Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
technologies. Proficiency in programming and scripting languages, especially Terraform and YAML (PowerShell is a plus). Knowledge of Anti-virus, Endpoint Detection and Response, VulnerabilityManagement, and Patching. Familiarity with Security Information and Event Management (SIEM). Experience with CI tools, such as Azure DevOps or GitHub more »
role involve? Defining and implementing security countermeasures Driving suppliers to deliver necessary systems and changes Managing projects focused on improving cyber security Ensuring effective vulnerabilitymanagement Collaborating with the Head of Cyber Security and other colleagues to identify, plan, and deliver projects to enhance cybersecurity Focus on security … and keep programme leads informed of progress. Proficiency in planning and driving the delivery of security improvements Strong understanding of security best practices and vulnerabilitymanagement Desirable Skills: A working knowledge of security testing tools Knowledge of formal standards eg NIST/NCFC/CIS Experience of implementing more »
instrumental in defining, identifying, and specifying security countermeasures. You will drive suppliers to deliver the required systems and changes, manage projects, and ensure that vulnerabilitymanagement is advanced to provide top-tier cyber security. Key Responsibilities: Collaborate with the Head of Cyber Security and other security and engineering … communicate the security context, consider solutions (both tactical and strategic), and ensure successful delivery. Maintain a good working knowledge of security best practices and vulnerability management. Essential Qualifications and Experience: At least 5 years technical security experience Strong technical skills including Azure, Microsoft Defender, M365 networking and firewalls. Able … consider solutions (both tactical and strategic) and drive the delivery to completion A good working knowledge of security best practice Good working knowledge of vulnerabilitymanagement . Desirable Skills and Experience: Experience with security testing tools. Knowledge of formal standards such as NIST, NCFC, and CIS. Experience in more »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
Your skill set Primary skill as OT Security Secondary skills are, Palo Alto Firewall, Fortinet Firewall, Risk Management, Compliance Management, BCP/DR. Experience: Minimum 10+ years of working experience in Cyber Security Consulting or Advisory in Risk Assessment, BCP/DR, Data Privacy. Minium 10+ years of … anomaly detection tools in the ICS/OT environment. Good skill on correlation of data and remediation of any misconfigurations. Knowledge of OT asset & vulnerability management. Work with OT asset owners to remediate asset or vulnerability issues. hands-on experience and knowledge of ICS/SCADA System Security more »
looking for a Security Specialist - Cyber Automation and Engineering who will assist the SEA team with the following tasks: Improving the alert and case management workflows, improving enrichment, responders and other automation. Assisting as required with advanced detections and filtering. Providing platform support when required (patching applications, etc). … Tasks & Responsibilities: Perform tasks such as the following: Implement python code to enrich alerts prior to being ingested into the Bank's alert management system/queue. Implement python code to create responders in the Bank's alert/case management system to perform repetitive tasks. Integrate the … alert/case management system with additional corporate and security systems. Implement queries (SQL or similar) to extract relevant data for reporting and alerting. Perform application patching of the Bank's cyber applications (alert/case management, vulnerabilitymanagement platforms, etc). Assist with Scripting to more »
Security Description: This role is working with the Security Engineering and Architecture (SEA) team, within the Corporate Security area. We are looking for a Vulnerability and Compliance Engineer who will assist the SEA team with improving and maintaining the Bank's vulnerability and compliance tooling. Transforming and presenting … custom compliance checks where they do not exist out of the box. Assisting other teams working with the results and operationalizing processes associated with vulnerability and compliance monitoring. Troubleshooting scanning issues (both vulnerability and compliance) including authentication failures and false positives. Providing platform support when required (patching applications … as version control and CI/CD pipelines, and has a background in data flows (eg ETL). They will be passionate about security vulnerabilitymanagement and compliance scanning, and passionate about turning data into actionable processes and improvements. They will understand priorities and deliver tasks with minimal more »
Rugby, Warwickshire, United Kingdom Hybrid / WFH Options
Stoneseed Ltd
Job Title: Infrastructure Vulnerability Engineer Location: Remote/Flexible hours available Contract: Inside IR35 Duration: 6 Months Start Date: Immediate The role of Infrastructure Vulnerability Engineer Our prestigious client, who is well established within the construction industry has a rare and exciting opportunity for an Infrastructure Vulnerability … flexibility around hours. This contract is expected to last 6 months in duration, with the client looking for someone to join immediately. The Infrastructure Vulnerability Engineer will be working on predominantly Windows infrastructure and utilising SCCM/Intune/PatchMyPC amongst other tools to remediate vulnerabilities. The successful candidate … estate Provide technical analysis and design skills to ensure compliance and CVE resolution Be able to report on the company position for patching and vulnerabilitymanagement Identify and report on Key Performance Indicators around compliance and vulnerabilities About You Our ideal candidate will have a strong technical background more »
looking for a Security Specialist - Cyber Automation and Engineering who will assist the team with the following tasks: Tasks: Improving the alert and case management workflows, improving enrichment, "responders" and other automation. Assisting as required with advanced detections and filtering. Providing platform support when required (patching applications, etc). … priorities and in response to internal customer demands. Responsibilities: Implement python code to enrich alerts prior to being ingested into the Bank's alert management system/queue. Implement python code to create "responders" in the Bank's alert/case management system to perform repetitive tasks. Integrate … the alert/case management system with additional corporate and security systems. Implement queries (SQL or similar) to extract relevant data for reporting and alerting. Perform application patching of the Bank's cyber applications (alert/case management, vulnerabilitymanagement platforms, etc). Assist with Scripting more »
Source Group are currently working with an Internaitonal Bank who are looking to hire a Freelance Vulnerability and Compliance Engineer to join the team. This role is an initial contract but has a high chance of extending long term. Please only apply if you are based or looking to … to day" through automation and customer driven requirements. Responsibilities: Implement python code to enrich alerts prior to being ingested into the Bank's alert management system/queue. Implement python code to create "responders" in the Bank's alert/case management system to perform repetitive tasks. Integrate … the alert/case management system with additional corporate and security systems. Implement queries (SQL or similar) to extract relevant data for reporting and alerting. Perform application patching of the Bank's cyber applications (alert/case management, vulnerabilitymanagement platforms, etc). Assist with Scripting more »
managing MDE on Linux platforms (and preferably macOS/Windows) Experience of MDE AV, EDR, and TVM Experience of Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with chef management Excellent analytical and troubleshooting skills across complex systems Able to articulate complicated … that will help you in the role Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and VulnerabilityManagement) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - MacOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
projects in line with global engineering direction Coordinate technical activities between multiple vendors and various project teams. Manage and maintain patching/security compliance, vulnerabilitymanagement and remediation to high standards. Drive and support strategic infrastructure projects and programs using best practice and industry standards. Key Skills & Experience … high availability Backup and Recovery - Good knowledge of principles, backup schedules and recovery techniques Cyber Security concepts such as risk assessments, data protection, identity management Familiar with IT Operating & Support Models Networking – good knowledge of Networks with a familiarity of Firewalls from a compute perspective Ability to work in … be located anywhere in the world. Experience of planning, co-ordination and execution of Backup & Recovery principles, schedules, and techniques Strong vendor technical project management capability and experience in managing third party vendors and managed services partners. Experience of manufacturing environments and broad range of business-facing engagement and more »
a week and will require travel to local sites/data centres and other office locations. Skills/Experience; Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) management … monitoring, orchestrator and SEIM tools Good Knowledge of next-gen application firewalls, anti-malware, cloud proxies and CASB Experience in Azure cloud and identity management solutions. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience Azure Entra ID and DUO more »
the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure. Firewall management Web Proxy management and CASB. Anti-Virus/Malware management Standard, third party and privilege access user management Remediation of external … will be used as evidence during COBIT 5, PCI DSS and Security review, internal and external audits. Required Skills Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) managementmore »
of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetration testing, identity and access management, vulnerabilitymanagement etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors, regulatory requirements and changing … of controls and standards to both business and security solutions in order to maintain or increase the Bank's security posture. * Knowledge of risk management processes (e.g. methods for assessing and mitigating risk). * Skill in designing countermeasures to identified security risks. * Knowledge of cybersecurity and privacy principles and more »
organisation, with a focus on the End-User technologies. This includes, but not limited to; Active Directory, Group Policy, User profiles, VMware Mobile Device Management, SCCM, WDS, Remote Desktop Services, FortiClient EMS, and Jira Service Desk Deliver project work to upgrade and improve upon existing infrastructure Respond to tickets … and manage allocations of project tasks Ensure systems are kept safe and secure by embedding vulnerabilitymanagement best practises Proactively monitor systems, embed policy compliance across the end-user estate, highlight trends and proposing preventative measures Be available outside of business hours on an ad-hoc basis to … OS images using SCCM or Windows Deployment Services (WDS). Windows Server OS implementation experience across multiple platform roles, including Active Directory, Group Policy management, Remote Desktop Services. WSUS update patch management. Strong scripting ability in the likes of PowerShell or similar languages Strong experience with Mobile Device Managementmore »
Dublin, City of Dublin, Republic of Ireland Hybrid / WFH Options
Reperio Human Capital
and communicating information security policies for their organisation, ensuring ongoing compliance and adherence. Requirements: Minimum of 3 years of relevant experience in information security management activities. Microsoft Security Operations Analyst certification is preferred. Experience with Microsoft Security Suite of products essential - Azure, Sentinel, Defender etc. Experience with Microsoft … and Azure - Entra ID, Conditional Access, Enterprise Apps, App Registrations, Identity Protection, Privileged Identity Management, Identity Governance, Azure Infrastructure, Entra Connect, Intune, Secure Score, Exposure Management, Exchange Online Protection, Purview Familiarity with firewalls, SIEM, EDR, IDS/IPS concepts, email Security products, Vulnerabilitymanagement and relevant more »