maintain relationships with senior stakeholders. Privacy certifications required (e.g., IAPP). Knowledge of ethical business practices and frameworks. Advanced or specialized certifications such as CertifiedInformationSystemsSecurityProfessional (CISSP), CertifiedInformationSecurity Manager (CISM), or similar. Experience with automation and scripting for privacy management processes. Ability to design and implement comprehensive privacy architectures and frameworks. Relocation Assistance Eligible More ❯
manage the cybersecurity architecture budget and resource allocation. Qualifications & Experience: Bachelor's or Master's degree in InformationSecurity, Computer Science, or a related field. Professional certifications such as CISSP, CISM, SABSA, or equivalent. Extensive experience in cybersecurity architecture, preferably in the retail sector or a similar industry. Strong knowledge of security frameworks (e.g., NIST, ISO 27001) and architectural More ❯
able to evaluate proposed security architectures and designs and provide input as to the adequacy of those security designs to meet required security compliance objectives Security certification (Security+ or CISSP) Desired Skills: Proficiency with Windows and Red Hat Linux/Unix environments to include Red Hat Certified System Engineer (RHCSE) or equivalent skills. 5+ years' experience as Linux system More ❯
skills, including the ability to convey complex technical issues to non-technical audiences. Proficient in Microsoft Office (Word, Excel, PowerPoint, SharePoint). Preferred Qualifications: Current cybersecurity certification such as CISSP, CISM, or Security+. Experience with GRC (Governance, Risk, and Compliance) and SA&A (Security Assessment & Authorization) tools such as Archer, or similar platforms. Familiarity with cloud compliance requirements and More ❯
as Tenable. Excellent analytical skills for identifying and addressing security threats. Ability to remain calm and effective under pressure, with strong problem-solving capabilities. Relevant certifications (e.g., CompTIA Security+, CISSP, CISM) are highly desirable. What's in it for me? This is an opportunity to work in a complex and engaging environment, where your contributions will directly impact organisational More ❯
of cloud security concepts and technologies, such as Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP) Preferred Technical and Professional Experience •Relevant industry certifications such as CISSP, CISM, or CCSP •Bachelor's or Master's degree in Computer Science, InformationSecurity, or a related field Diversity is a whole lot more than what we look like More ❯
Dundee, Scotland, United Kingdom Hybrid / WFH Options
NHS Scotland
achieved Chartered Professional status of the British Computer Society (MBCS CITP) and should have obtained a post-graduate qualification in the specialist area e.g. ISO27001 Lead Implementer, CISM, CISA, CISSP, GIAC certifications, CCP accreditor or have equivalent additional experience/expertise. The candidate should have excellent interpersonal, communication and organisational skills. They should also be able to work with More ❯
Cyber Security Assurance function or similar Bachelor's Degree (or equivalent experience) in Cybersecurity, Computer Science, InformationSystems, or related field ProfessionalInformationSecurity certification such as CCSP, CISM, CISSP, CEH, GIAC, or CASP+ COMPETENCIES Ownership and Delivery . Has a clear focus to deliver results, working to targets, reviewing progress and adapting their plans accordingly, motivating themselves/ More ❯
but not limited to) in: Digital transformation, informationsystems, enterprise IT projects, project management, IT infrastructure optimization, advanced Cybersecurity, advanced metering infrastructure (AMI). Relevant professional certifications (e.g., ITIL, CISSP, CISM, PMP, CMP) or similar credentials are considered an asset. Expertise in Cybersecurity regulatory frameworks (e.g., OEB, NIST, NERC CIP, Privacy by Design). Experience in a regulated industry More ❯
but not limited to) in: Digital transformation, informationsystems, enterprise IT projects, project management, IT infrastructure optimization, advanced Cybersecurity, advanced metering infrastructure (AMI). Relevant professional certifications (e.g., ITIL, CISSP, CISM, PMP, CMP) or similar credentials are considered an asset. Expertise in Cybersecurity regulatory frameworks (e.g., OEB, NIST, NERC CIP, Privacy by Design). Experience in a regulated industry More ❯
Cyber Security Assurance function or similar · Bachelor's Degree (or equivalent experience) in Cybersecurity, Computer Science, InformationSystems, or related field · ProfessionalInformationSecurity certification such as CCSP, CISM, CISSP, CEH, GIAC, or CASP+ COMPETENCIES · Ownership and Delivery . Has a clear focus to deliver results, working to targets, reviewing progress and adapting their plans accordingly, motivating themselves/ More ❯
ability to adapt to changing priorities and challenges. 5. Strong written and verbal communication skills, with an emphasis on clear and concise technical documentation. 6. Certifications such as CEH, CISSP, GSEC, or OSCP are a plus. 7. Experience working within a government or military cyber operations environment. 8. Familiarity with both offensive and defensive cyber operations tools and techniques. More ❯
in conducting vulnerability assessments using ACAS. Security or equivalent certification (DoD 8570 for IAT). Quick learner and team player. Desired Skills & Qualifications: IAT level III certification (CASP, CISA, CISSP, or GCIH) or the ability to obtain certification within six months of hiring. 2 years of cybersecurity experience in the Department of Defense (DoD) or Intelligence community. Excellent problem More ❯
Analyst). Strong analytical and problem-solving skills. Excellent communication and interpersonal abilities. Ability to work well independently and as part of a team. Relevant industry certifications such as CISSP, CEH, or CompTIA Security+ are a plus. Benefits: Opportunities for professional growth and advancement. Exposure to cutting-edge technologies and industry-leading practices. Collaborative and supportive work environment. Access More ❯
Experience with ISMS ISO 27001 implementations, conducting or supporting audits, risk assessments. Certified ISO 27001 Lead Auditor/Implementer and other certifications, such as ISO 9001 LA/LI, CISSP, CISM or willingness to get certified. Experience in reviewing cloud security measures (Azure, AWS). Previous experience and knowledge in telco domain is a plus. Excellent written and verbal More ❯
Learning : Stay informed of evolving threats and solutions through regular training and industry engagement. About You Degree in InformationSecurity, Computer Science, or equivalent experience. Industry certifications such as CISSP, CISM, CEH, or similar. 3 years in a cyber security consulting role. Strong knowledge of UK informationsecurity frameworks and compliance requirements. Proven ability to lead client engagements and More ❯
we'd love to see/Amazing Extras: Certifications such as Azure Security Engineer AZ-500, Cybersecurity Architect SC-100, Security Operations SC-200, Microsoft Identity SC-300, or CISSP are highly desirable. To discuss this or other Audit roles, apply by creating a profile, uploading your CV, and starting your journey with KPMG. Find out more: Audit at More ❯
the best security solutions and strategies. Anticipate and prevent potential security threats and vulnerabilities, as well as respond to them quickly. Certifications : Relevant certifications in cyber security, such as CISSP, CISM, CEH, SSCP, or CCSP. Further technical certifications in Microsoft Azure, Networking, Firewall, SIEM, PAM or VM Products are beneficial. Technical Capabilities : Technical competence in one or more of More ❯
assessments, penetration testing, and incident response. Excellent communication and collaboration skills, with the ability to work effectively with stakeholders at all levels of the organization. Relevant certifications, such as CISSP, CISM, or CISA, are a plus. Must be able to travel globally up to 25%. Worker Type: Regular Number of Openings Available: 1 About the company Volaris Group More ❯
Knowledge of networks technologies (protocols, design concepts, access control) Knowledge of security technologies (encryption, data protection, design, privilege access, etc.) Knowledge of network design and engineering Certifications such as CISSP, CISM, CRISC, or equivalent are strongly preferred. Proficiency in time management, communications, decision making, presentation and organizational skills Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and More ❯
Knowledge of networks technologies (protocols, design concepts, access control) Knowledge of security technologies (encryption, data protection, design, privilege access, etc.) Knowledge of network design and engineering Certifications such as CISSP, CISM, CRISC, or equivalent are strongly preferred Proficiency in time management, communications, decision making, presentation and organizational skills Proficiency in planning, reporting, establishing goals and objectives, standards, priorities and More ❯
Cybersecurity, Computer Science, Information Technology, or a related field - or equivalent combination of education and 5+ years of DoD cybersecurity experience. Required Skills Security+ Certification (or higher such as CISSP, CISM, or CEH) is required and must be maintained. Demonstrated experience working in a classified or high-security DoD or federal environment. In-depth understanding of RMF processes, NIST More ❯
digital forensics, or malware analysis. Knowledge of advanced persistent threats (APTs) and contemporary attack techniques. Proficiency in security automation (SOAR), orchestration, and scripting (e.g., Python, PowerShell). Preferred certifications: CISSP, CISM, CEH, or similar. Familiarity with DevSecOps, CI/CD security monitoring, and containerized environments (Docker, Kubernetes). Experience with API automation and working with MSSPs. Skilled in creating More ❯