP, CRISC, GCCC or CGEIT). Hands-on experience with security tools and technologies. Excellent communication, collaboration, and leadership skills. A passion for security and more »
written communication skills Strong ability to communicate and present cybersecurity, risk and compliance matters effectively to C-Level individuals Relevant certifications such as CRISC, CISM, (ISC)2, or CISSP are highly desirable Ability to apply regulatory, policy, and contract requirements in practical work Analytical aptitude with an emphasis on critical more »
stakeholders ranging from C-level executives to business and technical teams . Excellent communication, presentation and collaboration skills. Industry qualifications (CCSK, CEH, CCSP, GICSP, CISM, CISA, SABSA) would be desirable. Candidates who are having connects with CISO levels are preferable. Knowledge on any of the platforms such as Nozomi Network more »
Effective leadership and communication skills, with the ability to lead a team and collaborate with stakeholders at all levels. Relevant certifications such as CISSP, CISM, or GIAC are highly desirable. Must be eligible for UK eyes only security clearance. Join our team and become part of our mission to defend more »
motivated, and organised; Ability to work to customer and internal deadlines; Ability to work effectively across cross-functional teams; Relevant certifications such as CISSP, CISM, or Microsoft certifications are advantageous. Disability Confident Transparity have a proactive attitude when it comes to looking after the wellbeing and inclusion of all our more »
development initiatives. Excellent communication and presentation skills, with the ability to articulate complex technical concepts to non-technical stakeholders. Relevant certifications such as CISSP, CISM, or CISA are highly desirable A proactive, results-oriented mindset with a passion for delivering high-quality solutions. Benefits: In addition to a competitive salary more »
Naturally, you’ll also need to be a Leader in the Cyber Security field too and ideally have some certifications too such as CISSP, CISM, CEH etc. The team is made up of some great Cyber technical talent, so you’ll have a fantastic team at your disposal from Day more »
Enterprise Security Architect Location: Glasgow (Remote within UK) The opportunity to join a world leading engineering business working at the forefront of sustainable and efficient mining operations. This is an influencing role for an Enterprise Security Architect to play a more »
Milton Keynes University Hospital NHS Foundation Trust
understanding of secure network architectures, experience with encryption and security protocols, and familiarity with threat modelling and risk assessments. Relevant certifications such as CISSP, CISM, CEH, or equivalent are highly desirable. Strong analytical skills to identify security threats and implement effective solutions. Ability to explain complex security issues to non … months. Person Specification Qualifications and knowledge Essential IT related degree or equivalent qualification/relevant experience Understanding of InformationSecurity principles. Desirable CISSP, CISM or Security + Certification Industry standard IT qualifications e.g. Microsoft, Cisco, ITIL Knowledge of the Data Protection Act Experience Essential A working Knowledge of Health Computing more »
Manager (CRM), and/or CertifiedInformation Privacy Technologist (CIPT), CertifiedInformation Systems Security Professional (CISSP), Information Governance Professional (IGP), CertifiedInformationSecurityManager (CISM) and CertifiedInformation Systems Auditor (CISA more »
SIEM. Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
Keynsham, England, United Kingdom Hybrid / WFH Options
IVC Evidensia
in Informationsecurity and technology, and motivated to learn new technologies. bachelor’s degree in informationsecurity or industry-recognised security certifications (e.g. CISSP, CISM, CISA, CRISC, ISO27001 lead implementor, ISO27001 auditor). Next Steps: After receiving your CV and being shortlisted, you will be contacted by one of our more »
clear and concise manner. Qualifications and Skills: Bachelor's degree in Computer Science, Information Technology, or related field. Advanced degree or certifications (e.g., CISSP, CISM, CEH) preferred. Proven experience (5+ years) in cybersecurity architecture, design, and implementation. Deep understanding of cybersecurity principles, technologies, and best practices. Experience with security frameworks more »
security tools, techniques, and controls. Experience with metrics and KPIs to measure and track cyber risk. Ability to develop policies, standards, and guidelines. CISA, CISM, or CRISC certifications are desirable. Candidate Characteristics: Excellent project management skills. Exceptional communication and interpersonal skills. Analytical mindset with the ability to identify, assess, and more »
a Microsoft SecOps-specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) and/or cyber security industry certification(s) such as CISSP, CISM, or CCSP. If you are Security, Cyber or SOC professional looking for a role which gives you new challenges, opportunity for growth and the chance more »
industry. Strong interpersonal skills and experience of developing strong relationships and significant influencing abilities, within a large corporate environment. Relevant cyber qualifications, e.g. CISSP, CISM, CRISC. For more information, please forward your CV to: tom.haussrer@greshamhunt.com more »