cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerabilitymanagement, network security, and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers VulnerabilityManagement Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as VulnerabilityManagement and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
success of our security function. As such, you will provide the day-to-day technical expertise and guidance on security operations activities, such as vulnerabilitymanagement, major incident response, and security monitoring improvements. Perform requirements analysis following customer engagements. Design, architect, and deliver security projects. Document and transition … or vCISO, consulting to external clients (delivering workshops and reporting sessions). Experience in overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Hands-on experience in delivering security projects, including implementation and post-implementation support, providing … both leading the function and people. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, SIEMs including Sentinel. more »
objectives. WHAT WILL YOU BE DOING? Mitigating security risks associated with Bring Your Own Device, securing personal devices in a corporate environment. Ownership of vulnerabilitymanagement strategy. Preventing security breaches and ensuring system integrity Responsibility of deploying an Endpoint Detection and Response platform - which will involve configuring the … + years of working in IT, Network, and/or Security Engineering ● Experience in designing/deploying BYOD controls, for example Mobile Application Management solutions on iOS and Android ● Experience with VulnerabilityManagement ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape more »
measures, monitoring for security incidents, and responding promptly to security breaches. As a Cyber Security Analyst you will be gain exposure across: Security Infrastructure VulnerabilityManagement Incident Response Ideally you will have experience across: Security principles, techniques, and protocols Endpoints, servers, infrastructure and networking technologies Experience in supporting … security systems, including vulnerabilitymanagement, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc The client is based in London, however will consider candidates on a remote basis. Sound interesting? Click apply now and I will be in touch to discuss further more »
You will be joining a developing team as a technical resource where you will have the opportunity to lead on projects around incident response, vulnerabilitymanagement, EDR scanning and more. You will work with an already wide ranging tech stack for an exciting scaling business with major expansion … Data Protection & GDPR would be highly sought after too. In this role you will: Work on a variety of technical projects across incident response, vulnerabilitymanagement, triaging and more Work with third parties and vendors to ensure full security coverage Provide support to the governance and data protection … teams Requirements: Hands on experience working in an in-house security environment Direct experience working within a variety of security tools- SIEM, EDR, Vulnerability scanners, etc Understanding and knowledge of different security frameworks- ISO27001, PCI DSS, Cyber Essentials, etc. For more information, please apply or send your CV direct more »
Cyber Security Engineer, M&A, £635(inside) 10 months +Extension – SIEM, SOAR, IdAM, VulnerabilityManagement, Trellix Are you a Cyber Security Engineer and ready to take on a pivotal role in a global business? Working on a M&A, the largest in its sector. You will be joining … management. Create and maintain cyber action plan. Track and communicate progress, risks, and issues. Review, report, and sign-off Infrastructure designs. Security Tooling (EDR, VulnerabilityManagement, IdAM, SIEM, SOAR). Input/review into cyber security design artefacts (HLD/LLD) and provide security engineering consultancy. Implementation cyber more »
Tesco Technology are looking for a Senior Security Analyst reporting into the VulnerabilityManagement team. This is an exciting opportunity for a highly motivated security focused individual to join our expanding organisation. The scale and complexity of Tesco creates a huge opportunity for someone to apply their existing … public cloud environments. Following our Business Code of Conduct and always acting with integrity and due diligence and have these specific risk responsibilities: Maintaining vulnerability scanning platforms to identify and analyse vulnerabilities. Taking a risk-based approach to prioritise remediation efforts. Working with engineering teams to remediate issues. Building … security incidents and reporting about relevant security threats to contribute to our internal detection engineering programme. Work alongside our analysts to upskill them in VulnerabilityManagement and look for patterns and issues that can be fixed centrally. POC assessments from our active Bug Bounty Program. You will need more »
Application Security Specialist Security | Application | DevSecOps | CI/CD | Burp Suite | Penetration Testing | VulnerabilityManagement | Fin-Tech An Application Security Specialist is required by a rapidly growing consumer Fin-Tech business who are based in London. The Application Security Specialist will need to have advanced knowledge of secure … well as understanding of IDE's & CI/CD solutions. The Application Security Specialist will have experience with application security assessment, penetration testing, and vulnerability management. Application Security Specialist Requirements: Experience with Application Security. Experience with SDLC and DevSecOps. Penetration Testing and VulnerabilityManagement experience. Used to more »
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerabilitymanagement issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
functional teams to ensure compliance with security policies, assess vulnerabilities, and recommend remediation strategies to mitigate risks effectively. Key Responsibilities : Endpoint Protection Deployment and Management: Install, configure, and maintain endpoint protection solutions such as antivirus software, anti-malware tools, host-based intrusion detection/prevention systems (HIDS/HIPS … prevent further spread across the organization. Document incident details, response actions, and lessons learned to improve incident response procedures and enhance endpoint security posture. VulnerabilityManagement: Conduct vulnerability assessments and scans on endpoints to identify software vulnerabilities, misconfigurations, and security weaknesses. Prioritize vulnerabilities based on risk assessment … a strong understanding of security principles, technologies, and best practices. Proficiency in using security tools such as SIEM, IDS/IPS, antivirus, firewalls, and vulnerability scanners. Hands-on experience with Microsoft Defender Security & Compliance Suite, Exchange Online Protection, CASB, Mimecast, Inutne Policy Deployment, Microsoft Entra ID etc… Hands-on more »
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and VulnerabilityManagement programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
Zscaler support, managing security vulnerabilities, user accounts and privileges, and managing all Enterprise tooling (SAAS) requirements. The post holder will be responsible for security vulnerabilitymanagement, testing & deployment of patches, supporting technical projects & provide technical guidance & support to other team members. Skills & Experience Can work autonomously as part … paced environment Cisco Meraki Hardware and cloud administration Networking experience (Proxy, LAN, WIFI, 802.1x, EAP) Zscaler Admin in ZIA, ZPA & ZDX including configuration and management of alerts Amazon Web Services admin including EC2 and S3 admin Domain management including setting up and maintaining SSL, DNS records Vulnerability and Security management with change control Good working knowledge of Virtual desktop environments HubSpot cloud - administration System Administration in Microsoft Stack (Azure AD, Endpoint MDM, Exchange, SharePoint) PowerShell/Linux scripting Windows, Apple macOS & iPad/iPhones device setup and configuration WordPress VIP backend support and administration Laptop more »
number of Cyber Security Engineers to join our client, a leading technology company. As a Cyber Security Engineer you will be focused on Firewall management, network security and Vulnerability Management. You will play a vital role in protecting our client's systems and data from cyber threats. About … the Role As a Cyber Security Engineer your primary responsibility will be Firewall Management, Network Security, Network Segmentation and Vulnerability Management. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. Key Responsibilities Experience with enterprise networks including next … generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth understanding of threats in a more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. VulnerabilityManagement: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
of the state of information security and cybersecurity and provide periodic reports (at least annually) on the state of information security to/Top management Adopt, implement and update Cybersecurity policies, rules, processes and procedures in line with Head Office regulatory Framework In reporting to the Top Management … the Group model. Work with information owners in business units to determine appropriate security objectives Monitor network activity for malicious activity Monitor and evaluates vulnerability reports, vendor hot-fixes, and vendor patches for applicability to deployed technologies Monitor the process of creating, changing, or removing user access across all … maintained and approved Responsible for the Cybersecurity and Business Continuity Training Programs EXPERIENCE REQUIRED: Minimum 2-3 years in the cybersecurity and business continuity management environment, preferably in a Financial Institution Experience in developing and Cybersecurity awareness programs Bachelor's in computer science, Information Technology or related field Experience more »
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & VulnerabilityManagement: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
in teams and with our customers, They can be used as a guide and a reference to support processes such as team development, performance management, recruitment, identification of talent, and on-going coaching to support the delivery of our ambitious growth plans. Creating Meaningful Moments that do good for … and the role they play. Relentless focus to reducing vulnerabilities with a continuous improvement mindset. Manage the day-to-day activities of threat and vulnerabilitymanagement, identify risk tolerances, recommend treatment plans and communicate information about residual risk. Work with key vendors to design and build a cyber … into any cyber incidents. Understanding the current risk profile of the organisation by executing a programme of awareness and detection initiatives including Penetration Testing, Vulnerability Analysis, reviewing as-built documentation, security assessments and improvement programmes. Monitoring and managing a 3rd party Security Operations Centre (SOC), reviewing and monitoring SIEM more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
EC3V, Walbrook, Greater London, United Kingdom Hybrid / WFH Options
Ignite Digital Search Limited
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
Employment Type: Permanent
Salary: £85000 - £95000/annum 10% pension, bonus, medical
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
Support the continuous improvement of security policies, procedures, standards and guidelines Implement and improve technical processes to create efficient and secure methodologies Support the management and investigation of security events including post incident reviews in conjunction with other IT teams and members of the Information Security function Develop awareness … materials to ensure continuous improvements to the security culture for the organisation Identification, mitigation, and management of security threats, vulnerabilities and risks Providing support and guidance within IT and the Wider Business to ensure compliance with security policy and standards Research security enhancements and make recommendations Stay current on … of security principles surrounding SIEM, Antivirus, DLP, Firewalls, Open Source Filtering tools, Cloud security (Azure), IdAM (PAM on-prem/cloud), EDR, Scanning/vulnerability tools, etc. Windows Server & Networking Incident response Endpoint and network security technologies Extensive knowledge of IT Security and Governance best practices and industry standards more »
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »