JOBS > Careers


« Back to News

2023-09-14

Driving LGBTQ+ Change From Within

People Transformation: Although cyber security is an industry used to big changes, LGBTQ+ people can feel left out. By Caroline Griffin Pain

2023-07-10

Can AI Help Reduce The Cybersecurity Workforce Gap?

Cybersecurity Operations: Automation is now regarded as a primary workforce strategy that 80% of organisations intend to pursue. By Jamal Elmellas

2023-05-23

Artificial Intelligence To Replace 55,000 Telecom Jobs

A 42% Headcount Reduction: British Telecom plans a much smaller workforce and a significantly reduced cost base by deploying AI.

2023-05-09

Challenges For CTOs In 2023

Being a CTO in 2023 has to be recognised as one of the most demanding yet fulfilling executive roles on the Board. By Chris Carreiro

2023-03-16

Why Cutting Cybersecurity Jobs Is Shortsighted

Business leaders should make smarter investments to strengthen existing security, not short-term attempts to save money. By Dan Davies

2022-12-16

The Great Resignation

The Quiet Resignation: Five security awareness countermeasures to security threats derived from these workforce trends. By Omer Taran

2022-11-23

How To Become A Cyber Millionaire

Cyber Security Professionals In Demand: Business and investment is booming and here are some career suggestions that could make you rich.

2022-11-21

Black Women Comprise Less Than 1% Of The IT Workforce

Racist & Sexist?: Black women, and women in general, working in tech are often where they are despite the lack of inclusive working culture.

2022-11-09

Wanted - A New Generation Of Cyber Security Leaders

A Perfect Storm: Cyber security leadership is broken & failing to deliver cyber success for businesses, many of which don't understand the threat.

2022-07-19

Ransomware Is Driving Cyber Security Professionals To Consider Quitting

Persistent ransomware threats and looming, large-scale attacks are pushing some security professionals towards leaving their chosen career. 

2022-07-20

How Do You Solve A Problem Like The Cyber Security Skills Gap?

The Human Element: It may come as a surprise to some people, but cyber security is not about technology - it's about people. By Rob Demain

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

CSI Consulting Services

CSI Consulting Services

Get Advice From The Experts: * Training * Penetration Testing * Data Governance * GDPR Compliance. Connecting you to the best in the business.

North Infosec Testing (North IT)

North Infosec Testing (North IT)

North IT (North Infosec Testing) are an award-winning provider of web, software, and application penetration testing.

Authentic8

Authentic8

Authentic8 transforms how organizations secure and control the use of the web with Silo, its patented cloud browser.

StoneFly

StoneFly

StoneFly offers High Availability, high performance cluster and scale out storage, and backup and disaster recovery appliances.

K&D Insurance Brokers

K&D Insurance Brokers

K&D provide insurance for all sectors of industry and commerce including cyber risk cover.

Systancia

Systancia

Systancia offer solutions for the virtualization of applications and VDI, external access security, Privileged Access Management (PAM), Single Sign-On (SSO) and Identity and Access Management (IAM).

Cyberwrite

Cyberwrite

Cyberwrite was founded to provide underwriters around the world a unique and innovative Cyber Underwriting platform.

HvS Consulting

HvS Consulting

HvS Consulting is a specialist information security company offering a full range of services including IT security architecture, ISO 27001 audits, Pentesting, Security monitoring and Training.

Cloudentity

Cloudentity

Cloudentity combines Identity for all things with API and Application security in a unique deployment model, combining cloud-transformation and legacy systems.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Pixm

Pixm

Pixm’s computer vision based approach offers a truly unique and effective means to protect organizations from web-based phishing attacks.

AlJammaz Technologies

AlJammaz Technologies

AlJammaz Technologies is the leading Technology Value-Added Distributor, which distributes advanced technology products, solutions and services in area including networking and cybersecurity.

Pivot Technology School

Pivot Technology School

Pivot Tech offers Data Analytics, Software Development and Cyber Security training in boot camp style cohorts.

Cyber Defense Technologies (CDT)

Cyber Defense Technologies (CDT)

Cyber Defense Technologies provides services and turn-key solutions to secure and maintain the integrity of your organization’s systems and data against attacks.

Open Source Security Foundation (OpenSSF)

Open Source Security Foundation (OpenSSF)

OpenSSF is committed to collaboration and working both upstream and with existing communities to advance open source security for all.

ITC Federal

ITC Federal

ITC Federal delivers IT cybersecurity assessment services to support agencies in meeting their security strategies and federal security compliance goals.

RealDefense

RealDefense

RealDefense develops and markets various privacy, security and optimization technologies and services for consumers and small businesses.

Acumenis

Acumenis

At Acumenis, we help organisations of all sizes to manage information security effectively. Our key services are penetration testing, ISO 27001 implementations, and security

Queen Consulting & Technologies

Queen Consulting & Technologies

Queen Consulting & Technologies specialize in providing IT support, management, and Security to Gov’t Contractors, CPAs, and Nonprofits.