JOBS > Careers


« Back to News

2021-08-04

2021 Global Cyber Security Event

(ISC)² the world’s largest association of certified cybersecurity professionals releases the agenda for its annual Security Congress in October.

2021-07-15

Cyber Security Careers for Women

When news of state-sponsored attacks or massive data breaches are a daily event, it seems crazy that for many, cyber security is a closed door.

2021-06-28

Diversity In Cyber Security

Improving diversity should help cyber security teams deploy a wider range of thought and use stronger concepts to defend against attacks.

2021-06-11

Equality Goes Missing In The Digital Industry

Women are less likely than men to have specialist digital skills or work in digital technology and are poorly represented in senior leadership jobs.

2021-05-19

Most Cyber Security Teams Are Understaffed

Survey: While the cyber security workforce has been largely unscathed by the Coronavirus pandemic, the long term skills shortage persists.

2021-05-14

Careers In Cloud Security

Professionals see cloud security as the most important technical skill that those entering a cyber security career should possess.

2021-04-21

More Women Cyber Security Professionals Needed

There are less than 20% female employees working in the UK technology sector, compared to 49% of females across the economy as a whole.

2021-03-11

On International Women’s Day Only 10% Of Top Executives Were Female

Cyber security firms do not appoint women to senior executive jobs. Just 10% of board positions and 16% in management are held by women.

2021-02-12

Hiring Good Cyber Security Professionals Is Hard Work

Concerns over inadequately qualified cyber security job applicants persist, even as demand to fill increasingly well-paid jobs remains strong.

2021-01-18

Five Reasons Why Women Should Consider A Career In Cyber Security

As most cybersecurity jobs remain unfilled, women have great potential in the industry and it might be the perfect career choice. By Shaheryar Sadiq

2020-11-23

The Skills Shortage Presents A Looming Cyber Security Threat

Help Wanted: The global IT security skills shortage now exceeds 4 million and the workforce needs to increase by 145% to fill the expected demand.

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

Practice Labs

Practice Labs

Practice Labs is an IT competency hub, where live-lab environments give access to real equipment for hands-on practice of essential cybersecurity skills.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

NordLayer

NordLayer

NordLayer is an adaptive network access security solution for modern businesses — from the world’s most trusted cybersecurity brand, Nord Security. 

CamCERT

CamCERT

CamCERT is the national Computer Emergency Response Team for Cambodia.

GuidePoint Security

GuidePoint Security

GuidePoint Security provide information security solutions that enable commercial and federal organizations to more successfully achieve their security and business goals.

Cyberhaven

Cyberhaven

Cyberhaven provides rapid enablement for GDPR and CCPA compliance, streamlined data security and modern risk management.

ChainSecurity

ChainSecurity

ChainSecurity provides products and services for securing smart contracts and blockchain protocols and conducts R&D in the areas of security, program analysis, and machine learning.

BotRx

BotRx

BotRx is the only AI-enabled, automated fraud protection technology that allows fast & easy deployment - continually keeping invisible bad bots and agents at bay, so you can rest easy.

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo

Cloud & Cyber Security Expo is the UK’s largest cloud and cyber security event.

Action1

Action1

Action1 is a Cloud-based lightweight endpoint security platform that discovers all of your endpoints in seconds and allows you to retrieve live security information from the entire network.

Earlybird Venture Capital

Earlybird Venture Capital

Earlybird is a venture capital investor focused on European technology innovators.

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) - Singapore

Security & Intelligence Division (SID) protects Singapore from external threats and safeguards its interests in areas related to terrorism, cyber security, other transnational threats, and geopolitics

Jisc

Jisc

Jisc is a membership organisation working in partnership with the UK’s research and education communities to develop the digital technologies they need to teach, discover and thrive.

OptimEyes.ai

OptimEyes.ai

OptimEyes.ai is a unique AI-powered, on-demand SaaS solution for cyber-security, data privacy and compliance risk modeling.

Nuts Technologies

Nuts Technologies

Nuts Technologies are simplifying data privacy and encryption with our innovative and novel data containers we call nuts based on our Zero Trust Data framework.

Virtual Infosec Africa (VIA)

Virtual Infosec Africa (VIA)

Virtual InfoSec Africa (VIA) is a wholly-owned Ghanaian company specializing in information security and cybersecurity solutions and services.

SecurityBridge

SecurityBridge

SecurityBridge provide a cybersecurity connection between our customers’ IT departments, the forward-facing business services, and their SAP applications.

ZAG Technical Services

ZAG Technical Services

ZAG Technical Services is an award-winning information technology consulting firm delivering digital transformation solutions, IT assessments, managed services, security, and support.

OmniIndex

OmniIndex

OmniIndex PostgresBC is the only commercial solution allowing you to keep your most sensitive and critical data encrypted while analyzing it. Structured and unstructured.