Weymouth, England, United Kingdom Hybrid / WFH Options
Cogito
player with excellent communication skills, (oral, written, presentation), interpersonal and consultative skills. Able to collaborate across diverse stakeholders to collaborate on security objectives. CEH, Security+ or other security certifications on experience with security technologies such as NGFW, Endpoint Security, EDR, DLP, Proxy, Secure Email Gateway, Active Directory, Identity and more »
beneficial to applicants: Certification in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIASecurity+, Certified Ethical Hacker (CEH) or Microsoft M365/Azure Understanding of cybersecurity principles, networking concepts, and various operating systems. Knowledge of common security threats more »
services, procurement, or business project work. Qualifications: One or more of the following industry certifications: SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on Ethical Hacking, Digital Forensics, Information Security or Threat Intelligence Please more »
the finance agreement. Step 1 - Accredited Online Training The first step is completing a selection of professional, accredited and industry recognised courses from CompTIA which is the global leader in IT Technician, Networking and Cybersecurity training. The training is delivered via multimedia rich video tutorials, practice labs, presentations … you to have to be effective and confident in your role. Step 3 - Official exams You will then go on to sit the CompTIA A+ and the CompTIA Network+ exams to give you the official certifications which will be recognised not only in the UK, but … you to move into the cybersecurity field. This official, accredited training consists of online training, practical training and an official exam (CompTIASecurity+). Further we can tailor the package to include courses like the Certified Ethical Hacker and Certified Network Defender depending on your requirements and more »
abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerability management Skills: Relevant certifications (CompTIASecurity+, CySA+, CASP+, PenTest+, or Microsoft Azure Security). Proficiency in Microsoft Sentinel, KQL queries, and cloud security technologies would be beneficial. Strong understanding of more »
Cheltenham, Gloucestershire, South West, United Kingdom
Reed Technology
HPE Aruba, VMware VCP, or equivalent. * Additional certifications based on specific technology stack (e.g., Azure Fundamentals). * Cybersecurity certifications (e.g., CISSP, CompTIASecurity+). If you are interested in this position please apply online or for more information please contact more »