Sales Acumen - Contributing to security proposals and driving business growth. A Bachelors or Master's degree (or equivalent) in a relevant subject is preferred but not critical. Security certifications: CISSP, CISM, GIAC, PCIRM or equivalents. Architecture certifications: SABSA, TOGAF or equivalents. Cloud & security vendor certifications ( AWS, Azure, GCP or equivalents). Connect to your business - Technology and Transformation Distinctive More ❯
Sales Acumen - Contributing to security proposals and driving business growth. A Bachelors or Master's degree (or equivalent) in a relevant subject is preferred but not critical. Security certifications: CISSP, CISM, GIAC, PCIRM or equivalents. Architecture certifications: SABSA, TOGAF or equivalents. Cloud & security vendor certifications ( AWS, Azure, GCP or equivalents). Connect to your business - Technology and Transformation Distinctive More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Sales Acumen - Contributing to security proposals and driving business growth. A Bachelors or Master's degree (or equivalent) in a relevant subject is preferred but not critical. Security certifications: CISSP, CISM, GIAC, PCIRM or equivalents. Architecture certifications: SABSA, TOGAF or equivalents. Cloud & security vendor certifications ( AWS, Azure, GCP or equivalents). Connect to your business - Technology and Transformation Distinctive More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Sales Acumen - Contributing to security proposals and driving business growth. A Bachelors or Master's degree (or equivalent) in a relevant subject is preferred but not critical. Security certifications: CISSP, CISM, GIAC, PCIRM or equivalents. Architecture certifications: SABSA, TOGAF or equivalents. Cloud & security vendor certifications ( AWS, Azure, GCP or equivalents). Connect to your business - Technology and Transformation Distinctive More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Anson McCade
with frameworks such as MITRE ATT&CK, NIST, and CIS . Strong communication and presentation skills, with the ability to work across technical and business teams. Relevant certifications (e.g., CISSP, GIAC, SC-200, Splunk, IBM QRadar Specialist, Chronicle Security Engineer) are advantageous. Cloud security knowledge (AWS, Azure) and ITIL processes is desirable. Ability to participate in a 24/ More ❯
processes, and procedures. Minimum 5 years’ Experience as a Security consultant, Security Architect or equivalent. Hold any Certification like Palo Alto PCNSA/PCNSE, F5, CompTIA, Zscaler, Azure, AWS, CISSP, CCSP, ISSAP, ITIL etc., Mandatory Skills: Palo Alto Networks - Firewalls . Experience: 5-8 Years . Reinvent your world. We are building a modern Wipro. We are an end More ❯
such as NIS2, DORA, or FCA and Bank of England standards. Understanding of how Generative AI will impact cybersecurity at both strategic and operational levels. Relevant industry certifications (e.g., CISSP, CISM, CompTIA Security+) are a plus. Background in consulting or hybrid roles combining consulting and in-house cybersecurity. Ability to navigate complex matrix environments and influence internal and client More ❯
Strong analytical and troubleshooting skills with a track record of delivering practical solutions. Preferred: Bachelor's or Master's degree in Computer Science, Cybersecurity, or related fields. Security certifications (CISSP, CISM, CCSP, GSLC, etc.). Active membership in professionalsecurity associations (ISSA, ISACA, InfraGard, etc.). Information collected and processed through your application with INSPYR Solutions (including any job More ❯
Digital Forensics, Cyber Security, or equivalent years of professional experience or equivalent relevant experience or equivalent military experience to meet job requirements and expectations Professional industry certifications such as CISSP, CISM, and other leading industry certifications in line with our services portfolio Expert level of knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy More ❯
to work independently and participate in 24/7 on-call rotation Qualifications 3-5 years in IT security, ideally in SOC/NOC environments Relevant certifications preferred: ISC2CISSP, GIAC, SC-200, IBM QRadar Certified Specialist, Splunk Admin/Power User, Chronicle Security Engineer Proficiency in Microsoft Office (Excel, Word) This is a career-defining opportunity to shape More ❯
degree in Computer Science, Information Technology, or related field (Master's preferred). Certifications: TOGAF, Azure/AWS/GCP Architecture, VCP, CCNP/CCIE, or equivalent. Preferred: ITIL, CISSP, HCISPP. Experience 10+ years of experience in IT infrastructure roles, with at least 5 years in architecture and strategy within a hospital or healthcare system. Proven leadership in designing More ❯
on audit actions and outcomes. What you will need Required Qualifications The individual should be educated to degree level in a relevant discipline. Must be one of CISM/CISSP/CISA/TOGAF/CRISC. Must have 5 years' cyber security experience. Must have proven expertise in Compliance Management, InformationSecurity Risk and Audit. Individual Competencies Excellent understanding More ❯
engagement skills, with the ability to influence at C-suite and board level Track record of leading large-scale client engagements and delivery teams in consulting environments Relevant certifications (CISSP, CISM, CISA, MSc Cyber Security) advantageous What You’ll Receive Salary: £86,000–£107,000 + benefits 25 days annual leave + UK public holidays Contributory pension scheme More ❯
and documentation abilities. Preferred Qualifications: Bachelor's degree in Cybersecurity, Information Technology, or a related field. Experience working in a DoD or federal government environment. Additional certifications (e.g., CEH, CISSP, or CND) are a plus. OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status, or any other status protected under any federal, state More ❯
university is required. Four (04) years of additional relevant experience on projects with similar processes may be substituted for a bachelor's degree. CertifiedInformation System SecurityProfessional Certification (CISSP) or Security X (previously known as the CASP+) Certification required Must have a solid understanding of security practices and policies and hands-on vulnerability testing experience using Customer tools. More ❯
and documentation abilities Preferred Qualifications • Bachelor's degree in Cybersecurity, Information Technology, or a related field • Experience working in a DoD or federal government environment • Additional certifications (e.g., CEH, CISSP, or CND) are a plus OSAAVA Services considers all qualified applicants for employment without regard to disability or veteran status, or any other status protected under any federal, state More ❯
CNSS) Instruction No. 1253. • Strong understanding of Cyber Security Policies and be able to handle multiple project, Networks and IT systems • Candidate should have professional certifications (e.g., CCIE, CISSP, CISM, CASP, CISA, Security+) d. Additional Desired experience: Splunk More ❯
to influence and engage stakeholders across technical and non-technical domains. Familiarity with cyber security frameworks such as NIST, ISO-27001, ISF SOGP, and ISMS. Professional certifications such as CISSP, CCSP, TOGAF, or SABSA (advantageous). You bring a collaborative spirit, a proactive approach to risk management, and the ability to translate complex security concepts into actionable insights for More ❯
Science, Engineering, or 4+ years of additional systems engineering experince in lieu of degree 7+ years of hands-on experience in systems and cybersecurity engineering Current cybersecurity certification (e.g., CISSP, CISM, CEH, Security+CE, CySA+, etc.) Deep understanding of system architecture, infrastructure design, and engineering principles Advanced knowledge of networking concepts, protocols, and architecture (TCP/IP, LAN, WAN) Proficiency More ❯
DevOps before moving to security. Hands-on experience with security automation and infrastructure-as-code. Active in the security community (bug bounties, research, open source contributions). Professional certifications (CISSP, OSCP, AWS Security) backed by real-world experience. Workstreet Is An Equal Opportunity Employer As an equal opportunity employer, Workstreet is committed to providing employment opportunities to all individuals. More ❯
computer science, engineering, mathematics or equivalent • 10+ years of security, compliance and risk management experience • 10+ years of technical specialist, design and architecture experience • Relevant cyber security accreditation including CISSP, CISA, CRISC, etc. and working knowledge of cyber security and technology risk management frameworks including NIST CSP, CIS Benchmarks, ISO27001, etc. PREFERRED QUALIFICATIONS • 7+ years of IT platform implementation More ❯
well understood and appropriately mitigated. Analyzing procurement processes of hardware, software and services to comply with cyber security and operational needs. Creating concise and well-structured written assessments. Certifications: CISSP Certification. Highly Desired Qualifications Other skills and demonstrated experiences that are highly desired but not mandatory to perform the work, include demonstrated experience with or in: Cyber Security Support More ❯
o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce Council Certified Ethical Hacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC InformationSecurity Fundamentals) o CISSP (CertifiedInformation System SecurityProfessional) • Additional certifications at an equivalent may also be considered. More ❯
o CERT Certified Computer Security Incident Handler o ECC CEH (Electronic Commerce Council Certified Ethical Hacker) o GCIH (GIAC Certified Incident Handler) o GISF (GIAC InformationSecurity Fundamentals) o CISSP (CertifiedInformation System SecurityProfessional) • Additional certifications at an equivalent may also be considered. More ❯