cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerabilitymanagement, network security and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers VulnerabilityManagement Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the VulnerabilityManagement technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerabilitymanagement, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerabilitymanagement, network security, and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers VulnerabilityManagement Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as VulnerabilityManagement and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerabilitymanagement and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
success of our security function. As such, you will provide the day-to-day technical expertise and guidance on security operations activities, such as vulnerabilitymanagement, major incident response, and security monitoring improvements. Perform requirements analysis following customer engagements. Design, architect, and deliver security projects. Document and transition … or vCISO, consulting to external clients (delivering workshops and reporting sessions). Experience in overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Hands-on experience in delivering security projects, including implementation and post-implementation support, providing … both leading the function and people. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, SIEMs including Sentinel. more »
objectives. WHAT WILL YOU BE DOING? Mitigating security risks associated with Bring Your Own Device, securing personal devices in a corporate environment. Ownership of vulnerabilitymanagement strategy. Preventing security breaches and ensuring system integrity Responsibility of deploying an Endpoint Detection and Response platform - which will involve configuring the … + years of working in IT, Network, and/or Security Engineering ● Experience in designing/deploying BYOD controls, for example Mobile Application Management solutions on iOS and Android ● Experience with VulnerabilityManagement ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape more »
You will be joining a developing team as a technical resource where you will have the opportunity to lead on projects around incident response, vulnerabilitymanagement, EDR scanning and more. You will work with an already wide ranging tech stack for an exciting scaling business with major expansion … Data Protection & GDPR would be highly sought after too. In this role you will: Work on a variety of technical projects across incident response, vulnerabilitymanagement, triaging and more Work with third parties and vendors to ensure full security coverage Provide support to the governance and data protection … teams Requirements: Hands on experience working in an in-house security environment Direct experience working within a variety of security tools- SIEM, EDR, Vulnerability scanners, etc Understanding and knowledge of different security frameworks- ISO27001, PCI DSS, Cyber Essentials, etc. For more information, please apply or send your CV direct more »
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, VulnerabilityManagement, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … management. Create and maintain cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, VulnerabilityManagement, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber more »
Tesco Technology are looking for a Senior Security Analyst reporting into the VulnerabilityManagement team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. Building … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in VulnerabilityManagement and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need more »
Application Security Specialist Security | Application | DevSecOps | CI/CD | Burp Suite | Penetration Testing | VulnerabilityManagement | Fin-Tech An Application Security Specialist is required by a rapidly growing consumer Fin-Tech business who are based in London. The Application Security Specialist will need to have advanced knowledge of secure … well as understanding of IDE's & CI/CD solutions. The Application Security Specialist will have experience with application security assessment, penetration testing, and vulnerability management. Application Security Specialist Requirements: Experience with Application Security. Experience with SDLC and DevSecOps. Penetration Testing and VulnerabilityManagement experience. Used to more »
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Security Review (CSR) Compliant Using expert knowledge of Cybersecurity Frameworks and Standards Using legal and regulatory understanding to provide guidance to wider teams Personnel Management & in-house training Stakeholder engagement Management Analysis of vulnerabilitymanagement tools reverse engineering rule engineering & Crisis Management (Alert Triage) Required … Purple Teaming Understanding of computer forensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in networking, routing, and switching Use of frameworks such as NIST, ISO 27001,MITRE ATT&CK and CIS. Familiarity with cybersecurity laws more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerabilitymanagement issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, VulnerabilityManagement, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security … Technologies & Tooling: endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, VulnerabilityManagement, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security … Technologies & Tooling: endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line more »
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and VulnerabilityManagement programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
number of Cyber Security Engineers to join our client, a leading technology company. As a Cyber Security Engineer you will be focused on Firewall management, network security and Vulnerability Management. You will play a vital role in protecting our client's systems and data from cyber threats. About … the Role As a Cyber Security Engineer your primary responsibility will be Firewall Management, Network Security, Network Segmentation and Vulnerability Management. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. Key Responsibilities Experience with enterprise networks including next … generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth understanding of threats in a more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. VulnerabilityManagement: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … maintained and approved Responsible for the Cybersecurity and Business Continuity Training Programs EXPERIENCE REQUIRED: Minimum 2-3 years in the cybersecurity and business continuity management environment, preferably in a Financial Institution Experience in developing and Cybersecurity awareness programs Bachelor's in computer science, Information Technology or related field Experience more »
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & VulnerabilityManagement: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical