JOBS > Careers


« Back to News

2024-03-15

The Cyber Skills Gap & How We Act For The Future

Never Too Late: Digital transformation is running far ahead of the available skills to protect data and prevent cyber crime. By Charles White

2024-03-13

Gender Diversity In The Technology Sector

The Tide is Turning: British organisations are slowly starting to recognise the benefits of employing more women in the technology sector.

2024-02-27

Will Generative-AI Take Female Jobs?

Use of AI in the workplace is increasing fast and female workers are concerned that this technology could place them at a higher risk of redundancy.

2024-02-05

Military Service Is An Ideal Background For A Cybersecurity Career

Addressing The Cybersecurity Talent Shortfall: Recruiters can tap into the rich diversity of skills offered by Armed Forces veterans. By Chip Daniels

2024-01-27

To Increase Your Pay You Should Acquire AI Skills

Career Opportunities: Employers are willing to pay a 31% premium for IT workers with AI expertise and often they are offering six-figure salaries.

2025-04-23

Cyber Security Jobs In 2025

If you’re looking for a rewarding career, cyber security might be your ideal choice. Qualified professionals are in high demand and the pay is good. 

2023-11-20

Bridging The Gap Between Cybersecurity & Business Goals

The Evolving Role Of The CISO: The modern CISO has pivotal responsibilities across the oprganisation & faces formidable challenges. By Brandon Rochat

2023-11-14

The Cyber Skills Gap Is Still Not Getting Better

Despite growing to 5.5 million professionals worldwide, the industry still needs millions of qualified workers to defend against digital threats.

2023-09-18

The US Space Force Needs Help

Multitasking: The US Space Force urgently needs more skilled personnel to protect the military satellite fleet and operate its weapons systems.

2023-09-14

Driving LGBTQ+ Change From Within

People Transformation: Although cyber security is an industry used to big changes, LGBTQ+ people can feel left out. By Caroline Griffin Pain

2023-07-10

Can AI Help Reduce The Cybersecurity Workforce Gap?

Cybersecurity Operations: Automation is now regarded as a primary workforce strategy that 80% of organisations intend to pursue. By Jamal Elmellas

Infosecurity Europe
CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

TÜV SÜD Academy UK

TÜV SÜD Academy UK

TÜV SÜD offers expert-led cybersecurity training to help organisations safeguard their operations and data.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Feedzai

Feedzai

Feedzai provide software that uses big data analysis and machine-based learning to prevent fraud in ecommerce.

CERT-AM

CERT-AM

CERT-AM is the national Computer Emergency Response Team for Armenia.

Namogoo

Namogoo

Namogoo’s disruptive technology identifies and blocks unauthorized product ads that are injected into customer web sessions by client-side Digital Malware.

CERT Tonga

CERT Tonga

CERT Tonga is the national Computer Emergency Response Team for Tonga.

Genians

Genians

Genians provides the industry’s leading Network Access Control (NAC) solution, which ensures full visibility of all IP-enabled devices regardless of whether they are wired, wireless, or virtual.

Cyrebro

Cyrebro

CYREBRO is your online cybersecurity central command managed SOC that integrates all your security events with strategic monitoring, proactive threat intelligence, and rapid incident response.

Managed IT Services

Managed IT Services

Managed IT Services is a managed IT Services Company offering a diverse range of Cyber Security services and IT solutions.

Trusted Cyber Solutions

Trusted Cyber Solutions

Trusted Cyber Solutions is an independent Cyber Security and Risk Management consultancy.

SpireTec Solutions

SpireTec Solutions

SpireTec Solutions is an IT management training company offering 1500+ courses with state of art training facilities backed by a team of industry experts in various domains including cybersecurity.

Avocado Consulting

Avocado Consulting

Avocado helps clients deliver with certainty on their complex IT change, with technology services that automate, monitor and optimise.

Netox

Netox

Netox is a comprehensive IT service provider that combines IT support services, IT solutions and specialist services; specializing in cybersecurity solutions.

Carahsoft Technology Corp

Carahsoft Technology Corp

Carahsoft Technology is The Trusted Government IT Solutions Provider, supporting Public Sector organizations across Federal, State and Local Government agencies and Education and Healthcare markets.

Glasstrail

Glasstrail

Glasstrail are single-minded about helping organisations gather intelligence and manage vulnerabilities in their attack surface before adversaries exploit them.

Levio

Levio

Levio is a digital native business and technology consulting firm. As a true partner from start to finish, our goal is a long-lasting transformation that’s right for your business model.

Benchmark Executive Search

Benchmark Executive Search

Benchmark specializes in finding elite talent for startup, emerging-growth and mid-cap companies offering game-changing technologies or innovative services to the federal and commercial markets.

Secomea

Secomea

Secomea redefines manufacturing plant security by combining internationally recognized industry best practices as critical components of our robust cybersecurity strategy.