Manchester, North West, United Kingdom Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerabilitymanagement and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
West Bromwich, West Midlands, United Kingdom Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerabilitymanagement The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. VulnerabilityManagement to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »
Leatherhead, England, United Kingdom Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
involve working closely with the wider technology teams to enhance their cyber maturity. Furthermore, it provides the opportunity to contribute towards the implementation and management of various security technologies. Main responsibilities: Analysing security events and incidents relating to internal and customer assets. Designing and developing SIEM security use cases. … Designing and implementing security controls and secure configurations. Maintaining proactive vulnerability scanning ensuring that all known vulnerabilities are addressed in line with policy. Collaborating with development teams to implement secure development practices. Configuring and maintaining security tooling across the infrastructure. Collaborating on maturing security incident management processes and … and audits of our information security information security policies, procedures, and systems. Identifying, assessing, managing, remediating, and tracking information security risks through our risk management framework and ensuring key risks are reported to the CISO. Performing regular internal security audits aligned to ISO/IEC 27001 and SOC2 controls. more »
they are looking for candidates with the following skills and experience; - Experience with Microsoft Security products, Sentinel SIEM and Defender suite - General security knowledge : Vulnerabilitymanagement, Backup Recovery, SIEM, Identity and access management - Risk management and control frameworks knowledge - CompTIA Security+, CISSP, CCSP, CND OR CEH more »
us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The VulnerabilityManagement Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerabilitymore »
About the Role Tesco Technology are looking for a Security Engineer reporting into the VulnerabilityManagement and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve being hands on with a focus on the … alongside other security colleagues bringing your experience to help. You will be responsible for: Building our detection, data correlation and response capabilities in the VulnerabilityManagement space. As a team we also feed into the standards and patterns for our engineering community. Create tooling and reporting to help … manage our external attack surface. Build a range of capabilities to inform our stakeholders on the status and progress of VulnerabilityManagement remediation efforts across the company. Automate integrations between platforms and tooling. Use your observations from security incidents and reporting about relevant security threats to contribute to more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerabilitymanagement issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerabilitymanagement tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerabilitymanagement oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerabilitymanagement Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, VulnerabilityManagement Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth … security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … business objectives. Stay current with evolving cyber threats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cyber security professionals across different geographical locations. Foster a collaborative and inclusive work culture that encourages innovation and excellence. more »
York, England, United Kingdom Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and VulnerabilityManagement programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerabilitymanagement requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
limited to: * Server OS. * Group Policy. * File systems (on-premises and cloud). * Exchange (on-premises and cloud). * M365. * SQL. * Active Directory. * Server Vulnerability Management. * Identity and Access Management. * Multi-Factor Authentication. * Active Directory. * Azure Active Directory. * ADFS (Active Directory Federation Services). * Azure Active Directory Privileged Identity … Management (PIM). more »
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
and managing MDE on Linux platforms (preferably macOS/Windows) Experience with MDE AV, EDR, and TVM Experience with Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with Chef management Excellent analytical and troubleshooting skills across complex systems Ability to articulate complicated … that will help you in the role: Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and VulnerabilityManagement) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - macOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
knowledge and the capability to manage your own projects Day to day , you will: Suggest Security Improvements Implement new systems Provide an overview of vulnerabilitymanagement Azure and 365 security uplifts 3rd line technical support Assist in the set up, configuration and maintenance of network infrastructure Support the more »