South West London, London, United Kingdom Hybrid / WFH Options
NATIONAL AUDIT OFFICE
They must have experience of using PRINCE2 or Agile methodologies whilst working with mixed teams to achieve common goals. The post includes responsibility for: CyberSecurity Capability Delivery Setting up and running concurrent projects within the NAOs governance processes, ensuring that major milestones and activities to achieve them are captured more »
to see...... Your CV Find your place at the Cyberfort Group - Our vision is to bring together technology, people, expertise, facilities and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of more »
National Physical Laboratory, Hampton Road, Teddington, England
NPL MANAGEMENT LIMITED
systems Support and administration of financial/business applications Assisting with the delivery of projects Microsoft Office 365 and Cloud services Unified Communication technologies Cybersecurity and awareness programmes Service management and reporting Training Apprentices will be required to attend college at least x 1 day per week at Richmond Campus more »
update firewall rules, access control lists (ACLs), and security policies to maintain an effective security posture. Knowledge Sharing and Training: Stay informed about emerging cybersecurity threats, vulnerabilities, and industry trends. Share knowledge and expertise with team members through training sessions, workshops, and technical presentations. Requirements: Certified Cisco Network Professional (CCNP more »
with Active Directory, Desktop & Server solutions across the Microsoft stack Experience of network, printer, AV, UPS and Security hardware Experience of working within a Cybersecurity framework Overall appreciation of client system security, requirements and proven experience with relevant software and hardware solutions A good understanding of ISP solutions and connectivity more »
must be willing and able to travel to participate in meetings, workshops and other related activities. Qualifications A bachelor's degree in computer science, Cybersecurity, or a related field Desired Qualification Recognised architecture qualification desirable Skills & Experience Experience in Infrastructure as Code (IaC) automations in CI/CD and AWS more »
Candidate Knowledge, Experience and Skills Strong solutions architecture skills and experience Knowledge and experience with hybrid cloud and on-prem environments Exposure to the cybersecurity aspects of solution architectures Well versed with cloud architecture frameworks and design patterns Knowledge of data architecture and exposure to the pros and cons more »
West London, London, United Kingdom Hybrid / WFH Options
Corriculo Ltd
Any experience with PostgreSQL or MongoDB would be advantageous An understanding or experience within Microservice Architecture or within a microservices environment Strong background in cybersecurity Experience of working with healthcare data standards like DICOM and HL7, together with a familiarity with data governance principles and regulations in the medical domain. more »
West London, London, United Kingdom Hybrid / WFH Options
Babel Public Relations Limited
podcasts, bespoke media analysis and media training. We work with UK, US and global technology companies involved in exciting technology transformations, from green tech, cybersecurity and mobile and telecoms, to marketing, advertising, retail, fintech, broadcast, e-commerce and enterprise technologies. We are renowned for our training programme. Babel is recognised more »
We are currently seeking a CyberSecurity Engineer to join our client, a leading technology company. As a CyberSecurity Engineer focusing on Security Operations, you will play a vital role in protecting our client's systems and data from cyber threats. This is a permanent position within the Technology … sector, offering excellent career development opportunities. About the Role As a CyberSecurity Engineer your primary responsibility will be Security Operations and Incident Response as well as Vulnerability Management and Threat Intelligence. In addition, you will work closely with the CyberSecurity Manager and Security Architect to independently resolve complex … response playbooks and standard operating procedures to streamline incident response processes. Work independently to resolve complex security issues, with support and guidance from the CyberSecurity Manager and Security Architect. Provide knowledge transfer to Service Delivery teams and mentor other members of the cybersecurity team. Develop an in-depth understanding more »
DNS protocols. • FortiGate firewall and various firewall background and hybrid cloud integration is a requirement. • Experience with Proxy and SSL is essential. • Understanding of cybersecurity technologies, protocols, and applications. Versatility with using various operating systems including Windows, Mac, and GNU/Linux. Technical Skills: • Expert knowledge in security control design … elicitation, modeling, verification, and methodology development; business process design for security compliance and assurance. • Specific technical expertise and background in infrastructure and network security, cybersecurity capabilities and SIEM/analytics. • In-depth subject matter expertise of application and data security, with thorough understanding of infrastructure and network security. • Very more »
consulting for the IT and business teams Assist with data collection and analysis in relates to active investigations and HR/Legal requests Support CyberSecurity training and awareness campaigns and programs. Assist with vendor, security and data privacy assessment. REQUIRED SKILLS & JOB QUALIFICATIONS Minimum 5 years of relevant IT … CyberSecurity experience. Expertise in EU data protection and data privacy rules and regulations such as GDPR. Strong verbal and written communication skills, with the ability to adapt information delivery based on the target audience. Ability to interpret, understand, and communicate real business risks in relation to technology risks. Working more »
we're looking for To hit the ground running in this role youll need a demonstrable track record of new business success within the cybersecurity market, with a minimum of 2 years sales, account management or client engagement role. Proven experience in selling both managed services and consulting. Client … to see...... Your CV Find your place at the Cyberfort Group - Our vision is to bring together technology, people, expertise, facilities, and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of more »
services provider and engineering consultancy of approx. 65 staff, with core services encompassing multi-disciplinary design engineering, multi-vendor systems delivery, operational technology (OT) cybersecurity, and COMAH and technical safety compliance. Founded in 1958, Belcan has become a global technological leader and established go to Engineering Services provider, working … within many industries including Aerospace, Defence, Marine, Nuclear, Automotive and CyberSecurity with over 10,000 professionals serving hundreds of customers in over 60 locations worldwide. BAS is part of the Belcan Group. This vacancy is being advertised by Belcan. more »
area consisting of 50 users predominantly Mac based. They predominantly use Google Workspace and Drop Box, a very important element to this role is CyberSecurity Compliance and AV for conferencing As the dedicated IT Manager, you will manage and maintain the company's IT equipment and 98% Macs and … and Intune. You should have experience in managing small scale projects such as data migrations, and the ideal candidate will be the champion of CyberSecurity requirements and compliance, such as PCI, GDPR and ISO compliance. Key Skills/Experience Previous experience in an IT Manager, or Senior Service Desk … position. Proven experience managing, maintaining and giving all round support owning everything that has plug on it CyberSecuritymore »