Job Search and Career Advice Platform

Enable job alerts via email!

Cybersecurity Specialist | Sea Fish Mongers

SEA FISH MONGERS LIMITED

Greater London

On-site

GBP 50,000 - 70,000

Full time

Today
Be an early applicant

Generate a tailored resume in minutes

Land an interview and earn more. Learn more

Job summary

A leading security firm in the United Kingdom is seeking an experienced cybersecurity professional to design and implement security protocols. Your role will involve conducting security audits and vulnerability assessments to ensure compliance with regulations like GDPR. The ideal candidate has demonstrable experience in cybersecurity, strong analytical skills, and familiarity with tools like SIEM and IDS/IPS. Certifications such as CISSP or CISM are preferred. This position is based in Greater London.

Qualifications

  • Demonstrable experience in cybersecurity roles.
  • Solid knowledge of network security and application security.
  • Experience with security tools.

Responsibilities

  • Design, implement, and maintain security protocols.
  • Conduct periodic security audits and vulnerability assessments.
  • Monitor systems and respond to security incidents.

Skills

Cybersecurity experience
Network security
Application security
Identity/access management
Analytical mindset
Problem-solving skills

Education

Certifications such as CISSP, CISM, CEH

Tools

SIEM
IDS/IPS
Vulnerability scanners
Job description
Key Responsibilities
  • Design, implement, and maintain security protocols, policies, and infrastructure.
  • Conduct periodic security audits, vulnerability assessments, and penetration tests.
  • Monitor systems, networks, and applications for security breaches; respond to incidents.
  • Ensure regulatory compliance (data protection, GDPR, PCI-DSS, where applicable).
  • Collaborate with IT and development teams to enforce secure coding practices.
Requirements / Skills
  • Demonstrable experience in cybersecurity roles.
  • Solid knowledge of network security, application security, and identity/access management.
  • Experience with tools such as SIEM, IDS/IPS, and vulnerability scanners.
  • Certifications such as CISSP, CISM, CEH, or similar are preferred.
  • Strong analytical mindset and problem‑solving skills.
Get your free, confidential resume review.
or drag and drop a PDF, DOC, DOCX, ODT, or PAGES file up to 5MB.