Microsoft security solutions. Strong understanding of network security, endpoint security, identity and access management, and data protection concepts. Experience with security compliance frameworks (e.g., NIST, ISO 27001, GDPR). Excellent analytical and problem-solving skills. Effective communication and interpersonal skills. Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified more »
trust principles. Standardsand Frameworks : Define and update technical security standardsand principles, incorporating industry best practices and compliance requirements from frameworks such as NIST, ISO, and GDPR. Security Reviews and Threat Modeling : Conduct rigorous security assessments and threat modeling for ongoing and new projects, ensuring designs meet stringent security more »
Greater London, England, United Kingdom Hybrid / WFH Options
Luware
equivalent industry experience Recognised certifications such as CISSP, CISM, AZ-500, including knowledge of industry best-practice, guidelines and certification standards such as CIS, NIST, ISO 27001 and SOC 2 Server infrastructure support/management experience, ideally Windows and Linux Good awareness of cloud and server technologies, such as Docker more »
business stakeholders at all levels. Strong written and oral communication skills Active or ability to obtain SC clearance Preferred Qualification: SANS Certification Experience with NIST assurance/EDR IT Certifications, including Network+, Security+ Protective Monitoring/SOC Certifications, including CySA+ Cyber Security Certifications, including CISMP, CISSP Experience with various Microsoft more »
/Computer Science/Technology with IT audit or compliance experience In depth knowledge of information security, Technology Compliance management industry frameworks andstandards: NIST, OWASP, SANS, ISO-27001/2, SANS, and Cobit 3+ years working experience with enterprise technology compliance management programs, or Auditing experience, controls testing, conducting more »
IDS/IPS, and IDAM systems • Good understanding of security tooling for cloud and security automation • Familiarity with relevant cyber security standards, to include NIST CSF, ISO 27001 and broader views of good practice • Hands-on-experience working in roles across all phases of the portfolio, programme and project lifecycles more »
business stakeholders at all levels. '€¢Strong written and oral communication skills '€¢Active or ability to obtain SC clearance Preferred Qualification: '€¢SANS Certification '€¢Experience with NIST assurance/EDR '€¢IT Certifications, including Network+, Security+ '€¢Protective Monitoring/SOC Certifications, including CySA+ '€¢Cyber Security Certifications, including CISMP, CISSP '€¢Experience with various Microsoft more »
Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA Identify and deliver appropriate controls based on industry standards (e.g. CCM) to drive cloud and customer security solutions framework based on business more »
architecture of cloud capabilities, including managing operational risk Hands-on experience throughout portfolio, program, and project lifecycles Familiarity with relevant cybersecurity standards such as NIST CSF and ISO 27001 Benefits: Up to £103,000 per annum Company Pension Cycle to work Private healthcare 25 days annual leave Share options more »
and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cyber security related standardsand regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing a service, reviewing effectiveness of services, procurement, or more »
in risk assessment. Demonstrated commitment to ongoing learning in technical concepts and technologies. Familiarity with IT security policies and technical standards (e.g., ISO 27001, NIST, Cyber Essentials, COBIT, SOC 2 Type II, etc.). Proficiency in report writing. Qualifications Bachelor's degree in Computer Science (or related field) 4 + more »
of Operating System security and system hardening concepts, such as CIS Benchmarks. Experience in working with information security frameworks and regulatory requirements, including ISO27001, NIST, PCI DSS, GDPR, Cyber Essentials. Experience in general IT audit processes and conducting risk assessments. more »
GRC, with a focus on acquisition integration. Strong knowledge of regulatory compliance requirements, risk management frameworks, and industry best practices. Familiarity with ISO 27001, NIST, SOC industry frameworks andstandards, GDPR, and privacy frameworks. Proficiency in information security tools, techniques, and controls. Experience with metrics and KPIs to measure andmore »
ISC2 CISSP, indicative of your mastery in cyber security. Strong background in security architecture and risk management. Familiarity with cyber security standards such as NIST CSF and ISO 27001 Interviews are scheduled to take place next week so if you are interested in hearing more about this and other roles more »
documentation. Comfortable with mentoring other team members, providing guidance and direction during incident response and engineering efforts. Familiarity with regulations and frameworks such as NIST, PCI, SOC, HIPAA, SSAE 16/SOC 1, SOC 2, ISO 17799/27002 Preferred but not required: Bachelor’s degree in CyberSecurity, computer science more »
and internationally Desirable but not essential: Knowledge of policy frameworks and understanding of policies, procedures, guideline structure, and regulatory landscapes, such as NERC CIP, NIST, NIS2, GDPR, EPCIP, etc. Virtualization technology, including containerization (e.g., Docker, Kubernetes, Linux, etc.) Host-based security products (threat detection, mitigations, end-user detection and response more »
have a strong background in cyber risk management, vulnerability management, vendor relationship management, and incident response. Strong understanding ofstandards such as PCI-DSS, NIST, ISO27001, GDPR, and similar. Proven track record of developing and implementing effective cyber risk management strategies and solutions. Excellent communication and interpersonal skills, with the more »
Excellent teamwork abilities, including collaboration within geographically dispersed teams. Desirable but not essential: Familiarity with policy frameworks and regulatory landscapes such as NERC CIP, NIST, NIS2, GDPR, EPCIP, etc. Knowledge of virtualization technologies including Docker, Kubernetes, Linux, etc. Experience with host-based security products and methodologies (e.g., threat detection, end more »
You will have solid understanding of AWS, Microsoft security, SIEM, SOC, and programming. Solid experience of relevant security frameworks such as ISO27001, GDPR & HIPAA, NIST Cybersecurity Framework. Proven experience AWS and Azure cloud computing experience Understanding of programming aptitude, including experience with AWS CLI, SQL, scripting languages e.g., Python, PowerShell more »
Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN, Wireshark, VMware, SSL and others Experience and knowledge ofNIST, COBIT, GCIA, GCIH, GCFA etc. This is an excellent opportunity to work in a large, enterprise level environment, where there is plenty of scope for more »
requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA, and other data privacy and security standardsand regulations. Provides internal customer support via assigned tickets … discipline. Provides a documented work history that includes a minimum of 5-years experience in Information Security. Proficiency in security framework models such as NIST, etc., implementing and auditing security measures, security response, and incident management. Possess a working knowledge of Cisco network switches, routers, firewalls and VPN, network security … improve upon vulnerability management program. Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies more »
such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and other standards/frameworks relevant to application security and vulnerability management. Experience with cloud technologies, preferably more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials, Cyber Essentials Plus, andNIST CSF. Experience in incident response and overseeing operational improvement actions such as development and tuning of security monitoring, alerting, and reporting. It goes without saying more »
SQL-based data warehouse solutions. Understanding of network-level security principles and practices Strong understanding of security frameworks andstandards such as ISO 27001, NIST, or CIS. Relevant certifications such as CISSP, CISM, CompTIA Security or CEH are a plus Experience with multi-site business operations is a plus Experience more »
understanding of how to navigate different governance and compliance standards will be key to the role Strong knowledge of information security principles - ISO 27001, NIST, PCIDSS and GDPR. Experience developing and implementing information security strategies, policies, and procedures in a complex matrix management organisational environment. Proven ability to assess andmore »