JOBS > Careers


« Back to News

2021-02-12

Hiring Good Cyber Security Professionals Is Hard Work

Concerns over inadequately qualified cyber security job applicants persist, even as demand to fill increasingly well-paid jobs remains strong.

2021-01-18

Five Reasons Why Women Should Consider A Career In Cyber Security

As most cybersecurity jobs remain unfilled, women have great potential in the industry and it might be the perfect career choice. By Shaheryar Sadiq

2020-11-23

The Skills Shortage Presents A Looming Cyber Security Threat

Help Wanted: The global IT security skills shortage now exceeds 4 million and the workforce needs to increase by 145% to fill the expected demand.

2020-10-29

Amazon Sacks Employee Over Data Violation

Employees of Amazon’s Smart Doorbell product department used their account permissions to access video surveillance data of some customers.

2020-10-28

Cyber Professionals Fear Being Replaced By AI

Survey: Young cyber security professionals are happy in their jobs, but much more concerned about the impact of AI than their older colleagues.

2020-10-14

New Skills For A Career In Cyber Security

As the number job vacancies grows, many technology-literate people are starting to think about a well paid new career in cyber security.

2020-10-06

Sentiment About Cyber Security Professionals Improves

Upwardly Mobile: Cyber Security professionals are no longer being viewed as roadblocks to business efficiency.

2020-09-10

Getting A Cyber Security Job

There is a huge skills gap in the cyber security job market. People going into cyber security will have interesting and well paid careers.

2020-08-04

The Cyber Security Threat From Employees

Human errors are the leading cause of data and security breaches as they are not predicable, whereas computers & technology are predictable.

2020-07-30

Women In Cyber Security Are Paid Much Less Than Men

There is still a shortage of women in the global cyber security workforce - not least because they are paid 21% less than men doing the same job.

2020-07-01

LinkedIn ‘Job Offers’ Targeted Aerospace & Military Personnel

A malware campaign used LinkedIn spear-phishing messages posing as recruiters to steal data from the military and aerospace executives.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

DigitalStakeout

DigitalStakeout

DigitalStakeout enables cyber security professionals to reduce cyber risk to their organization with proactive security solutions, providing immediate improvement in security posture and ROI.

RSA Insurance Group

RSA Insurance Group

RSA is one of the world’s leading multinational quoted insurance groups. Commercial services include cyber risk insurance.

KLC Consulting

KLC Consulting

KLC Consulting offers information assurance / Security, IT Audit, and Information Technology products and services to government and Fortune 1000 companies.

State e-Government Agency (SEGA) - Bulgaria

State e-Government Agency (SEGA) - Bulgaria

The State e-Government Agency (SEGA) is responsible for matters relating to electronic governance in Bulgaria.

ReFoMa

ReFoMa

ReFoMa is a consultancy and advisory company with a focus on information Security.

Data Eliminate

Data Eliminate

Data Eliminate provide data destruction, secure end-of-life IT asset disposal, and data protection consultancy services.

Secure IT Disposals

Secure IT Disposals

Secure IT Disposals specialise in professional Computer Recycling, Computer Disposals, Computer Destruction, Data Erasure and end-of-lifecycle solutions.

Datplan

Datplan

Datplan offers a software solution that gives an overview of 8 key cyber risk areas, their threats, and risk management steps.

Fudo Security

Fudo Security

Fudo Security is a leading provider of privileged access management and privileged session monitoring solutions.

High Security Center (HSC)

High Security Center (HSC)

High Security Center provide real-time threat protection. We protect your company from targeted and persistent attacks using technologies such as Machine Learning and Behavioral Analysis.

Akito

Akito

Akito was set up to become a point of reference in the ICT market for issues related to Security and in particular Cyber Security.

Hush

Hush

Hush is a premium privacy service that gives people unprecedented visibility and control of their digital footprint. Hush assesses threats, and goes to work to eliminate digital risks on your behalf.

Lodestone

Lodestone

Lodestone partners with clients to help them mitigate business and reputational risk, through our human-based, approach to cyber security, digital forensics and incident response.

Cyber & Data Protection

Cyber & Data Protection

Cyber & Data Protection Limited supports Charities, Educational Trusts and Private Schools, Hospitality and Legal organisations by keeping their data secure and usable.

StealthMole

StealthMole

StealthMole is a deep and dark web threat intelligence company that delivers a cloud-based, unified platform for digital investigation, risk assessment, and threat monitoring.

Amiosec

Amiosec

Amiosec is a British cyber innovation business specialising in delivering simple-to-use solutions to the complex problems of the modern world.

RELIANOID

RELIANOID

RELIANOID is an application delivery controller and load balancing system that ensures high performance and security of IT services on a massive scale.