after 6 months’ service) Income Protection insurance (after 12 months’ service) If you have the following skills, you may be a perfect fit: Have CISM, CISSP or similarly high qualification in InformationSecurity Have excellent knowledge of ISO27001 Be confident in speaking to large groups Have the ability to translate more »
leadership aware of the status of any projects taken on. Certifications involving incident response, ethical hacking, digital forensics, or cyber security (GIAC, CISSP, SSCP, CISM, EC-Council, Offensive Security, etc.) highly desireable Discover the Unexpected Experian is the worlds leading global information services company. Were passionate about unlocking the power more »
requirements Provide metrics for relevant areas of responsibility when required As an ideal candidate, you will have an industry certification such as CISSP/CISM/CRISC and have expert knowledge of project-based Information Security. You will also have a proven track record of delivery in a similar role. more »
Co-ordinator: Educated to degree level or hold a relevant professional qualification or equivalent experience Be a CISSP CertifiedInformation Systems Security Professional and CISMCertifiedInformationSecurityManagerCertified Cyber Professional (CCP). Note: This is a Hybrid working role with office in Stoke Gifford, Bristol. --- Fusion People are more »
varying levels of technical security competency. Educational Background: Professional InformationSecurity certification by a recognised professional body such as Certified in InformationSecurity Management (CISM), CertifiedInformation Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Technical Expertise: Cloud more »
varying levels of technical security competency. Educational Background: Professional InformationSecurity certification by a recognised professional body such as Certified in InformationSecurity Management (CISM), CertifiedInformation Systems Security Professional (CISSP), certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Technical Expertise: Cloud more »
Protection) Exposure to Azure/AWS Experience of working on Change Initiative Programmes Experience of Higher Education preferred but not essential Desirable qualifications: CISSP, CISM and/or TOGAF. What you'll get in return Security Architect/Security Consultant - 6 month contract - Hybrid (2 days P/W onsite more »
Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification/certification (i.e CISSP, CISA, CISM) knowledge or experience of technical engineering. How to apply: If you're ready to embark on a journey of innovation, challenge, and impact, we invite more »
to the challenges this Security Architect role brings, academic excellence should be backed by sound and broad informationsecurity knowledge, relevant qualifications (e.g. CISSP, CISM, IISP/CCP, TOGAF, SABSA) and a track-record delivering security solutions for large-scale infrastructure or integration programmes. We know the skill-gap and more »
and individualsExperience and knowledge of the regulatory environment facing clients; with a particular focus on cyber security and privacy relevant regulationsQualification such as CISSP, CISM, and CIPP/E preferredAdditional InformationLife At PA encompasses our peoples' experience at PA. It's about how we enrich peoples’ working lives by giving more »
Requirement Catalogues and determining Risk - Development of Architectural Technology Strategy encompassing a wide range of technical capabilities Ideally holding the below qualifications: CISSP/CISM/CCSP. TOGAF Please email to arrange a confidential discussion. more »
reporting standards meeting client/customer expectations. Ability to apply a business centric lens to your thinking and approach. Industry and academic credentials (e.g. CISM, CISSP, CEH, CISA or relevant). Ability to build and maintain strong working relationships with internal and external stakeholder groups. Rewards & Benefits TCS is consistently more »
London, Leicester Square, United Kingdom Hybrid / WFH Options
Proactive Appointments
of security protocols and processes Excellent knowledge of governance controls and processes Experience of managing third party vendors including offshore Desirable skills: CCNP certification CISM/CISSP Benefits include: Excellent pension scheme Private medical insurance Dental insurance Season ticket loan Long service awards Hybrid working InformationSecurityManager - Hands-on more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Cathcart Technology
the following skills/experience: - ** Experience within a similar role ** Knowledge of regulatory requirements/data protection - GDPR, CCPA ** Certifications such as CISA and CISM , or similar would be preferred ** Extensive knowledge of informationsecurity principles, best practices, and standards - ISO 27001 A really exciting time to join the company more »
members. Demonstrating expertise and awareness of the regulatory landscape affecting clients, specifically focusing on cybersecurity and privacy regulations. Holding key qualifications such as CISSP, CISM, and CIPP/E. Benefits Package: Base salary: £120,000 - £140,000 (DOE) Company Bonus: 17.5% - Uncapped Car/Cash Allowance: Circa £7,000 Pension more »
Edinburgh, Midlothian, Scotland, United Kingdom Hybrid / WFH Options
Henderson Scott
data system recovery. About You: Working experience in a similar role. Degree in computer science or equivalent. Certified or accredited in cyber security (CISSP, CISM ect) Organised and experience in project management. Ability to work under pressure and to strict deadlines. Excellent communicator, both written and verbal. Keen interest in more »
realisation. Ability to interact with varying levels of the executives and convey complex technical, operational challenges to them for decision making, prioritization. Qualifications CISA, CISM or similar (preferred more »
English Preferably educated to degree level in a relevant field Holds or has previously held professional level certifications related to network security (examples: CEH, CISM, CCNP Securitymore »
the global technology infrastructure. Requirements: Expertise in IT, disaster recovery planning, and cybersecurity. Preferred certifications in relevant disciplines (CompTIA Network +, CompTIA Security +, CISM, CISSP or COBIT 5) Baseline knowledge of resilience frameworks (NIST CSF, ISO 27001/27002 and COBIT) For more information, please apply more »
GDPR, Privacy Shield) and industry standards and frameworks, such as GAPP and BCR Possession of relevant qualifications such as CIPM, CIPT, CIPP/E, CISM, CISSP, and/or HCISSP, as well as involvement in industry related organizations (e.g. IAPP, ISACA, (ISC)²) are desirable. Where you do not have the more »
Groups and the wider DTI Security community. Required Skills and Qualifications: Experience in Privileged Access Management and Identity Governance and Access Management. CISSP or CISM certification. Technical security knowledge with exposure to relevant technical architecture, environments, platforms, and software industry practices. Familiarity with InformationSecurity principles, tools, processes, and procedures. more »
Operations Resilience Act (D ORA).5 years of experience (minimum) selling technical services for multi-industry cust omersOne or more security certifications, e.g., CISSP, CISM, CCSP or CCSK. more »
A collaborative mindset and the ability to communicate effectively across various teams. Certifications would be ideal but not required (such as CISSP, GCIH, or CISM). Why Register with Us? As part of our network: you'll gain access to exclusive opportunities with our partners, including leading Cyber Security firms more »
responses to potential disruptions such as cyberattacks or infrastructure damage. -Possessing one of the following certifications is advantageous: CompTIA Network +, CompTIA Security +, CISM, CISSP, or COBIT 5. -Demonstrate a fundamental understanding of frameworks such as NIST CSF, ISO 27001/27002, and COBIT. -Experience in Operational Technology Securitymore »
and Project/Programme assurance. Affinity with services including Workday and wider ERP transformation/Audit work Ideally (but not essential) have a CISA, CISM or other relevant IT audit qualification Worked inside a top 30 practice firm conducting IT audit, risk or controls assurance for non-financial service clients more »