Northallerton, North Yorkshire, Yorkshire and the Humber
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
DV clearance required Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incident response team. * Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. * Produce documentation to ensure the repeatability and standardisation of security operating procedures. * Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. * Maintain a baseline of system more »
platforms, including cloud environments (AWS & Azure) and private Linux clusters. Testing and support: Actively participate in platform testing by supporting trial projects and events. Security focus: Implement appropriate security measures to protect valuable data and other assets. You'll be a great fit if you have: Solid infrastructure … ability to translate business problems into effective technical designs. Communication skills: Excellent communication skills to bridge the gap between technical and non-technical stakeholders. Security awareness: A strong understanding of informationsecurity principles and the ability to implement appropriate security controls. Problem-solving prowess: The ability … to investigate and resolve problems within systems, processes, and services. Bonus points for: Experience with Transatlantic Data Science Alliance (TDSA) or Earth Observation Information Partnership (EOIP) projects. Knowledge of setting up time-bound projects and hackathons with a focus on learning and development. Experience developing lessons learned from projects more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
opportunity for you. Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
will become part of the neonatal nursing and nursery nurse team. The role entails supporting the neonatal nursing and nursery nurse team with providing information and support to parents and carers during admission through to discharge. Empowering women in their choice of infant feeding and providing parents/care … feeding strategic plans, service developments and operational issues relating to new national practices and guidance. 8. To ensure that all families receive support and information to allow them to make an informed choice regarding feeding. 9. Be familiar with multi-disciplinary guidelines and policies relating to infant feeding and … local guidelines Clinical and Practice Governance 1. Observe and maintain strict confidentiality with regards to any patient/family/staff/records and information in line with the requirements of the Data Protection Act. 2. Any data that is taken/shared as part of a phone call more »
screen/direct phone calls, take messages and oversee postal matters. Undertake the day-to-day administrative tasks. Manage manual and computerised record/information systems. Analyse and evaluate data/information and produce reports/information/data as required. Undertake word processing and complex IT … Provide personal, administrative and organisational support to executive leaders. Keep records in accordance with the Trusts record retention schedule and data protection law, ensuring informationsecurity and confidentiality at all times. Order, monitor and manage resources as required, ensuring best value following the trusts purchasing processes. Oversee and more »
journey to implement a nationally-leading EPR system that will transform the quality of care for our patients and staff by having instantly accessible information using the latest mobile technology, reducing paper usage and utilising clinical decision support tools. The Application Architect will play a pivotal role in the … appropriate NHS data and usability standards to ensure best fit of the emerging IT architecture and solutions to the Group. Work with the Trusts InformationSecurity Manager to ensure that Trust EPR systems are compliant with best practice and conform to standards expected in the security section … of the IG Toolkit. Provide evidence of effective security controls for the purpose of the annual IG Toolkit Submission to HSCIC. Collaborate with colleagues to ensure effective integration of the Clinical Applications with other systems with the aim of maximising the efficiency of the clinical workflow overall, and longer more »
to date system installation and configuration documentation, as well as related processes and procedures. * Perform periodic audit and determine the operating effectiveness of the informationsecurity controls * Physically moving the devices from build location to users desk and set up OR dispatch area of courier the devices to … Microsoft Team chat for any incoming incidents Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment … single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. more »
Powershell. Microsoft Office Applications and Office 365. Familiar with Microsoft Active Directory user account management. An understanding of NTFS Permissions. Both local and GPO Security Policies. User Hardware Board level support and configuration including desktops and laptops. PC Peripherals such as Printer configuration and support. Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLANs. A working understanding of DHCP and DNS. Awareness of InformationSecurity best practices. Conceptual understanding of AntiVirus, URL Filtering and spam identification. Business Audio and Visual Solutions such as projectors and conference systems. Backup Methodologies and practices. Understanding of more »
Powershell. •Microsoft Office Applications and Office 365. •Familiar with Microsoft Active Directory user account management. •An understanding of NTFS Permissions. •Both local and GPO Security Policies. •User Hardware – Board level support and configuration including desktops and laptops. •PC Peripherals such as Printer configuration and support. •Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLAN’s. •A working understanding of DHCP and DNS. •Awareness of InformationSecurity best practices. •Conceptual understanding of AntiVirus, URL Filtering and spam identification. •Business Audio and Visual Solutions such as projectors and conference systems. •Backup Methodologies and practices. •Understanding more »
resolved within KPI. As part of troubleshooting, you will be required to escalate identified bugs and issues to engineering using JIRA. Manage the monthly security and application patching to 'Front End Devices' through Patch Management tooling and processes for Windows and Unix environments whilst looking at continuous improvements to … the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerability scanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with InformationSecurity through effective communication and reporting. Troubleshoot networking related … V, Repository Servers) Have a minimum of 3 Years' experience in scripting (Linux, Bash, T-SQL, Shell, PowerShell) At least 3 Years' experience of security and patch management (Preferably Ivanti EPM) At least 3 years Infrastructure experience in a Windows/Unix platform. Have sound knowledge of Networking topology more »
Redditch, Worcestershire, West Midlands, United Kingdom Hybrid / WFH Options
First Recruitment Group - IT
level documents and filing systems. Create and maintain the Document Control Management Plan Assist with the creation and maintenance of Framework Management Plan and Information Execution Plans. Ensure the MIDP and TIDP's are fully utilised across the board. Ensure the correct client Specifications, Design Manuals and Catalogues are … iCosnet") for the Contract Team and Supply Chain. Updating the relevant registers and trackers to ensure they are up to date with the required information including drawing numbers and creating the necessary hyperlinks. Support the Contract Team by promoting the correct filing of relevant emails. Support the Contract Team … good practice with the wider Document Control community in our drive for continuous improvement. Knowledge of the requirements of IS09001 (Quality Systems) and IS027001 (InformationSecurity) Undertake regular audits on contract governance, deliverables, and key client deliverables. Highlight upcoming deadlines and outstanding actions for the Contract Team Assist more »
faults and determine the most effective course as a subject matter expert in an expedited manner. o Implementing server hardening standards as advised by InformationSecurity team. o Maintain register of IT assets. o In addition to the duties and responsibilities listed, the job holder is required to more »
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Maclean Moore Consulting
systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Identity and Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity. Knowledge of SAML/OAUTH protocols Experience of working and influencing cross-functionally and managing external agencies Good more »
and maintenance of our development and production environments within Azure cloud infrastructure. You will collaborate with our Cloud Centre of Excellence, Enterprise Architecture, Compliance, InformationSecurity, Customer IT and various Product teams to drive quality and repeatability into our work. Your role will include: Monitoring infrastructure and environments … cross-platform issues Documenting your knowledge of environments and systems Seeking opportunities to apply automation to tasks performed manually Keeping up-to-date with security best-practice Experience required: We are seeking candidates with a minimum of 5 years' experience with Azure cloud infrastructure, a demonstrable experience in modern … Integrations Infrastructure as Code, including PowerShell scripting, Azure CLI Azure DevOps, including Repos, Pipelines Please click here to find out more about our Key Information Documents. Please note that the documents provided contain generic information. If we are successful in finding you an assignment, you will receive a Key more »
on experience in designing and implementing key management solutions for enterprises. Hands-on experience in HSM, Cryptography related fields Knowledge of Networking and Network Security concepts. Programming knowledge in C/C++ (preferred),Java,.NET Experience integrating cryptographic libraries and HSMs with applications. Understanding of InformationSecuritymore »
problem-solving skills, and a keen eye for detail. Proficiency in Windows OS deployment, Microsoft Powershell, Office Applications, Active Directory management, networking technologies, and informationsecurity practices is essential. If you're ready to adapt to new challenges and provide top-notch IT support, this position is perfect more »
problem-solving skills, and a keen eye for detail. Proficiency in Windows OS deployment, Microsoft Powershell, Office Applications, Active Directory management, networking technologies, and informationsecurity practices is essential. If you're ready to adapt to new challenges and provide top-notch IT support, this position is perfect more »
for the development and maintenance of PAM & EPM (Endpoint Privilege Management) policies and procedures. This role offers a unique opportunity to contribute to the security and integrity of our organization's privileged access systems. Key Requirements: Develop and maintain Privileged Access Management (PAM) and Endpoint Privilege Management (EPM) policies … and core infrastructure components such as networks and databases. Profound knowledge of Endpoint Privilege Management governance principles and best practices. Demonstrated experience in mitigating informationsecurity risks related to privilege escalation on endpoints. Familiarity with industry IT compliance standards Contract Details: Duration: 6 months Location: Midlands/Remote more »
is looking for a DevSecOps project manager to come on board for an initial 3 months. Key for this role Proven ability with Delivering security technology integration Define Deliver and Support Strategic plans for implementing a database monitoring project Coordinate engineering resources and timetables with technology departments across the … organisation conduct testing alongside engineers preservation of assets through implementing disaster recovery and back up procedures abd informationsecurity and control structures AWS Technical knowledge Imperva Sonar - AWS and database monitoring proijects (desirable) This will be a 3 months contract Outside IR35 Paying up to £582 per day more »