Belfast, Bristol, Edinburgh, London, Manchester Business Line Date published: 17-Mar-2025 Connect to your Industry Do you want to be at the heart of some of the most interesting and purposeful projects undertaken to support and protect our country More ❯
Belfast, Bristol, Edinburgh, London, Manchester Business Line Date published: 17-Mar-2025 Connect to your Industry Do you want to be at the heart of some of the most interesting and purposeful projects undertaken to support and protect our country More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Belfast, Bristol, Edinburgh, London, Manchester Business Line Date published: 17-Mar-2025 Connect to your Industry Do you want to be at the heart of some of the most interesting and purposeful projects undertaken to support and protect our country More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
Belfast, Bristol, Edinburgh, London, Manchester Business Line Date published: 17-Mar-2025 Connect to your Industry Do you want to be at the heart of some of the most interesting and purposeful projects undertaken to support and protect our country More ❯
City, Edinburgh, United Kingdom Hybrid / WFH Options
Deloitte LLP
Belfast, Bristol, Edinburgh, London, Manchester Business Line Date published: 17-Mar-2025 Connect to your Industry Do you want to be at the heart of some of the most interesting and purposeful projects undertaken to support and protect our country More ❯
is looking for an experienced Information Systems Security Engineer to join our team in Virginia. We are a leader in data modernization and analytics, cybersecurity, and cloud solutions for the Department of Defense and Intelligence Community. Our engineers, analysts, and IT professionals have a passion for technology and a calling More ❯
Falls Church, Virginia, United States Hybrid / WFH Options
Epsilon Inc
teams and stakeholders. One or more of the following certifications are desired: Certified Cloud Security Professional (CCSP) , GIAC Security Essentials Certification (GSEC), or CompTIA Cybersecurity Analyst (CySA+) Preferred Qualifications: Familiarity with Apache Spark or comparable distributed data processing frameworks, preferably for large-scale data transformations and analytics. Working knowledge of More ❯
during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/CyberSecurity Awareness training, educating staff on best practices. Maintain comprehensive records and documentation of ISO activities. Provide regular updates and reports to the Information Security … for 3+ years. Relevant Information Security qualification (degree, CISSP, or CISM) obtained or in progress. Strong technical acumen with broad knowledge across Information/CyberSecurity, Software Development, and IT systems. Working knowledge of NIST CSF. Willingness to learn and expand skills in both Information Security and Financial Services. Ability … analytical and problem-solving skills. Proficiency in Microsoft Office. Interested? Please Apply! SOC ISO ISAO CISSP NIST CSF ISO27000 ISO27001 PCI DSS GDPR CybersecurityCyberSecurity Information Security Infosec Cybersec Risk Infrastructure ISMS More ❯
during audits or external assessments. Develop, review, and maintain information security governance documents, including policies, standards, frameworks, and procedures. Create and deliver Information/CyberSecurity Awareness training, educating staff on best practices. Maintain comprehensive records and documentation of ISO activities. Provide regular updates and reports to the Information Security … for 3+ years. Relevant Information Security qualification (degree, CISSP, or CISM) obtained or in progress. Strong technical acumen with broad knowledge across Information/CyberSecurity, Software Development, and IT systems. Working knowledge of NIST CSF. Willingness to learn and expand skills in both Information Security and Financial Services. Ability … analytical and problem-solving skills. Proficiency in Microsoft Office. Interested? Please Apply! SOC ISO ISAO CISSP NIST CSF ISO27000 ISO27001 PCI DSS GDPR CybersecurityCyberSecurity Information Security Infosec Cybersec Risk Infrastructure ISMS More ❯
managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with security event log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks & Compliance: Knowledge of Cyber Essentials Plus and ISO 27001 compliance requirements. Ability to help maintain and audit compliance for ongoing security certifications. Threat Hunting More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Halian
managing SIEM rule sets, creating dashboards, and correlating data for threat detection. Familiarity with security event log analysis, alerts management, and incident response workflows. Cybersecurity Frameworks & Compliance: Knowledge of Cyber Essentials Plus and ISO 27001 compliance requirements. Ability to help maintain and audit compliance for ongoing security certifications. Threat Hunting More ❯
Background Investigation. Experience in the areas of incident detection and response, malware analysis, or computer forensics. Bachelors' degree in Computer Science, Engineering, Information Technology, CyberSecurity, or related field and 8-12 years of related experience. Additional years of experience and cyber certifications may be considered in lieu of degree. More ❯
and a changing digital landscape. The role of the Security Team is to keep the University and its people safe from all forms of cybersecurity threat, working to minimise the likelihood of disruption to teaching, research and business activities. It does this through a combination of security technologies, controls More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Creditsafe
security operations teams in a similar industry. • Familiarity with SOC2, PCI-DSS, ISO22301 and ISO27001 standards. Desirable Qualifications: • Bachelor’s or masters degree in CyberSecurity, Computer Science, Information Technology, or a related field • Cloud security qualifications such as ISC2 CCSP, CSA CCSK and AWS Security Speciality • ISO27001 Lead Implementor • Strong More ❯
system patches, and overseeing vulnerability management processes. This role supports federal clients in maintaining compliance with the Department of Defense (DoD) and other federal cybersecurity standards. The candidate will be responsible for identifying points of vulnerability, non-compliance with established Information Assurance (IA) guidelines and regulations and recommend mitigation strategies More ❯
scripting languages like Python, Bash, or PowerShell. Knowledge of virtualization technologies (VMware, Hyper-V, KVM) and cloud platforms (AWS, Azure, Google Cloud) Expertise in cybersecurity principles and tools. Bachelor's degree in Information Technology, Computer Science, or a related field (can substitute with Associate's degree and 4 years of More ❯
intelligence cycle Expertise in working with the Department of Homeland Security (DHS) Knowledge and hands-on experience with Government Risk Management Frameworks (RMF) and cybersecurity authorization processes Proficiency in Microsoft technologies, including M365 and the Power Platform A master's degree in a related field or equivalent professional experience Demonstrated More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure-based infrastructure using Terraform, ensuring adherence to security best practices by developing, maintaining, and optimizing Terraform code. More ❯
Employment Type: Contract, Work From Home
Rate: From £500 to £700 per day (direct contract with the client)
About the Role:We are seeking a highly skilled and experienced Deputy Chief Information Security Officer (Deputy CISO) to join our dynamic cybersecurity team. This is an exciting opportunity for someone with a robust understanding of information security, policy development, and hands-on technical expertise. The Assistant CISO will play More ❯
Detection System. Experience: 5+ years related experience SAP experience required Education: Bachelor's degree in a related area or equivalent experience (4 years) Certifications: Cybersecurity Service Provider Analyst or (CSSP) Auditor or Incident Responder certification within 6 months of the date of hire. Clearance Required to Start: TS/SCI More ❯
a Cloud Environment. The selected candidate will be responsible for providing Joint Intelligence Community Government project leads with the planning, organizing and management of cybersecurity implementation on systems related to satellite ground processing capabilities. SPECIFIC TASKING/PROJECT SUPPORT : • Overall support and oversight of an Information Assurance project/ More ❯
tools. Support cross functional teams with implementing the Risk Management Framework (RMF) life cycle steps to achieve system authorization and operation. Provide support to cybersecurity assessment & authorization (A&A) processes to gain system authorization to operate (ATO). Engage with technical stakeholders and other third parties to interpret technical requirements More ❯
tools. Support cross functional teams with implementing the Risk Management Framework (RMF) life cycle steps to achieve system authorization and operation. Provide support to cybersecurity assessment & authorization (A&A) processes to gain system authorization to operate (ATO). Engage with technical stakeholders and other third parties to interpret technical requirements More ❯
and controls, as well as monitoring and assessing the security posture of our IT infrastructure. The ideal candidate will have a strong background in cybersecurity, risk management, and compliance standards. Duties of an Information Systems Security Officer may include: -Verify the implementation of the information system security program as delegated More ❯
/SCI clearance is mandatory. Bachelor's degree in Computer Science, Information Security, or a related field. Minimum of 5 years of experience in cybersecurity, with a focus on AWS security and ATO accreditation. Proficiency in AWS services and tools, including IAM, VPC, EC2, S3, and CloudFormation. Strong understanding of More ❯