work from home, that's to be agreed upon between you and your manager. About the RoleWe are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerabilitymanagement team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by … threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with … teams across remote and office locations. There will be opportunities to guide continual improvement of the vulnerabilitymanagement process.ResponsibilitiesLead a team of information security professionals to:Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans.Collate and prioritise applicable more »
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of VulnerabilityManagement Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco VulnerabilityManagement, Nucleus, Rapid 7, Armis – other similar … VulnerabilityManagement Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerabilitymanagement optimisation (e.g., Kenna. VM/Cisco VulnerabilityManagement, Nucleus, Rapid 7, Armis – other similar VulnerabilityManagement Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threat and vulnerabilitymanagement (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs Education High School Diploma w/… of information security experience Additional 10 years of IT experience 7+ years in an information security role 5+ years of experience with threat and vulnerabilitymanagement program and operations 3+ years of experience working with threat intelligence feeds and IOCs 3+ years of experience in a security engineer … role 3+ experience with cloud vulnerabilities 2+ years of experience with endpoint protection tools 2+ years of experience with security information and event management (SIEM) tools 1+ years of experience with perimeter security Primary Functions Operate within the global Cybersecurity Team within the Information Technology department Ensure global alignment more »
ATT&CK framework, and lead the charge in containing and remediating security incidents. Collaborate across teams to outsmart threats and keep our defences impenetrable. • Vulnerability Slayer: Hunt down weaknesses with vulnerability scans and assessments, prioritise risks like a hawk, and orchestrate swift remediation with IT teams. Keep the … outbound emails with encryption. Become the gatekeeper of our inboxes. • Platform Maestro: Deploy, configure, and command a symphony of security tools - EDR/XDR, vulnerabilitymanagement, email gateways, you name it. Fine-tune rules and detections, optimising threat detection and reducing false alarms. • Network Security Sage: Possess a … Incident response methodologies (MITRE ATT&CK, D3FEND) • Microsoft 365 Security • DMARC, SPF, DKIM • Strong Scripting (e.g., PowerShell or Python) • Security automation frameworks • Security platform management • Vulnerabilitymanagement tools • Privilege Access Management • Industry-standard frameworks (NIST, SANS) and best practices controls (CIS) About Us ComfortDelGro is one more »
A specialist (re)insurance broker are looking for an experienced Cyber Security Engineer to take responsibility for the development and operation of the vulnerability and security event management programs, within the Information Security function. This is a permanent role with hybrid working arrangements - requiring 2-3 days per … week in their Central London office. Core responsibilities will include: Daily management and maintenance of vulnerability monitoring systems Daily management and maintenance of security event monitoring Support the Information Security Team in performing security assessments for projects and other initiatives Assess cloud applications and provide assurance that … stakeholders and be visible to the c-suite, making this a really exciting step-up for the right candidate. Requirements : Hands-on experience in vulnerabilitymanagement, and configurating and tuning vulnerabilitymanagement tools e.g. Qualys, Microsoft Defender Hands-on experience configurating and tuning SIEM solutions e.g. more »
City of London, London, United Kingdom Hybrid / WFH Options
Nigel Frank International
A specialist (re)insurance broker are looking for an experienced Cyber Security Engineer to take responsibility for the development and operation of the vulnerability and security event management programs, within the Information Security function. This is a permanent role with hybrid working arrangements - requiring 2-3 days per … week in their Central London office. Core responsibilities will include: Daily management and maintenance of vulnerability monitoring systems Daily management and maintenance of security event monitoring Support the Information Security Team in performing security assessments for projects and other initiatives Assess cloud applications and provide assurance that … stakeholders and be visible to the c-suite, making this a really exciting step-up for the right candidate. Requirements : Hands-on experience in vulnerabilitymanagement, and configurating and tuning vulnerabilitymanagement tools e.g. Qualys, Microsoft Defender Hands-on experience configurating and tuning SIEM solutions e.g. more »
City of London, London, United Kingdom Hybrid / WFH Options
Nigel Frank International
A specialist (re)insurance broker are looking for an experienced Cyber Security Engineer to take responsibility for the development and operation of the vulnerability and security event management programs, within the Information Security function. This is a permanent role with hybrid working arrangements - requiring 2-3 days per … week in their Central London office. Core responsibilities will include: Daily management and maintenance of vulnerability monitoring systems Daily management and maintenance of security event monitoring Support the Information Security Team in performing security assessments for projects and other initiatives Assess cloud applications and provide assurance that … stakeholders and be visible to the c-suite, making this a really exciting step-up for the right candidate. Requirements : Hands-on experience in vulnerabilitymanagement, and configurating and tuning vulnerabilitymanagement tools e.g. Qualys, Microsoft Defender Hands-on experience configurating and tuning SIEM solutions e.g. more »
junior members of the team. The role is suited to individuals with prior experience developing and implementing security procedures and controls as well as management experience in a Security Operations Center (SOC) environment. Millennium is a complex and robust technical environment and securing the Firm from external and internal … Response activities for the Firm’s environment.Enforce security policies and procedures by administering and monitoring appropriate systems, events and answering client queries.Perform threat and vulnerabilitymanagement functions including vulnerability scans and/or analyze results of scans and assist with remediation as required.Collaborate with the Information Security … Team to consume feeds from a suite of security tools including AV, Advanced Malware Detection, SIEM, IDS, Vulnerability scanners, etc.Ensure MLP enterprise security products are functioning and protecting the environment as expected while providing stability and maintaining policies and procedures.Actively monitor new and emerging security and privacy related technologies more »
systems and data. Lead a team of cybersecurity professionals to monitor, detect, and respond to cyber threats and incidents. Conduct regular risk assessments and vulnerability scans to identify potential security weaknesses and mitigate risks. Coordinate with internal teams and external partners to ensure compliance with industry standards and regulations. … cyber security incident outside of typical business hours) Provide reporting on ticket activity and SLA adherence on a weekly basis to the Group IS management team across all Group businesses to Group Head Cyber Security Operations, CISO and other stakeholders across Group businesses. Compile weekly and monthly security compliance … to enhance the company's cybersecurity posture and maturity. Provide guidance and support to staff on cybersecurity best practices and awareness. Collaborate with senior management to communicate cybersecurity risks and recommendations for improvement. Stay informed about the latest cybersecurity trends and threats to proactively protect the organisation's digital more »
manage our security risks through governance, we detect and protect Wise from unauthorised access, and we respond to and recover fast from security incidents. VulnerabilityManagement, Threat Management, Change Management, Access Management and Compliance are core products and strategic themes of the Squad.We are looking more »
cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerabilitymanagement, network security and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers VulnerabilityManagement Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the VulnerabilityManagement technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerabilitymanagement, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
Operations Leadership: Lead and manage the security operations team, providing guidance, mentorship, and performance feedback to ensure the team's effectiveness and efficiency.Incident Response Management: Develop and implement incident response procedures to promptly identify, assess, and respond to security incidents. Lead the team in conducting thorough investigations and root … cause analysis of incidents.Security Monitoring: Oversee security monitoring and threat detection processes, leveraging security information and event management (SIEM) and other security tools to proactively identify and address potential security threats.Vulnerability Management: Coordinate vulnerability assessments and penetration testing activities. Work with relevant teams to prioritize and remediate … and Deployment: Assess and recommend security tools and technologies to enhance the organization's security posture. Oversee the deployment and integration of security solutions.Budget Management: Manage the security operations budget, making cost-effective decisions for security investments and initiatives.Collaboration and Incident Coordination: Collaborate with IT teams, legal, HR, and more »
cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerabilitymanagement, network security, and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers VulnerabilityManagement Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as VulnerabilityManagement and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
new role as a key member of the Cyber Security team. Responsible for operational cyber security including logging and monitoring, incident response, threat and vulnerabilitymanagement, the team also works on intelligence-led penetration testing, the development of cyber security policies and standards, security architecture, forensic investigations and … to create and answer priority intelligence requirements, delivering intelligence reports to stakeholders within the team and the wider organisation use our security information, event management and threat intelligence platform to hunt for threats, enriching our defensive capabilities with indicators of compromise and detection rules use relevant frameworks and modelling … techniques to represent threats against Parliamentary assets from a range of actors and technologies enrich areas such as risk and vulnerabilitymanagement with relevant threat intelligence and modelling work on exercises employing tactics, techniques and procedures that match those used by actors who have been identified as targeting more »
success of our security function. As such, you will provide the day-to-day technical expertise and guidance on security operations activities, such as vulnerabilitymanagement, major incident response, and security monitoring improvements. Perform requirements analysis following customer engagements. Design, architect, and deliver security projects. Document and transition … or vCISO, consulting to external clients (delivering workshops and reporting sessions). Experience in overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Hands-on experience in delivering security projects, including implementation and post-implementation support, providing … both leading the function and people. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, SIEMs including Sentinel. more »
requires a Senior Cyber Security Specialist to work alongside and lead the Cyber Defence team delivering cyber threat intelligence, threat detection, incident response, and vulnerabilitymanagement capabilities for the organisation.you will be leading the defence function, by providing strategic direction and coordinating day-to-day delivery of threat … intelligence, threat detection, incident response, vulnerabilitymanagement and ethical hacking capabilities identify and deliver opportunities for continual improvement of the cyber defence function brief senior stakeholders on the cyber threat to the organisation take a leadership role in the cyber security team, the organisation, and the government security … and risk management communitiesSkills and experience you should have a breadth of experience across cyber threat intelligence, detection, and response experience investigating, managing, and coordinating the response to, major cyber incidents have an in-depth understanding of the tools, techniques, and procedures used by threat actors Have experience taking more »
You will be joining a developing team as a technical resource where you will have the opportunity to lead on projects around incident response, vulnerabilitymanagement, EDR scanning and more. You will work with an already wide ranging tech stack for an exciting scaling business with major expansion … Data Protection & GDPR would be highly sought after too. In this role you will: Work on a variety of technical projects across incident response, vulnerabilitymanagement, triaging and more Work with third parties and vendors to ensure full security coverage Provide support to the governance and data protection … teams Requirements: Hands on experience working in an in-house security environment Direct experience working within a variety of security tools- SIEM, EDR, Vulnerability scanners, etc Understanding and knowledge of different security frameworks- ISO27001, PCI DSS, Cyber Essentials, etc. For more information, please apply or send your CV direct more »
objectives. WHAT WILL YOU BE DOING? Mitigating security risks associated with Bring Your Own Device, securing personal devices in a corporate environment. Ownership of vulnerabilitymanagement strategy. Preventing security breaches and ensuring system integrity Responsibility of deploying an Endpoint Detection and Response platform - which will involve configuring the … + years of working in IT, Network, and/or Security Engineering ● Experience in designing/deploying BYOD controls, for example Mobile Application Management solutions on iOS and Android ● Experience with VulnerabilityManagement ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape more »
the network countries. Support global cyber security team to ensure open Continuous Security Improvement Programme (CSIP's) are managed effectively up to closure. Firewall management Web Proxy management and CASB. Anti-Virus/Malware management Standard, third party and privilege access user management Remediation of external … will be used as evidence during COBIT 5, PCI DSS and Security review, internal and external audits. Required Skills Good knowledge of Information Security Management System (Infrastructure Security Operations). Good knowledge of Azure cloud infrastructure and configuration. Good knowledge in System Centre Configuration Manager, Operations Manager and Virtual … Machine Manager. Good knowledge of Microsoft Exchange online Good knowledge of Azure and on-premises Active Directory Good knowledge of Cyber Incident Management and or Security Forensic experience. Good knowledge of Windows Server and Linux Good knowledge in network (WAN, Wi-Fi) and Network Access Control (NAC) managementmore »
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
through developing the operational systems Maintain, support and develop their security procedures and tooling Assist and support the wider security teams including Architecture, Audits, VulnerabilityManagement, Project Management and 3rd parties Be available for out of hours support in case of critical issues - uncommon Skills Required: Security … Technologies & Tooling: endpoint protection tools, vulnerability scanners, network security, cloud security Access Management & Authentication: IAM, PAM, PIM, SSO, MFA etc Microsoft: Active Directory, Windows Server & SQL Server Linux: Ubuntu, RedHat, Rocky Cloud: 365, Azure, AWS DevOps/DevSecOps: Infrastructure as Code - IaC Scripting: PowerShell, Python, Bash In line more »
of all Microsoft professional services projects and ongoing programmes across the Stridon client base including: Azure services Microsoft 365 services Infrastructure Cyber security Identity Management Application To be the subject matter expert on all matters related to Microsoft Solutions including Azure, M365 and Windows Server related services across the … Stridon infrastructure Responsible for deployment, configuring, and management of deliverables across all client solution implementations including ADDS, Certificates, Certificate Authorities, DNS, DHCP, DFS, File System, Group Policy, Radius, Exchange, SharePoint, Federation, Web Services and SQL Provide subject matter expertise and manage Stridon internal applications Manage Remote Management and … Monitoring tools to respond to and remediate problems where they have been escalated Deploy vulnerabilitymanagement tools such as Microsoft Defender to scan for and remediate vulnerabilities across client infrastructure Provide expertise and mentoring to Managed Services engineers in problem management of Microsoft solutions and service-related more »
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … maintained and approved Responsible for the Cybersecurity and Business Continuity Training Programs EXPERIENCE REQUIRED: Minimum 2-3 years in the cybersecurity and business continuity management environment, preferably in a Financial Institution Experience in developing and Cybersecurity awareness programs Bachelor's in computer science, Information Technology or related field Experience more »