Are you ready to start a cybersecurity career The demand for newly trained and qualified CyberSecurity professionals has never been greater and this boasts excellent opportunities for growth amongst other benefits. Companies across the globe try to protect themselves from an increase in cyber attacks. We help you develop the skills required with four globally recognised qualifications, real-world … guarantee on completion. Newto Training can support you at any stage of your career journey whether you’re new to the industry or looking to exchange your skills, this CyberSecurity course is designed to get you job-ready. Within our CyberSecurity career programme, you will: 100+ hours of live instructor-led online training 4 certifications: Microsoft Azure Fundamentals … if you think you have the soft skills (communication skills, passion) needed then we can help you launch the career you want. Click 'Apply Now’ to begin your new cybersecurity career More ❯
Islington, London, United Kingdom Hybrid / WFH Options
TryHackMe Ltd
TryHackMe is the fastest-growing online cybersecurity training platform. Our mission is to make learning and teaching cybersecurity easier by providing gamified security exercises and challenges. Having only been around for handful of years, we've grown to more than 5 million community members and our growth isn't slowing down! The Role We're looking for a … delivery (CI/CD) pipelines Knowledge of cloud computing platforms such as AWS, Azure and Google cloud Excellent understanding of software development methodologies, including Agile and Scrum Interest in cybersecurity or edtech industries Strong leadership, problem-solving skills and be comfortable communicating in English Benefits & Perks 100% Remote - In a fully digital world, work from anywhere you want! Flexi More ❯
TryHackMe is the fastest-growing online cybersecurity training platform. Our mission is to make learning and teaching cybersecurity easier by providing gamified security exercises and challenges. Having only been around for handful of years, we've grown to more than 5 million community members and our growth isn't slowing down! The Role We're looking for a … delivery (CI/CD) pipelines Knowledge of cloud computing platforms such as AWS, Azure and Google cloud Excellent understanding of software development methodologies, including Agile and Scrum Interest in cybersecurity or edtech industries Strong leadership, problem-solving skills and be comfortable communicating in English Benefits & Perks Salary - We hire across 35+ countries. We determine salaries based on Geographic Location More ❯
Skills: Understanding of Key Management Systems including Electronic Key Management System (EKMS) and Key Management Infrastructure (KMI) as they impact the design of End Cryptographic Units (ECUs) Experience with Cybersecurity and Risk Management Framework Cybersecurity Credential (e.g., CISSP) Model-Based Systems Engineering (MBSE) experience highly desirable More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Continuous Attack Surface Testing program. Analyzes and assesses most technologies, but lacks a complete overview of compliance, vulnerability and threat landscape. How You'll Do It Learns more complex Cybersecurity concepts including basic and traditional threat exploitation techniques of inside and outside bad actors Contributes to program enhancements including advancement of internal vulnerability detection testing methods and helps new assessors … learn fundamental cybersecurity concepts. Learns system design and how vulnerabilities impact the product as a whole. Learns to assess production systems and understands how observed events and failures impact risk at the company. Qualifications You'll Need Minimum Requirements Bachelors Computer Science, Information Security, Business Administration and Management, Analytics, or related. 2+ years Information Security, Cybersecurity, Computer Science, Data Analytics … or related Internal applicants only: technical proficiency of Advanced Beginner on the Dreyfus scale. In Lieu of Education Experience 4+ years Information Security, Cybersecurity, Computer Science, Data Analytics or related Preferred Requirements Experience with Burp Suite or equivalent web application testing tooling Experience with Linux and Virtual Machines Experience with a scripting language (Bash, Python, Powershell, etc) Familiarity with OWASP More ❯
Role: Cybersecurity Engineer Location: Washington, D.C., San Diego, Hawaii, Tampa, or Colorado Springs Clearance: Active Top Secret clearance Salary: $150k-$200k + Equity I am partnered with one of the most exciting startups in defense tech, which has experienced huge growth over the last 18 months. After securing Series B funding, they are now looking to double in size in … has created software for the DOD and NATO that is streamlining otherwise outdated processes within defense, saving huge amounts of time. My client is looking to add an experienced Cybersecurity Engineer to their team who has previous experience working within DOD environments. For this position, you must hold an active Top Secret clearance and be happy to work in a … Tampa, or Colorado Springs. To be considered for this position, you must have the following skills and experience: Hold an active Top Secret clearance. 5+ years of experience in cybersecurity with a cloud and data center focus. Proficient in deploying and managing cloud security applications, firewalls, and SIEM systems. Expertise in scripting and automation, with experience in languages such as More ❯
Security Policies & Procedures Act as an Escalation Point & Coordinate with other Teams when required Key Skills & Experience Required for SOC Analyst role will include: Strong Understanding of Information/CyberSecurity Principles & Technologies. Experience of Security Related Technical Investigations Hands-On Technical Experience of Conducting Vulnerability Scanning & Evaluating Results Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Experience with … Detail Strong Team Player Searches: SOC Analyst/Vulnerability Management/VM Analyst/Information Security Analyst/Information Security Engineer/Security Operations Analyst/SOC Engineer/CyberSecurity Engineer/SecOps Engineer/SecOps Analyst At SECURE, we value Attitude & Aptitude over Certifications. If you possess the drive and relevant experience to deliver tangible results aligned with … our clients needs, reach out. We embrace DE & I and welcome applications from underrepresented groups, minorities, women in cybersecurity, neurodiverse individuals, LGBTQ+ community members, veterans, and those from diverse socioeconomic backgrounds. Curious to learn more about the Company, Culture & Purpose? Apply Today to discover where your journey with us can lead. More ❯
WRL-004) as outlined in the NICE Work Role Framework. Certification(s): Certified information Systems Security Professional (CISSP) or Information Systems Security Engineering Professional (ISSEP) certifications required Microsoft Certified Cybersecurity Architect Expert Education and/or experience: 7 plus years of experience performing cyber infrastructure support activities in Enterprise Cybersecurity Support government contracts. Skills: Core competencies in Cybersecurity Engineering practices. More ❯
solve IT issues. We bring the innovation, passion, and agility of the commercial sector to meet the unique challenges of this competitive space. Karthik Consulting is seeking Optional Task - Cybersecurity Governance - Lead with the below skillset. Optional Task - Cybersecurity Governance - Lead Fulltime with Karthik Consulting Location: Washington, DC metro area Clearance: Top Secret. Optional Task - Cybersecurity Governance - Lead Description: Possess More ❯
You will need to login before you can apply for a job. CyberSecurity Analyst Employer: Ashdown Group Location: London Salary: GBP 50,000 - 55,000 per annum Closing date: 19 Jun 2025 Sector: IT Job Role: CyberSecurity Consultant Job Type: Permanent Job Description We are seeking an experienced CyberSecurity Analyst/Engineer to join a large company More ❯
Engineering Location: Cheshire Full Time: Permanent Hybrid/Remote Salary: Up to £120k DOE We are seeking an experienced Head of Engineering to lead the technology strategy, innovation, and cybersecurity initiatives for our client's software company. The ideal candidate will have deep expertise in software development, cloud architecture, and cybersecurity. You will be responsible for driving product development, ensuring … technology roadmap in line with business objectives. Lead cross-functional engineering teams to ensure scalable, reliable, and agile systems, while championing DevSecOps and modern cloud best practices. Own the cybersecurity strategy and ensure compliance with relevant standards (e.g. ISO 27001, GDPR). Implement risk assessments, zero-trust architecture, encryption, MFA, and 24/7 monitoring. Manage AWS infrastructure with a … focused culture that encourages innovation, ownership, and collaboration. Who are we looking for? Over 10 years leading software and infrastructure teams, specialising in high-throughput systems, cloud architecture, and cybersecurity expertise. Demonstrated success in risk management, regulatory compliance, and the design of secure systems. Experienced in recruiting and managing both co-located and remote teams. Familiarity with VSAT, SATCOM, or More ❯
Fully remote (UK based), United Kingdom Hybrid / WFH Options
VC Talent
Cybersecurity leadership that shapes global impact, now hiring (fully remote UK based) A rare senior leadership opportunity that's perfect for a seasoned CISO, Director of Information Security, or Head of InfoSec & Data. In today's landscape of escalating cyber threats, we're seeking a leader who has already stood at the frontline. Guiding complex organisations through high-pressure incidents … proven ability to engage senior leadership with composure, clarity, and authority. Translating technical risk into simple, strategic insights * Security frameworks such as ISO 27001 & NIST CSF * Professional qualification in Cybersecurity (CSIM, CISSP or similar) * Data Protection or Privacy qualification is desirable (CIPP/R or C-DPO) This is a tremendous opportunity for an InfoSec and Data Privacy leader to More ❯
Employment Type: Permanent
Salary: £95000 - £100000/annum 32 days hol, great pension, 100% WF
Back-End Engineer - Intelligence-Driven Cybersecurity Full-Time Galway/Hybrid Competitive Salary + Benefits Are you passionate about solving complex problems in cybersecurity? Do you thrive in a fast-paced, high-trust environment where your work has a real impact? We're looking for a Back-End Engineer to join our Intelligence Services team-a group of innovators dedicated … role for you. What You'll Do Develop microservices and data streaming pipelines deployed on Kubernetes. Design and build distributed systems to analyze cyber threat intelligence. Deliver cloud-based cybersecurity products that use data in innovative ways. Own your work from design through production in a collaborative, agile team. What We're Looking For Experience working as part of a More ❯
Manage multiple small-to-medium IT projects across business systems while providing IT services support. Lead projects following established project management methodologies, such as: Annual ERP upgrade process Maintaining cybersecurity accreditations Annual penetration testing Annual workstation refresh, Wi-Fi, and video conferencing upgrades Disaster recovery (DR) testing Provide day-to-day IT support for: Business systems: ERP, WMS, BI … web portals, time and attendance systems, and cybersecurity tools Infrastructure: Act as Support Desk liaison, resolving on-site queries and coordinating with the outsourced IT service provider What We’re Looking For Experience or strong interest in IT project management and technical support. Understanding of business systems (ERP, WMS, BI, etc.) and infrastructure basics. Strong organisational skills with the … understanding of networking, operating systems, and common software tools. Strong problem-solving skills and attention to detail. Good communication skills, both written and verbal. Desirable Skills & Experience • Knowledge of cybersecurity, cloud platforms and GDPR Reward & Benefits At Cooneen Group, we put our people first. Alongside a competitive salary and a modern, comfortable workplace, you’ll enjoy: 35 days annual leave More ❯
smoothly. This role manages an IT Outsourcer and other suppliers as well as ensuring the provision of devices, telephony and local equipment is robust. They are responsible for our cybersecurity and ensuring that applications run by other teams are safe and fit for purpose. They will also manage a small internal IT team. Requirement Deliver a high-quality IT support … Good understanding of technologies relevant to the organisation, particularly Microsoft 365, Microsoft Intune, Entra and Defender, telephony and networking. Excellent understanding of IT service management processes Excellent knowledge of cybersecurity Experience of successfully managing and controlling an information technology budget It is likely that the successful candidate will hold a relevant degree and/or relevant industry qualifications such … as ITIL, Microsoft certifications and a cybersecurity certification Managing multiple concurrent projects and prioritise effectively Negotiate and manage contracts with suppliers and assess and manage risks in supplier relationships Mentor and develop junior staff More ❯
smoothly. This role manages an IT Outsourcer and other suppliers as well as ensuring the provision of devices, telephony and local equipment is robust. They are responsible for our cybersecurity and ensuring that applications run by other teams are safe and fit for purpose. They will also manage a small internal IT team. Requirement Deliver a high-quality IT support … Good understanding of technologies relevant to the organisation, particularly Microsoft 365, Microsoft Intune, Entra and Defender, telephony and networking. Excellent understanding of IT service management processes Excellent knowledge of cybersecurity Experience of successfully managing and controlling an information technology budget It is likely that the successful candidate will hold a relevant degree and/or relevant industry qualifications such … as ITIL, Microsoft certifications and a cybersecurity certification Managing multiple concurrent projects and prioritise effectively Negotiate and manage contracts with suppliers and assess and manage risks in supplier relationships Mentor and develop junior staff More ❯
value everybody for who they are and what they bring to the table, supporting one another as we continue to deliver for our customers. LI-KS1 The role of CyberSecurity Consultant sits within the CyberSecurity team in Three UK, which is responsible for providing subject matter expertise and guidance to business units across Three's Network and Enterprise More ❯
across the UK, while driving performance, change, transformation, resilience, and future growth. This role requires the functional and softer skills Your Toolkit: Microsoft Cloud, O365, Active Directory, Azure AD CyberSecurity, GDPR, MFA, IAM Windows 10/11, Windows Server Genealogy Virtualisation, LAN/WAN Networking, VoIP Desktop, Software & Hardware Support What You'll Do: Lead and improving a UK … wide Microsoft Cloud & O365 infrastructure Manage 3rd party vendors and SLA's to drive service excellence Deliver strategic IT projects to enhance capacity and performance Ensure GDPR compliance and cybersecurity resilience Act as the technical authority at 3rd/4th line level Drive transitions, integrations, and change initiatives Who You Are: A technical all-rounder with 3rd/4th line More ❯