an IT & System Administrator. Strong knowledge of cloud-based platforms such as AWS, Azure, GCP, and Digital Ocean. Solid understanding and experience of implementing cybersecurity principles and best practices. Experience in cloud infrastructure design, deployment, and maintenance. Strong understanding of Network Infrastructure (DNS, TCP/IP, SMTP, VPN). Experience more »
Solid understanding of best practice standards including ISO27001. Strong technical experience with Windows technologies, AD, DNS, Group Policy etc as well as IT and CyberSecurity measures. Experience of working within a cloud environment, Azure preferred. more »
and supervise contractors during on-site works ensuring work is completed in compliance with HSE regulations and Port requirements. Support compliance with GDPR and cybersecurity principles and work to achieve cyber compliance with the NIS directive. Undertake training and development to maintain specialism in systems and act as a more »
identify IT trends and propose technology enhancements. ERP System support and maintenance. WAN infrastructure: implementation & support 5 office locations or more. Skills: Proficiency in cybersecurity practices. Strong IT and customer service skills. Exceptional problem-solving abilities. Capability to work independently and meet deadlines. Proficiency in MS 365 Office applications including more »
Rochester, Medway, Kent, United Kingdom Hybrid / WFH Options
Constant Recruitment Ltd
encourage our engineers to complete professional training and certification. In addition to Helpdesk duties, there is the potential to be involved in IT projects, cybersecurity services and software development, which form part of our larger portfolio of services. We believe in a healthy work/life balance, and whilst this more »
and supervise contractors during on-site works ensuring work is completed in compliance with HSE regulations and company requirements. * Support compliance with GDPR and cybersecurity principles and work to achieve cyber compliance with the NIS directive. * Undertake training and development to maintain specialism in systems and act as a more »
and amend process documentation for all IT processes. Role & Responsibilities: Support configuration of new desktop computers and laptops for all staff Assist with the CyberSecurity program (Training, MFA) Identify Support process gaps and suggest/implement changes Develop solutions to issues within existing system toolset Plan and working flexibly more »
to see...... Your CV Find your place at the Cyberfort Group - Our vision is to bring together technology, people, expertise, facilities and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of more »
Cloud platforms, dealing with high level escalations and supporting users across to business in a timely and efficient manner. Knowledge of security principles, including cybersecurity, GDPR and other industry standards. Knowledge of networking, both hardware and software across monitoring and troubleshooting. Ability to work with other people across the more »
and virtual IT Systems, Networks and Infrastructure. Below are some of the technologies and areas you'll be working with: - Aruba - Fortinet - Hyper-V - CyberSecurity - Bespoke Maritime Systems This is a fantastic opportunity to join a long-standing business that offers an excellent benefits package! If this sounds interesting more »
CyberSecurity Analyst We are looking for an experience CyberSecurity Analyst with experience of Azure cloud security, ideally passing either AZ-500 or MS-500 exams. The team support the organisation assuring the effectiveness of their security controls, governance and assurance activities as well as providing input and support more »
/3rd Line Support Location: Maidstone Salary: Up to £36k, Depending on Experience Does Proactive Maintenance interest you? Would you like to progress your CyberSecurity Skills? Would you like a role that will progress to managing your own small team? We are looking for a Proactive Maintenance Lead. As … software (Veeam preferred). An enthusiastic approach towards automating tasks and self-study on the latest technologies. A keen interest in all areas of CyberSecurity, with a desire to develop expertise. Willingness to liaise with third parties, including attending conferences around the country, albeit infrequently. This role offers an more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of CyberSecurity Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of CyberSecurity" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a CyberSecurity Trainee, your day to … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cybersecurity including network security, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of CyberSecurity Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of CyberSecurity" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a CyberSecurity Trainee, your day to … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cybersecurity including network security, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of CyberSecurity Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of CyberSecurity" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a CyberSecurity Trainee, your day to … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cybersecurity including network security, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the more »
WILL PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of CyberSecurity Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of CyberSecurity" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a CyberSecurity Trainee, your day to … experienced professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cybersecurity including network security, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the more »
devices IT Network infrastructure: Installation, support and maintenance of Servers, Routers, Firewalls, Switches, Wi-Fi and VOIP telephony systems Implementation and support of Office365 CyberSecurity: Implementation, maintenance and Anti-Virus, Anti-malware, Ransomware and spam filtering for all company owned devices CyberSecurity: Install, maintain and support CCTV & Door more »
Voice Communication systems, complex IT networking including MPLS, firewalls and infrastructure, WAN including microwave, IoT, 4G and 5G, SIP telephony, visualisation platforms (Hyper-V), cybersecurity protection services such as end point protection, data management and monitoring and other IT systems to enable the port to operate safely. Diagnose and … colleagues and supervise contractors during on-site works ensuring work is completed in compliance with HSE regulations and requirements. Support compliance with GDPR and cybersecurity principles and work to achieve cyber compliance with the NIS directive. Undertake training and development to maintain specialism in systems and act as a … or related discipline Minimum 5 years hands on experience in a comparable role or setting. Thorough knowledge, understanding and application of relevant GDPR and cybersecurity principles as a minimum Cyber Essentials. Knowledge, understanding and application of related H&S regulations e.g., PUWER, LOLER, Working at Height, COSHH. Knowledge and more »
Gravesend, Kent, South East, United Kingdom Hybrid / WFH Options
Latcom
a full driving licence and knowledge/understanding of some of the following: Server-infrastructure (Hyper-V/HP) Networking infrastructure (Fortigate, NEC, CISCO) Cybersecurity infrastructure (Dark Trace, Syslog) Telecoms infrastructure Cybersecurity principles as a minimum Cyber Essentials. Role involves: Ensure the continuous functionality of all systems including … Voice Communication systems, complex IT networking including MPLS, firewalls & infrastructure, WAN including microwave, IoT, 4G & 5G, SIP telephony, virtualisation platforms (Hyper-V), cybersecurity protection services such as end point protection, data management & monitoring & other IT systems. Diagnose & resolve faults, including complex technical issues, across the full range of systems more »