The Contract PCI Specialist will be responsible for conducting comprehensive assessments of the payment card security practices, preparing documentation, and guiding the organisation through the PCI compliance process. The ideal candidate will have extensive experience in preparing for PCI audits and a deep understanding of PCI DSS requirements. Key … Responsibilities: PCI Compliance Assessment: Conduct detailed assessments of current payment card security measures to ensure compliance with PCI DSS requirements. Audit Preparation: Prepare the organisation for PCI audits by developing and implementing strategies, documentation, and processes that meet PCI DSS standards. Gap Analysis: Perform gap analyses to identify areas … Awareness: Provide training and guidance to internal teams on PCI DSS requirements and best practices. Stakeholder Collaboration: Work closely with internal stakeholders, including IT, security, compliance, and management teams, to ensure alignment on compliance objectives. Remediation Planning: Develop and oversee the implementation of remediation plans to address identified compliance more »
project/product cybersecurity elements across cross-portfolio programs and services. Tasks require working with a broad spectrum of the Technology team including IT Security and engineering technical resources to identify, plan and deliver cybersecurity initiatives. Role responsibilities: * Onboarding accounts onto PAM solution and ensure accounts remain under control. … audit points raised against CyberArk operations. Essential skills: * Minimum 3+ years of CyberArk experience and good knowledge on other PAM tools. * CyberArk certification or Security related certification. * Experience of InformationSecurity, and a solid IT background. * Experience using SQL/PSQ and Oracle (Essential) * Experience using Web … degree of difficulty (desirable) * Experience in technology projects such as implementation of Cyber infrastructure replacement etc. (desirable) * Demonstrable proficiency in a wide range of information IT security technologies and Embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, Incident more »
Cyber Security Engineer 6 Months Inside IR35 2/3 Days Per Week On-Site (Corsham, Portsmouth or Northallerton) DV Clearance We are looking for a DV Cleared Cyber Security Engineer to join a security team within the Military/Public Sector field who are responsible for … designing, delivering and maintaining cybersecurity capabilities. Job Role: - Responding to security incidents as part of an incident response team - Develop security event monitoring and incident management services - Standardisation of Security Operating Procedures - Provide SME on a broad range of informationsecurity standards and best practices … Job Requirements: - Skilled in maintaining Microsoft directory services - Knowledge of Key Security frameworks - Virtualisation Software - Experience of writing Defence/Government documentation If you are interested please apply here or reach out to me directly on more »
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Hays
Cyber Security Officer - Maternity Cover Fixed Term Contract 10 months: £34,000 - £35,500 Location: Hybrid - Southampton, Hampshire Your new company A local government organisation, based in the South of the UK, are currently looking for a Cyber Security Officer to come and assist the Cyber Security … part in saving lives, and they truly make a real difference to the local area. Your new role You will be supporting the Cyber Security Manager with their day-to-day duties. A big part of the role will be the GRC elements, mainly ISO27001. The role is covering … for another member of the team, who are currently on maternity leave. Provide interpretation of the InformationSecurity Standards and Cybersecurity best practices to support complex decisions across the organisation. Support the Cybersecurity Manager in the implementation and maintenance of the cybersecurity incident response procedures and processes. Implementation more »
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
Duration: 6 months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »