within a complex operational environment/large organisation. One or more of the following security and architecture related certifications would be desirable: SANS/GIAC/CISSP/CISM/SABSA/TOGAF Experience at improving the maturity of security controls and their implementation is desirable. These roles are very more »
Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF), Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Professional more »
security, logging and monitoring processes • Strong interpersonal skills, including good communication with the ability to articulate ideas in a precise and concise manner • CISSP, GIAC certifications or equivalent • Familiarity with Indicators of Compromise (IoCs), Indicators of Attack (IoAs), ATT&CK Tools, Techniques and Procedures (TTPs) • The Ideal candidate is a more »
effectively and build relationships with key project stakeholders. Desirable Attributes: Prior experience with I&C systems in a nuclear environment. Recognized certifications (ISC2 CISSP, GIAC GICSP). Familiarity with nuclear security regulations and standards (NISR 2003, ONR Security Assessment Principles). Proven track record in a large-scale project environment. more »
or operation in a nuclear plant environment CS&IA experience in a large infrastructure project environment Relevant Professional Certifications or Equivalent: e.g. ISC2 CISSP, GIAC GICSP Recognised and certificated ‘Behavioural Safety Programme’ Experience of working in a high security environment Proven experience within a large project environment Knowledge of Nuclear more »
to gain alignment across disparate come from states for consolidation and centralization onto unified IAM platforms. Desirable Relevant certifications, such as CISSP, CISM, or GIAC are preferred. Experience with Okta, Azure AD, PKI, and PAM solutions preferred. Experience working in a manufacturing environment, preferred. Experience with global security and privacy more »
A. Up to 10% travel may be required within the National Capital Region. Current Certification Requirement Must have one of the following certifications: CAP, GIAC, GSLC, CISM, CISSP or CASP Clearance Requirement A current DoD Top Secret/SCI Level of clearance NITESONI EIO2024 Original Posting Date more »
co-located, and cloud hosted architectures. Experience with the shared security model used by cloud service providers. Industry certifications such as CISSP, SANS/GIAC, AWS, GCP, or Microsoft. External applicants will be required to perform a technical interview. Application Deadline: The application window for this position is anticipated to more »
co-located, and cloud hosted architectures. Experience with the shared security model used by cloud service providers. Industry certifications such as CISSP, SANS/GIAC, AWS, GCP, or Microsoft. External applicants will be required to perform a technical interview. Application Deadline: The application window for this position is anticipated to more »
business purposes (within state and out of state). Preferred Qualifications Bachelor's degree in Computer Science, Information Technology, or Information Security CISSP, CEH, GIAC Certifications To review benefits, please click here An Equal Opportunity Employer, including disability/veterans more »
complex security issues and recommend effective solutions. Communication skills and ability to collaborate with cross-functional teams. Certifications such as CISSP, CISM, CEH, or GIAC are a plus. If you’re interested, please apply now more »
enhance threat detection and response. Requirements: - Bachelor's degree in Computer Science, Information Security, or related field. - Relevant certifications such as CISSP, CEH, or GIAC are highly desirable. - Excellent communication and teamwork skills. - Ability to work independently and collaboratively in a fast-paced environment. If you are a proactive SOC more »
to security incidents. communication skills, with the ability to articulate technical concepts to both technical and non-technical audiences. certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or Certified Information Systems Security Professional (CISSP) are desirable but not essential. Benefits: Our client offers a great working environment with more »
Qualifications: Possess a Bachelor's degree in Computer Science, Information Security, or a related field, coupled with advanced certifications such as CISSP, CISM, or GIAC for added merit. Demonstrate proven expertise in threat intelligence analysis, incident response, or cybersecurity operations. Exhibit an in-depth comprehension of cyber threats, vulnerabilities, and more »
DV) or willingness to acquire such a clearance will be seen as an advantage. Incident management certifications such as: CREST certified incident manager (CCIM) GIAC Certified Incident Handler (GCIH) Degree level qualified, MSc in Information Security, IT or relevant STEM subjects. To discuss this or wider Consulting roles with our more »
Network Attack (CNA), and Computer Network Defense (CND) tools and techniques. Working knowledge of AI/Machine Learning Relevant certifications such as CISSP, SANS GIAC, CEH, etc. Capable and comfortable communicating actionable threat intelligence to both technical and program-level stakeholders. Published research papers at conferences or through other mediums. more »
solving skills, with the ability to prioritise and manage multiple tasks in a fast-paced environment. - Relevant certifications such as CISSP, CISM, CEH, or GIAC are a plus. more »
Renton, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Experience managing security vendors and managed services providers. Strong experience in Incident Management, SOC management, and Incident Response planning. Information Security certifications (CISSP, SANS GIAC, CISA, etc.) a plus. How you'll be successful Passion for Pokémon: Develops an understanding of the Pokémon brand, the impact it has on our more »
required, like CEH: Certified Ethical Hacker. CISM: Certified Information Security Manager. CompTIA Security+ Computing Technology Industry Association CISSP: Certified Information Systems Security Professional. GSEC: GIAC Security Essentials. GlobalInformationAssuranceCertification (GIAC) ECSA: EC-Council Certified Security Analyst. GPEN: GIAC Penetration Tester. ISO 27001 Lead Auditor (ISMS) ISO 22301 Lead more »
Experienced in creating Configuration Management Plans. Must have excellent organizational management skills. Must have excellent written and oral communication skills. Active certification: DoD 8140 - GIAC Security Essentials (GSEC) Must possess an active Top Secret clearance and be eligible to obtain TS/SCI clearance. Original Posting Date more »
infrastructure across the full stack, encompassing applications, databases, operating systems, hypervisors, networks, storage, and containers. Possession of relevant certifications such as CISSP, CISA, TOGAF, GIAC, or CISM, demonstrating proficiency and expertise in the field of information security and enterprise architecture. What’s on offer? Competitive Salary (circa £100k plus company more »
Skelmersdale, Lancashire, North West, United Kingdom Hybrid / WFH Options
Police Digital Services
to operate in high-pressured environments with proven experience of support provided during cyber incidents Desirable: Relevant qualifications including: CREST Registered Threat Intelligence Analyst, GIAC Cyber Threat Intelligence (GCTI), and/or Completed Intelligence Analysis course (e.g. NIAT, RISC UK or similar) Demonstrated experience in developing and delivering cybercrime or more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
and IDS/IPS, EDR as well as log ingestion formats from these tools Desired Training/Qualification(s) Technical Security Qualification, e.g. SANS, GIAC Cloud (AWS/Azure) Certification, such as AWS Security Engineering, AZ-900 etc Interview process This role will be a two-stage interview process, consisting more »
Employment Type: Permanent, Part Time, Work From Home
CK Framework in an operational environment Knowledge of network protocols such as HTTP(S), SMTP, TCP, SSL/TLS Desirable - Lead Threat Modeller CREST & GIAC qualifications or equivalent proven industry experience The Cyber Operations team: Cyber Operations is responsible for protecting our team from Cyber Attack by various threat actors. more »
Frimley, Surrey, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
CK Framework in an operational environment Knowledge of network protocols such as HTTP(S), SMTP, TCP, SSL/TLS Desirable - Lead Threat Modeller CREST & GIAC qualifications or equivalent proven industry experience The Cyber Operations team: Cyber Operations is responsible for protecting our team from Cyber Attack by various threat actors. more »