Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
looking for an enthusiastic and innovative IT Security Engineer. Security Engineer main responsibilities will include, but are not necessarily limited to, the following: Vulnerability Management o Take lead on the daily vulnerability management activities, including but not limited to application vulnerability and infrastructure vulnerability assessments. o Manage prioritisation … of vulnerabilities through a risk-based approach, to meet patch management policies, regulatory compliance, and audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threat intelligence sources to inform strategic vulnerability … mitigation measures. ThreatManagement o Take lead on the daily threatmanagement activities o Maintain and update incident response playbooks and automation o Monitor security dashboards and reports for alerts and threats o 2nd line support to IT Service Desk for cyber related incidents/events more »
ThreatManagement Vulnerability Specialist - Windows Server, SCCM, VMware, VUM, AWS, Qualys, Nessus This role is responsible for the overall management of security vulnerability and configuration compliance of the global Windows Server and VMware estate. You will be working closely with the IT Security team to develop and … optimize the vulnerability management service. You will have a strong background working with Microsoft server platforms and the VMware technology stack with the main focus being on vulnerability and configuration management. Financial Services Experience Is Essential To Be Considered For This Role Must have: Experience of managing solutions, technologies … a client (or a third party working on behalf of the client) by email or by upload to the Client/third parties vendor management system. By giving us permission to send your CV to a client, this constitutes permission to share the personal data that would be necessary more »
approach to building, deploying, and operating our Cyber capabilities to fortify our defenses, employing innovative and cutting-edge cyber technologies. Our duties span cyber threatmanagement, real-time attack detection and prevention, and swift remediation, integrated with advanced artificial intelligence and machine learning. Additionally, we leverage Cyber DevOps … automations to facilitate rapid deployment and threat mitigation, ensuring the resilience of our Operational Technology (OT), IT, and digital infrastructure in the face of emerging challenges. We are responsible for defining and setting the Cyber framework and Security compliance policies across the company, including the development of robust Business … continuity plans, disaster recovery, and critical management plans to ensure the resilience of our operations in the face of cyber threats and other emergencies. Key Competencies Technical Significant experience in Cyber Security engineering and delivery with a broad understanding of OT and IT services Subject matter expertise in Cyber more »
continuous monitoring of the Firm’s information security systems, technologies, processes, and procedures, analysing the findings and communicating exceptions, concerns and remedial steps to Management as necessary. Promptly reporting any and all exceptions to policies, procedures, and operational standards to the Director, Information Security and/Chief Information Officer … as necessary. Executing the Firm’s information security threatmanagement process, ensuring all aspects of an event are documented and remediated; Monitoring and analysing security relevant logs, events, and alerts including, but not limited to, logs from systems, applications, SIEM, AV, Firewalls, and IPS; document relevant incidents and … and act strategically as well as tactically, utilizing developing interpersonal and written and verbal communication skills to effectively support the Firm’s global risk management functions. Sound analytical and operational judgment, the use of tact in daily and stressful situations, and sound analytical rigor applied to supporting and remediating more »
to head up their 7 man dedicated unix estate. This is a seriously interesting role to have a fine blend of both technical and management split, spearheading a team of genuine SME's. This is a great opportunity for someone who has previous experience leading a team or been … organisation. You will also be able to get your hands on industry leading tools such as RedHat Servers and help pioneer a new dedicated threatmanagement pillar in the financial space. Responsibilities Leading a team of 7, you will be in charge of the day to day management of the team and patch vulnerabilities in both the Linux and Windows Servers. Communicate with senior stakeholder management, Identifying where and why vulnerbailtiies are occurring. Creation of new and current IT processes and procedures to improve the service operation and transition lifecycle phases. Requirements Experience with vulnerability managementmore »
Key Responsibilities: Monitoring information security systems, technologies, processes, and procedures, analysing the findings and communicating exceptions, concerns and remedial steps as necessary. Executing security threatmanagement process, ensuring all aspects of an event are documented and remediated. Monitoring and analysing security relevant logs, events, and alerts including, but … analytics. Knowledge around compliance would be useful. Ability to think and act strategically as well as tactically to support the organisation’s global risk management functions. Good interpersonal, communication, organisation, collaboration, and team-building skills. Basic knowledge of designing and deploying information technology and solutions in one or more more »
Security Consultant - Identity & Access Management Services SOC consulting experience with OT experience With ThreatManagement/hunting/intel/security operations more »