Endpoint and network security tools/techniques. Minimum Requirements: Education Bachelor’s degree in Information Security or similar. Industry certifications such as CISSP, SANS/GIAC: GSEC, GCIH, GFCA, GCFE, GCIA; EC-Council: CEH, ECIH, CHFI, ECSA; Security+; Tenable: TCNU, TCNA, TCSE, ISO27001 (Candidates with certifications will be given preferential reviews). NB: Communication will be limited to shortlisted applicants More ❯
ideal candidate will demonstrate high ethical standards, autonomy, and possess: A bachelor’s degree in computer science, information systems, cybersecurity, or related fields. Security certifications such as GCIA, GCFA, GCFE, CISSP (Associate), CEH, or equivalents. Experience in areas like IAM, security operations, threat hunting, EDR, detection signatures, and analytics. Knowledge of open standards such as SAML, OAuth, or OpenID. Experience More ❯
indisputably high ethical standards and autonomy, the ideal candidate possesses the following: Bachelor's degree in computer science, information systems, cybersecurity, or a related field Security certifications: GCIA, GCFA, GCFE, CISSP (Associate), CEH, or comps. Experience in one or more areas: identity and access management, security operations, cyber threat hunting, Endpoint Detection and Response (EDR), detection signatures and analytics Experience More ❯
a focus on development and psychological safety. Preferred Qualifications: Degree in Cybersecurity, Computer Science, or a related discipline—or equivalent practical experience. Industry-recognised certifications (e.g., CISSP, GIAC, GCIH, GCFE, GREM) a plus. Familiarity with ITIL and enterprise project management practices. Experience managing third-party vendors and security transformation initiatives in large-scale, digitally complex organisations. More ❯
a focus on development and psychological safety. Preferred Qualifications: Degree in Cybersecurity, Computer Science, or a related discipline—or equivalent practical experience. Industry-recognised certifications (e.g., CISSP, GIAC, GCIH, GCFE, GREM) a plus. Familiarity with ITIL and enterprise project management practices. Experience managing third-party vendors and security transformation initiatives in large-scale, digitally complex organisations. Seniority level Seniority level More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or Ethical Hacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and other cybersecurity frameworks. High-level understanding of More ❯
a focus on development and psychological safety. Preferred Qualifications: Degree in Cybersecurity, Computer Science, or a related discipline—or equivalent practical experience. Industry-recognised certifications (e.g., CISSP, GIAC, GCIH, GCFE, GREM) a plus. Familiarity with ITIL and enterprise project management practices. Experience managing third-party vendors and security transformation initiatives in large-scale, digitally complex organisations. #J-18808-Ljbffr More ❯
focused on mentoring, wellbeing, and trust. "Nice to have" skills & experience: BSc or higher or equivalent experience within a relevant security-related subject. Certifications such as CISSP, GCIH, GIAC, GCFE, GREM, or SANS certifications. Solid grasp of ITIL and familiarity with project management methodologies. Experience leading security transformation initiatives, as well as handling third-party vendors and external security partnerships More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Client Server Ltd
based IDS/IPS, WAF, EDR You have a strong understanding of networking protocols, operating systems and cyber security technologies You have excellent communication skills CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred What's in it for you: As a Senior Security Operations Analyst (SOC) you will receive a comprehensive More ❯
based IDS/IPS, WAF, EDR You have a strong understanding of networking protocols, operating systems and cyber security technologies You have excellent communication skills CISSP, CISM, GCIA, GCIH, GCFE, GCFA, GREM, Splunk Power User and/or similar certifications is preferred What's in it for you: As a Senior Security Operations Analyst (SOC) you will receive a comprehensive More ❯
and business continuity teams during major incidents Familiarity with frameworks such as NIST 800-61, ISO 27035, or MITRE ATT&CK for incident response planning and execution GIAC Certification GCFE/GCFA/GREM/GNFA/GCIA/GMON Certification in Azure/AWS/GCP security NOTES Please apply via this portal as e-mail applications may not More ❯