and continuously improve upon vulnerability management program.Ability to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications:CertifiedInformation System SecurityProfessional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud SecurityProfessional (CCSP) and\or Certified Ethical Hacker (CEH)Knowledge and experience with Microsoft Office and Visio.Knowledge of more »
to multi-task and prioritize workload Experience in a team-oriented, collaborative environment Able to work after-hours and on call as needed Certifications: CISSP, GSEC, CRISC, OSCP, GCTI, GEVA, Security+, Vendor Certifications more »
security compliance frameworks (e.g., NIST, ISO 27001, GDPR). * Excellent analytical and problem-solving skills. * Effective communication and interpersonal skills. * Relevant certifications such as CISSP, CISM, CCSP, or Microsoft Certified: Security, Compliance, Identity Fundamentals and Cybersecurity (SC-100) are a plus. * Hybrid and multi-cloud infrastructures * Security Cleared or more »
verbal communication skills. Ability to work independently and as part of a team. Eligible to obtain Security Clearance. Desired Qualifications: Relevant certifications (e.g., GCIH, CISSP, Security+, CySA+). Experience with cloud security (AWS, Azure). Familiarity with industry security standards and frameworks (NIST, ISO 27001). What They Offer more »
new threats that could impact MM Flowers. What you can already do Degree in Computer Science (or similar) Obtained, or working towards CISMP/CISSP Understanding of GDPR Understanding and knowledge of NIST 800-53/ISO27001/GDPR. Experience of managing Cyber Security in a fast-paced manufacturing more »
Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
Knowledge of reporting suites such as Power BI Good understanding of Microsoft security suites and associated qualifications Threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, CISA by a recognised professional body Technical certifications by a recognised professional body in network or systems engineering Fundamental Cloud Concepts for AWS. more »
reduce the risk posed to the company. You will hold professional qualifications within security e.g Security+, AWS Security or MS Azure Security and ideally CISSP (although for the right candidate we can support the gaining of this qualification). Key responsibilities include: Security Monitoring and Incident Response Monitoring systemsmore »
out-of-hours work as required. Qualifications and Experience: Bachelor's degree in Cybersecurity, Computer Science, or related field. Relevant professional certifications such as CISSP, CISM, GIAC, or equivalent are preferred. Strong working experience with Sentinel. Familiarity with industry frameworks and standards such as NIST, ISO 27001, and CIS more »
SOAR) systems • Good knowledge of common operating systems (Windows, Mac, Linux) • Good knowledge of networking and network equipment • Relevant certifications such as CompTIA Security+, CISSP, CISM, or equivalent are a plus; or a desire to progress towards these certificationsProficiency in using SIEM tools, log analysis platforms, and firewall management more »
Manchester, England, United Kingdom Hybrid / WFH Options
Pontoon
analytical skills to identify and mitigate security risks. Proven ability to provide effective security recommendations in a project setting.- Certifications: Relevant certifications such as CISSP, CISM, CEH, or similar. Cloud-specific certifications like AWS CertifiedSecurity - Specialty, Azure Security Engineer Associate, etc., are highly desirable.- Experience: Minimum of more »
reporting suites such as Power BI. Strong understanding of Microsoft security suites and relevant qualifications. Expertise in threat identification. Security certifications such as CISM, CISSP, M.Inst.ISP, or CISA from a recognized professional body. Understanding of fundamental cloud concepts, particularly for AWS. Familiarity with OWASP Top 10 and the API more »
leading cloud platforms Proficiency in cloud security tools and automation Professional certifications in cloud architecture from Amazon AWS, Google Cloud, or Microsoft Azure ISC2CISSP accreditation or equivalent Background in security architecture, including designing and implementing technology solutions such as firewalls, secure networks, IDS/IPS, and IDAM systemsmore »
SOAR) systems * Good knowledge of common operating systems (Windows, Mac, Linux) * Good knowledge of networking and network equipment * Relevant certifications such as CompTIA Security+, CISSP, CISM, or equivalent are a plus; or a desire to progress towards these certificationsProficiency in using SIEM tools, log analysis platforms, and firewall management more »
other relevant stakeholders during security incidents and investigations.CompetenciesBachelor's degree in Computer Science, Information Technology, Cybersecurity, or a related field. Relevant certifications such as CISSP, CISM, or GIAC are preferred.Proven experience in security operations management and cybersecurity, with a track record of successful incident response and security incident management.Strong more »
network defense, protective monitoring engineering Understanding of DevOps, CI/CD, software development and testing, infrastructure as code A cyber security qualification such as CISSP or CISM Experience of working to recognised industry standards such as PCI-DSS, ISO27001 or ISAE 3402 SOC Experience of working in a consultancy more »
and SIEM technologies eg Microsoft Sentinel An interest in automation of Security operation function including artificial intelligence An understanding of Microsoft security product portfolio CISSP/CISM (Desired) CCSP/SSCP (Desired) Proven experience in Cybersecurity and IT Operations (Required) DLP, EDR/XDR, CASB, E-mail Security, SWG more »
of enterprise Windows security controls(Preferred) Degree level qualified, MSc in InformationSecurity, IT or relevant STEM subjects. (Preferred) General informationsecurity certificates such CISSP, CISM or CISA. (Preferred) Incident management certifications such as:CREST certified incident manager (CCIM).GIAC Certified Incident Handler (GCIH)(Preferred) Digital forensics certificates such more »
PowerBI or a similar dashboarding application.Knowledge of securitysystems (including working with SIEM data).SQL or database knowledge would be desirable.Relevant certifications such as CISSP, CISM, or CRISC are preferred.Proven experience in managing and delivering technical projects and teams.Connect to your business - Enabling FunctionsCollaboration is central to everything we more »
ideally a Microsoft SecOps-specific certification(s) e.g. Microsoft Security Operations Analyst (SC-200) and/or cyber security industry certification(s) such as CISSP, CISM, or CCSP. If you are Security, Cyber or SOC professional looking for a role which gives you new challenges, opportunity for growth and more »
European/Global regulatory environment governing cybersecurity together with a deep understanding of ISO27001, NIST-SP800, NIS-2, IEC62443, EN50600 and other common standards, CISSP, CISM and/or CISA certifications would be beneficial but equivalent experience or demonstratable equivalent knowledge will also be accepted. Cyber, Security, InformationSecuritymore »
MITRE ATT&CK to model & analyze threat activityFamiliarity with common approaches to automating processes to reduce manual effort and optimize workflowsSecurity certifications such as CISSP, CISM, CISA, GCIA, GCIH, Security+, or similarPHYSICAL/MENTAL REQUIREMENTSAbility to perform complex data analysisWork Location Assignment: Sandwich (Kent) with flexibilityPurpose Breakthroughs that change more »
PowerShell, Windows Shell Script). -A proactive approach to staying updated with the latest security threats, vulnerabilities, and mitigation techniques. -Industry certifications such as CISSP, CISM, CEH, ECSA, LPT, OSCP, AWS certifiedsecurity, or equivalent are highly desirable. What we are offering -Extensive Health Insurance, Income Protection, Life Assurance more »
Experience with securityinformation and event management (SIEM) systems. Strong analytical and problem-solving skills. Excellent communication and teamwork abilities. Relevant certifications such as CISSP, CEH, or CompTIA Security+ are a plus. Preferred Skills: Knowledge of regulatory requirements and standards such as GDPR, HIPAA, or ISO 27001. Experience with more »
to tight deadlines Self-motivated and ability to work largely unsupervised Professional qualifications Bachelor's degree in Computer Science, Engineering, or related field CISM, CISSP, CISA or similar professional qualification more »