JOBS > Careers


« Back to News

2025-05-05

Entering the Cybersecurity Workforce: Where to Begin?

There are many options for online learning to develop foundational knowledge & gain hands-on experience. CYRIN offers assistance & support.

2025-04-11

Neurodiversity - The Untapped Talent Pool Solving Cybersecurity's Skills Gap 

Neurodiverse Talent: Embracing neurodiversity represents both an ethical imperative and a strategic opportunity. By Glen Williams

2025-03-02

From Accidental Hacker To Cybersecurity Champion

Celebrating International Women's Day: Consider the inspiring story of Dr. Katie Paxton-Fear, a highly respected Bug Bounty Hunter.

2024-12-17

Diversity Is Key To Combating Gen-AI Hackers

Hiring practices should prioritise candidates with diverse skills & non-traditional backgrounds, broadening the talent pool. By Andrea Cullen

2024-12-04

Empowering Women To Take On More Roles In Cybersecurity

Bridging The Gap in Cybersecurity Roles: Diversity is crucial in cybersecurity & improves the overall defense of organizations. By Nazy Fouladirad

2024-11-08

Cyber Security: The Fastest Growing IT Work In The UK

Cyber security is the fastest growing tech occupation in the UK, with the number of people in cyber roles more than doubling between 2021 & 2024. 

2024-10-07

Cyber Workforce Growth Slows As Tight Budgets Restrict Hiring

The cyber workforce gap has grown to a record high of 4.8 million, with a total of 10.2 million security professionals now required to keep organizations protected globally.

2024-06-25

Cyber Security Staff Burnout Costs Firms $600m A Year

Work-related stress, fatigue, illness and burnout are making cybersecurity professionals less productive, costing $millions.

2024-05-22

IT Professionals Can Earn 35% More By Switching To AI

Career Opportunities: As businesses rush to make big investments in AI, demand for technology professionals with the right skills has tripled.

2024-04-24

Four Ways To Overcome Cyber Security Career Challenges

Skills Shortage: It often takes a serious security breach or cyber attack for organizations to prioritize investment in cybersecurity skills.

2024-04-03

The Changing Role Of The CISO 

Strategic Shift: CISOs are increasingly business aware, indicating a significant evolution from traditional roles to strategic business enablers.

CyberSecurity Jobsite
Check Point

Directory of Suppliers

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

LockLizard

LockLizard

Locklizard provides PDF DRM software that protects PDF documents from unauthorized access and misuse. Share and sell documents securely - prevent document leakage, sharing and piracy.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

ZenGRC

ZenGRC

ZenGRC (formerly Reciprocity) is a leader in the GRC SaaS landscape, offering robust and intuitive products designed to make compliance straightforward and efficient.

Clayden Law

Clayden Law

Clayden Law advise global businesses that buy and sell technology products and services. We are experts in information technology, data privacy and cybersecurity law.

Brit

Brit

Brit PLC is a market-leading global specialty insurer and reinsurer, focused on underwriting complex risks including cyber, privacy and technology.

Virgil Security

Virgil Security

Virgil Security provides easy-to-deploy and easy-to-use cryptographic software and services for use by developers and end-users.

Payatu

Payatu

Payatu Technologies is a security testing and services company specialized in Software, Application and Infrastructure security assessments and deep technical security training.

Dermalog Identification Systems

Dermalog Identification Systems

Dermalog Identification Systems is a pioneer in biometry and the largest German manufacturer of biometric devices and systems.

Ecubel

Ecubel

Ecubel is the market leader in Belgium in buying and selling used IT harware guaranteed by a certified data erasure.

Swisscom Blockchain

Swisscom Blockchain

Swisscom Blockchain is focused on supporting the implementation and adaption of Blockchain-based platforms in enterprises across diverse industries.

Berkeley Varitronic Systems (BVS)

Berkeley Varitronic Systems (BVS)

Berkeley Varitronics Systems is an engineering think tank delivering custom wireless RF engineering products and solutions including cyber security.

DeFY Security

DeFY Security

DeFY Security is a Cyber Security solutions provider with more than 20 years of experience securing financial institutions, healthcare, manufacturing and retail.

Island

Island

Island puts the enterprise in complete control of the browser, delivering a level of governance, visibility, and productivity that simply weren’t possible before.

Pathway Communications

Pathway Communications

Established in 1995, Pathway Communications – is part of the Pathway Group of Companies, a Canadian IT Managed Services organization.

Hexens

Hexens

Hexens introduces a whole new approach to cybersecurity solutions. Indisputable skills and a unique super-focused perspective on every single case are the values we create.

PointWire

PointWire

PointWire offers a range of cybersecurity solutions and services including Penetration Testing on various levels, as well as Intrusion Detection and Prevention Systems.

Sekur Private Data

Sekur Private Data

Sekur Private Data Ltd. is a Cybersecurity and Internet privacy provider of Swiss hosted solutions for secure communications and secure data management.

Aim Security

Aim Security

Aim empowers enterprises to unlock the full potential of GenAI technology without compromising security. GenAI makes business better - Aim makes GenAI secure.

KTrust

KTrust

KTrust provides Continuous Threat Exposure Management for Kubernetes environments.

ShieldHaus

ShieldHaus

Protect your business from evolving cyber threats with ShieldHaus. Our real-time, AI-powered security solutions block malicious IPs, phishing attempts, and harmful domains to safeguard your systems an