Available Jobs
Cyber Security Trainee |
Apply | |||
Location: Reading Recruiter: ECareers Job Hours: Part-time |
||||
Ideal For a New Career Starter, No Experience Required.WE WILL PROVIDE FULL TRAINING AT NO COST.OverviewWe have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee.The candidate does NOT need to have any prior experience since all the necessary training will... | ||||
Cyber Security Governance Manager |
Apply | |||
Location: London Area Salary: £70,000 per year Recruiter: 83zero Job Hours: Full-time |
||||
Cyber Security Governance Manager Company Overview 83zero is working with a leading IT consultancy that partners with global organisations to deliver IT operations along with business advancements through the adoption of new and innovative technologies. Our client partners with a number ... Read More | ||||
Cyber Security Governance Manager |
Apply | |||
Location: London Area Salary: £70,000 per year Recruiter: 83zero Job Hours: Full-time |
||||
Cyber Security Governance Manager Company Overview 83zero is working with a leading IT consultancy that partners with global organisations to deliver IT operations along with business advancements through the adoption of new and innovative technologies. Our client partners with a number ... Read More | ||||
Cyber Security Consultant |
Apply | |||
Location: Reading Recruiter: Project People Job Hours: Full-time |
||||
LEAD CYBER SECURITY CONSULTANT – READING – CONTRACT- HYBRID Lead Cyber Security Consultant Contract – 6 Months - Inside IR35 Location: Reading – 2 days onsite/week must The role of Cyber Security Consultant sits within the Cyber Security team which is responsible for providing subje... | ||||
Cyber Security Consultant |
Apply | |||
Location: Reading Recruiter: Project People Job Hours: Full-time |
||||
LEAD CYBER SECURITY CONSULTANT – READING – CONTRACT- HYBRID Lead Cyber Security Consultant Contract – 6 Months - Inside IR35 Location: Reading – 2 days onsite/week must The role of Cyber Security Consultant sits within the Cyber Security team which is responsible for providing subje... | ||||
Cyber Security Engineer |
Apply | |||
Location: Reading Recruiter: Focus Resourcing Job Hours: Full-time |
||||
Due to growth our client is seeking an experienced Cyber Security Engineer for their team in Reading. For this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. Th... | ||||
Cyber Security Operations Lead |
Apply | |||
Location: Reading Recruiter: Project People Job Hours: Full-time |
||||
Lead Cyber Security Operations - SOC Contract Reading/Hybrid Overview of the role: The role of Cyber Security Operations sits within the Cyber Security team, which is responsible for providing subject matter expertise and guidance to business units across Network and Enterprise domains to en... | ||||
Cyber Security Operations Lead |
Apply | |||
Location: Reading Recruiter: Project People Job Hours: Full-time |
||||
Lead Cyber Security Operations - SOC Contract Reading/Hybrid Overview of the role: The role of Cyber Security Operations sits within the Cyber Security team, which is responsible for providing subject matter expertise and guidance to business units across Network and Enterprise domains to en... | ||||
Information Security Officer |
Apply | |||
Location: Reading Recruiter: Matched Job Hours: Part-time |
||||
Information Security Officer Hours : part-time, 3 days per week Company : Growing Software Vendor Why : Support the build & maintenance ISO27001 and other policies Location : Greater Reading area office (hybrid, 1 day in the office initially then as and when needed) Do you have 3+ years' experience... Read More | ||||
Cyber Security Analyst |
Apply | |||
Location: Reading Salary: £50,000 per year Recruiter: LT Harper Cyber Security Recruitment Job Hours: Full-time |
||||
Currently working with a growing Financial Services business, they are looking for a Cyber Security Analyst who will review computer networks and identify any potential vulnerabilities, install the necessary software to protect it from unauthorised access, and document detections so that future brea... |