SECURITY•1-10 employees
Hiring with us since January, 2021
We provide the best security to some of the best companies out there.
Chat with us
No active jobs
Suggested jobs from other companies
Penetration Tester/Security Consultant - £40k-£65k - (Remote). Penetration Tester/Security Consultant. Penetration tester / Security consultant:. Requirements of a Penetration Tester / Security Consultant:. ...
DV (UK**) Cleared Cyber Security Consultant - £650 a day - OUTSIDE IR35 - 12 Months. O Associates are looking for x2 eDV (UK**) Cleared Cyber Security Consultants for an. Extensive Cyber Security background working Assurance, Compliance, Consultant based roles. DV (UK**) Cleared Cyber Security Co...
This involves overseeing Security technology and Security Operations Centre management. ...
This position would suit an experienced Cyber Security Consultant with a breadth of knowledge across multiple cyber security disciplines and extensive knowledge of Information Security Governance standards and frameworks. Broad knowledge across different Information and Cyber Security disciplines...
REMOTE Security Consultant / Penetration Tester £60-65K:. Do you have a background in coding, scripting, development, or automation? If this is you, my client requires an Offensive Security SME to deliver security testing engagements to a high standard. This is an opportunity to work for a reputa...
Other accepted certifications include but are not limited to: ISA/IEC 62443 Cybersecurity Risk Assessment Specialist, ISA/IEC 62443 Cybersecurity Design Specialist, ISA/IEC 62443 Cybersecurity Maintenance Specialist, SANS Global Industrial Cyber Security Professional (GICSP), and Certified SCADA ...
... cleaning, catering, security, technical services, energy management and compliance, front of house, landscaping, logistics, waste management and pest control services. The company has a turnover of ...
... delivery teams. Key skills and responsibilities, * Strong IT Security Management experience ... Demonstrated leadership in guiding teams through the entire IT service life cycle, fortifying ...