Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
and maintain UK Secret clearance Experienced in working with TCP/IP, Firewalls and network technology (Cisco, Juniper, Microsoft etc) Industry qualifications such as CISSP, CCNP, MCSE or CMI Malware Investigations or equivalent. Excellent customer facing skills, internally and externally facing with national and international agencies. Knowledge of cyber … NIST 800-171, ISO27001 would be advantageous. Desirable: Degree in Information Technology, Computer Science, or Cyber Security. InformationSecurity related certifications such as Security+, CISSP, CISM, GSEC, SSCP ITIL certifications ITIL Foundation. #LI-MF1 RTX is An Equal Opportunity/Affirmative Action Employer. All qualified applicants will receive consideration more »
to multi-task and prioritize workload Experience in a team-oriented, collaborative environment Able to work after-hours and on call as needed Certifications: CISSP, GSEC, CRISC, OSCP, GCTI, GEVA, Security+, Vendor Certifications more »
reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
leading cloud platforms Proficiency in cloud security tools and automation Professional certifications in cloud architecture from Amazon AWS, Google Cloud, or Microsoft Azure ISC2CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, and IDAM systemsmore »
ARM. Hands-on experience with security tools and technologies In-depth knowledge of cloud security (AWS, Azure, GCP). Relevant certifications such as CSPM, CISSP, CISM, CEH, or AWS CertifiedSecurity – Specialty. Familiarity with zero-trust architecture and principles. more »
stakeholder management and team management skills. Advantageous: Degree level qualified, MSc in InformationSecurity, IT or relevant STEM subjects. General informationsecurity certificates such CISSP, CISM or CISA. Incident management certifications such as: CREST certified incident manager (CCIM). GIAC Certified Incident Handler (GCIH) Digital forensics certificates such as more »
European/Global regulatory environment governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, InformationSecuritymore »
team effectiveness and efficiency. Mentor and develop junior team members. Role Requirements: High level technical knowledge with a relevant qualification (e.g., CompTIA Security+, CISM, CISSP, or CISA). Experience in a technical role. Results-oriented with a proactive approach to task completion. Excellent communication skills. Strong stakeholder and relationship more »
or more of the main cloud vendor platforms (AWS, Azure & GCP) Good understanding of security tooling for cloud as well as security automation ISC2CISSP accreditation or equivalent internationally recognised membership Demonstratable background in security architecture including experience in designing and implementing technology solutions using firewall, secure networks, IDS more »
orchestration technologies - Docker and KubernetesExperience w/systems configuration orchestration tools - Ansible or TerraformUnderstanding of infrastructure as a code and conceptsRelated security certifications (e.g. CISSP, CCSP, SABSA, ITIL etc.).Familiarity and experience with the Splunk SPL query language.3+ years familiarity and experience with Linux/Ubuntu/Mac systemsExperience more »
and intrusion detection/prevention platforms. Proficiency in Python, PowerShell scripting, and Shell scripts. Familiarity with SIEM platforms is preferred. Security certification such as CISSP, GCIA, or CISM is a plus. Our client is an equal opportunity employer who are committed to fostering an inclusive environment and encourage applications more »
know or learn:Knowledge of Infrastructure as CodeKnowledge of Azure, AWS, and Kubernetes cloud-native servicesSecuring GitOps and Continuous DeploymentRelevant certifications such as SABSA, CISSP, CCSK, AZ-500Your Personal AttributesHas a strategic problem-solver mentality.Ability to consider the “wider picture”Builds partnerships through teamwork and pulling togetherApplies critical thinking more »
level of judgment and maturityQualifications:• Bachelor’s degree in InformationSystems (IS), Information Technology or a related area.• Recognized and active certification such as CISSP, CISA, CISM, CRISC or similar.A snippet of what you’ll get in return:Make your day work for you with our flexible working hours. more »
Proven ability in taking appropriate action after monitoring/reviewing the progress and performance of othersQualifications and Skills Degree level qualifiedRecognised professional qualifications (e.g. CISSP, CISM, CBCI, etc.), or comparable experienceExcellent communication skills (both written and oral), negotiation and project management skills Strong networking skills and a broad professionalmore »
conduct simulation exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. more »
minimum) or equivalent experience and certifications 7 or more years of experience working in InformationSecurity or relevant IT technical roles with increasing responsibility CISSP, CISM, GSEC, or equivalent accepted cyber management certification Working knowledge of the following InformationSecurity domains, 4 required Security Operations Cloud Security Network Security … or more years of experience with endpoint protection tools 2 or more years of experience working with threat intelligence feeds and IOCs Cybersecurity Certification (CISSP, CISM, GSEC, etc) Preferred Qualifications and Education: Experience with cloud services and APIs Working knowledge of firewall, router, network switch, VOIP, and wireless architecture more »
and ISE - Experience with network security protocols and tools, such as VLANs, IPSec, and SSL VPN - Certifications such as CCNA Security, CCNP Security, or CISSP are a plus - Excellent communication and problem-solving skills - Ability to work effectively in a fast-paced, collaborative environment - Strong attention to detail and more »
programming languages such as Java, C++, or Python - Excellent problem-solving and analytical skills - Effective communication skills, both written and verbal - Relevant certifications (e.g., CISSP, CEH, OSCP) are highly regarded This role is ideal for a forward-thinking individual passionate about cybersecurity and software development, eager to contribute to more »
global technology infrastructure. Requirements: Expertise in IT, disaster recovery planning, and cybersecurity. Preferred certifications in relevant disciplines (CompTIA Network +, CompTIA Security +, CISM, CISSP or COBIT 5) Baseline knowledge of resilience frameworks (NIST CSF, ISO 27001/27002 and COBIT) For more information, please apply more »
leads Cognism's Information Risk and Security program, overseeing strategy, architecture, and processes to protect assets. You will most likely have a certification in CISSP and/or CISM. Responsibilities include managing the Security team, budget, and relationships with other teams. The VP of InfoSec provides insights on threats … for information risk management and security with key stakeholders and internal groups. Education, Experience, AbilitiesYou will have two or more of the following certifications: CISSP, CISM, CISA, GISF, CEH, GSSP, CSSLP, GCIH, CGEIT, MCP, CCNA, and others relevant for the CISO role. Background in IT Platforms and their securitymore »
InformationSecurity Officer Key Responsibilities: - Perform security assessments for vendors and projects, identifying risks and recommending mitigation strategies. - Ensure compliance with security policies and standards in all vendor and project activities. - Develop and maintain frameworks for security assessments. - Stay updated more »
and the organisational challenges to addressing these threats. Qualifications we are looking for include - CertifiedInformationSecurity Manager (CISM), CertifiedInformationSystemsSecurityProfessional (CISSP), MSc InformationSecurity, Achieved Senior or Lead level certification in the NCSC’s Certified Cyber Professional scheme in one or more of Security and more »
platform owner for perimeter security technologies and will need to demonstrate a deep understanding of the security concepts that determine a secure network perimeter (CISSP advantageous). Required experience and knowledge: c.10 years Network Security experience achieved in a financial services/markets environment CCNP-level knowledge of routing … using vendor and open-source tooling SIEM log analysis and anomaly detection experience (preferable) Coding and automation experience Python and/or Terraform (preferable) CISSP certifications or familiarity with CISSP concepts Hybrid working role. Market-leading compensation package. more »
the ability to assess and mitigate security risks. Proven track record of implementing new technologies to enhance security capabilities. CertifiedInformationSystemsSecurityProfessional (CISSP) or similar certification preferred. If interested, please apply immediately for further details & a confidential discussion. more »
their offering to their clients in the South West. KEY SKILLS REQUIRED FOR THIS ROLE Cyber Security, Nuclear, Energy, InformationSecurity, SCADA, Operational Technology, CISSP IMPORTANT Cyber Security, InformationSecurity, SCADA, Nuclear, CISSP JOB DESCRIPTION Introduction We've partnered with an exciting organisation at the intersection of the … the various security engineering solutions, such as Endpoint Protection, IDS/IPS, and Firewalls for IT/OT environments. Additional certifications such as GICSP, CISSP, or related to ISA/IEC 62443 and MITRE ATT&CK frameworks would be beneficial, but these aren't essential for you to apply. more »