Cyber Claroty Engineer 6 months Remote £550-600 - Umbrella only Would you like to join a global leader in consulting, technology services and digital transformation? Our client is at the forefront of innovation to address the entire breadth of opportunities in the evolving world of cloud, digital and platforms. … Role purpose/summary Maintain Claroty Create/Maintain Claroty Playbooks and SOPs Maintain tuned status Monitor EMC security alerts across all regions. Follow playbook procedure in response to security alerts generated within the CTD Lead Claroty status reports Back-Up Configuration Raising and following up on Securitymore »
a highly skilled and experienced Senior AlgoSec Consultant. In this vital role, you will lead the design, implementation, and management of a comprehensive network security infrastructure using AlgoSec technologies. You will oversee architecture reviews, updates, and migration activities. Key Responsibilities: Design, Implement and automate AlgoSec solutions (AFW, FireFlow, BusinessFlow … AppChange) to enhance security infrastructure. Ensure the AlgoSec platform's optimal performance and security configuration, troubleshooting complex network … issues as they arise. Conduct comprehensive security assessments and produce detailed reports to continuously refine security measures. Work closely with IT and cybersecurity teams to develop and implement security policies. Must Haves: AlgoSec Certifications Extensive experience in managing and configuring AlgoSec Security Management Suite Proficiency in more »
Our client is seeking a dedicated and knowledgeable Security identity access Manager to join their dynamic team. This role sits within the CyberSecurity product group, focusing on Identity & Access platforms for Privileged Access Management and Identity Governance and Administration. The successful candidate will have the opportunity … to deliver enterprise security services to the organisation, acting as a subject matter expert in identity and access technologies. This role offers an exciting opportunity to drive forward the Digital Identity function within CyberSecurity, creating a community of inter-departmental identity and access teams. Opportunity to … be a subject matter expert in identity and access technologies Drive forward the Digital Identity function within CyberSecurity Create a community of inter-departmental identity and access teams What you'll do: As a Security identity acess Manager, you will play a pivotal role in shaping more »
Security Architect - IAM/… PAM Location: Hybrid (2 days in the office) - Swindon and London Contract Type: Initial 6-month Rate: Inside IR35 We are seeking a strong Cybersecurity Architect with a robust understanding of Identity and Access Management (IAM) and Privileged Access Management (PAM), experienced in threat modeling, and implementing/enforcing security … architecture and vulnerabilities associated with migrating legacy systems to SAP. Key Responsibilities: Produce detailed threat models after reviewing technical design documents. Review and input security into solution architecture and high-level designs. Advise and consult with development teams on security matters. Ensure compliance with internal standards and use more »
Synechron is looking for an experienced Security Consultant to deliver the CyberSecurity certification of a new core banking platform, for a long term contract. The role entails working with multiple teams across a global organisations, ensuring the platform meets relevant security standards. Role: Responsible for … building an engagement plan and ensuring that the platform passes various CyberSecurity control functions Manage the third-party penetration testing and ensure that all security activities are managed for the modern core platform Ensure all required security control documentation is produced and validated before submission … to the relevant approval boards Track any deviations and ensure they are agreed with CyberSecurity and the risk accepted by the relevant systems owners Job requirements: 7+ years in a technical delivery experience within Financial Services or Large Enterprise on Security Programmes Experience/exposure to more »
Business Analyst - Information Security - PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged Identity Management, Network Access Control, Secure access service edge Our leading law firm client are currently looking to take onboard a new Business Analyst - Information Security (PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged … client are an extremely laid back and very anti-micromanaged law firm with a fantastic and relaxed collaborative environment, this new Business Analyst - Information Security (PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged Identity Management, Network Access Control, Secure access service edge) role will join the global PMO … for 12 months to support projects within the CyberSecurity/Information Security global space. To be considered for this Business Analyst - Information Security(PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged Identity Management, Network Access Control, Secure access service edge) role, it's ideal more »
scanning. Maintain accurate documentation of testing activities, findings, and remediation efforts for audit and compliance purposes. Assist as required to ensure that we maintain cybersecurity certifications by supporting the certification process, complying with certification requirements, and participating in audits and assessments. To assist in the implementation of more »
are using modern cloud technology to build the Barts Health 'Secure Data Environment' (SDE) containing Barts Health patient data that complies with all necessary security and governance requirements. The SDE will need to be adaptable and usable for a range of different users supporting a range of analysis activities. … of contractors. You will be continually evaluating the suitability and integrating open-source software and services into the SDE as required while ensuring the security of patient data. About us Barts Health is one of the largest NHS trusts in the country, and one of Britain's leading healthcare … when the proposed solution may require negotiation and persuasion for the user to accept the outcome. Experience in establishing networking environments and monitoring cloud security in networks which contain sensitive patient data that must remain secured. Experience of managing direct reports, staff working under contract, and working collaboratively with more »
Kingston upon Thames, London, United Kingdom Hybrid / WFH Options
AKTON Resourcing Ltd
procedures. Lead the design, procurement, installation, and maintenance of IT infrastructure components, monitoring their performance. Proactively monitor and maintain Cloud and Platform infrastructure, ensuring security and reliability. Assure the security of IT systems, ensuring compliance with relevant standards (PSN, PCI, Cyber Essentials). Contribute to Business Continuity … Act as the owner of the production environment, ensuring quality through Release and Change Management processes. Manage operational procedures for Recoverability, Availability, Capacity, and Security Management. Requirements: Demonstrable experience managing complex IT and cloud environments. In-depth understanding of desktop and application virtualisation technologies (XenDesktop, XenApp, AppV, PVS, UPM more »
dedicated to educating and entertaining kids during school holidays. Our courses cover everything from the basics of computer programming to robotics, advanced programming, and cybersecurity, designed to prepare children for the digital world. Were looking for tech-savvy undergraduates with a passion for teaching. You should have more »
Employment Type: Contract
Rate: From £12.89 to £15.02 per hour + £100 engagement bonus
My London based Insurance client are looking for an Infrastructure Security to join their team on an initial 12-month contract. The Infrastructure Security engineer will have responsibility for guiding, supporting and delivering secure architecture design for the groups global on premise and cloud infrastructure. The infrastructure security engineer will identify areas of cybersecurity improvement and data security to ensure design controls are adopted globally as outlined by their security and configuration document. They will support DLP solutions to protect corporate data across platforms and devices. They will support the integration and … delivery of new security technology. The Infrastructure Security engineer will support the global cybersecurity team to ensure open Continuous Security Improvements are managed effectively in line with the CSI Programme. The role will be based onsite in London 2 days a week and will more »
possible, delivering across set responsibilities and role requirements.The Head of GRC is responsible for building and leading the GRC team, in line with the CyberSecurity Strategy. This role requires a deep understanding of: Information Security Risk Management Risk Management Security Policies Assurance Tools Strong background … communicate effectively, execute with precision and be process driven, with an eye for capturing the process. The successful candidate will have a passion for security and be able to lead a team of experts in this field. Responsibilities include: Build the Department's GRC team and implement an efficient … operating Model Governing the way the Department identifies, mitigates and manages its Information Security Risks, Departmental Cyber Risks and its Compliance Develop and operate the Cyber Culture and Awareness function - enabling GRC to inform about better cyber behaviour Oversee the day-to-day operations of the more »
cloud workloads. Collaborate with other IT teams: - Work closely with other teams in IT, including application developers and devops (e.g. ACS) as well as Cyber or IT Infra engineers to ensure OCI meets Bank's requirements and can support its goals - Act as a single point of contact for … platform (e.g. system integrators, auditors, consultants etc) Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment … single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. more »
consolidate the organisations approach and framework to Third-party risk and implement it across the organisation, taking into consideration Data (working with the DPO), Cyber and Commercial. The successful Third-Party Risk Manager will need to work with organisation to put together the framework proof of concept, and run … Third-Party Risk Frameworks Previous experience of working with organisations to put together fit for purpose Third-Party Risk Frameworks - considering Data, Commercial and Security Experience of conducting third-party risk assessments in line with security policies and industry standards Experience of Performing on-site assessments of vendors … to identify opportunities for improvement Experience of developing Policies focused on security of third-party business processes Experience of considering categorisation and prioritisation of risk associated with third-parties Experience of putting in place key controls for mitigating third-party risk Experience of running framework pilots across organisations Experience more »