varied role where you'll lead and manage the day to day operations of the Security Operations Centre (SOC); this includes security event monitoring, threat monitoring and response activities. You'll also provide guidance in the event of escalations to help ensure Legal and General’s cyber threats are … our main offices in London. We are also open to flexible working arrangements - job share etc. What you'll be doing Contributing to incident management activities by advising on incident identification, assessment, classification, escalation, investigation, mitigation, monitoring and reporting to help ensure Legal and General’s cyber incidents are … ensuring they meet contractually defined Service Level Agreements; by monitoring process adherence and identifying continuous improvement activities needed to achieve operational performance and risk management objectives related to the SOC Driving the development of threatmanagement, threat modelling and identification of new threat vectors by more »
varied role where you'll lead and manage the day to day operations of the Security Operations Centre (SOC); this includes security event monitoring, threat monitoring and response activities. You'll also provide guidance in the event of escalations to help ensure Legal and General’s cyber threats are … our main offices in London. We are also open to flexible working arrangements - job share etc. What you'll be doing Contributing to incident management activities by advising on incident identification, assessment, classification, escalation, investigation, mitigation, monitoring and reporting to help ensure Legal and General’s cyber incidents are … ensuring they meet contractually defined Service Level Agreements; by monitoring process adherence and identifying continuous improvement activities needed to achieve operational performance and risk management objectives related to the SOC Driving the development of threatmanagement, threat modelling and identification of new threat vectors by more »
Harlow, London, United Kingdom Hybrid / WFH Options
Raytheon
. You will be expected to deliver upgrades and manage configuration of technology that underpins cyber operations, this is will include working with and management of external vendors and service partners. You will also be a subject matter expert for these tools, providing guidance to our Security Operations Centre. … Main Duties Responding to requests from SOC to tune SIEM, IDS and associated tooling in an effective and timely manner. Working with threatmanagement teams and liaising directly with Network and Data Centre teams to ensure Network architecture, Security Zone configuration and deployment of sensors and remediation platforms … and executing technology change across a rapidly evolving environment Record faults and arrange repairs. Conduct MACD to rules and configurations as directed by line management and approved taskings via job requests. Ensure platform is patched and maintained to correct level. Arrange via change control all maintenance and changes. Maintain more »
Reigate, Surrey, South East, United Kingdom Hybrid / WFH Options
Opus Business Systems Ltd/T.A.Opus Telecom
relating to the division. The role is to develop sales opportunities for new clients through selling Mobile Networks O2, VF and EE, UEM, Mobile Threat Management. In addition, you will have a strong cross sell strategy in creating referral opportunities to either partner with or hand over to the more »
Liverpool, Merseyside, United Kingdom Hybrid / WFH Options
Digital Gurus Recruitment Limited
and infrastructure for signs of failure or errors, raising IT incidents as needed. Ensure timely resolution in line with SLAs and KPIs. Vulnerability and ThreatManagement: Take ownership of vulnerability and threatmanagement across IT systems. Monitor changes in threats and respond appropriately, implementing remediation activities … team initiatives and projects, providing hands-on assistance and technical expertise. Skills Technical Proficiency: Hands-on experience with Azure cloud security tools and infrastructure management, including M365, IAM, RBAC, Sentinel, Defender for Cloud, Secure Score and Log Monitoring. Incident Management: Ability to identify, respond to and manage security … incidents efficiently. Vulnerability Management: Experience in monitoring, prioritising and implementing remediation activities for security vulnerabilities. Collaboration: Ability to work effectively with cross-functional teams, particularly bridging IT operations and InfoSec. Scripting: Beneficial Scripting experience for automation and incident response tasks. Tech Stack Azure M365 IAM RBAC Sentinel Defender for more »
Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, ThreatManagement, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence more »
risks and controls through data-driven analysis, enabling transparent risk-based decision making. Your expertise •proven experience in cyber and information security risk governance, management and/or control •strong technical expertise in areas such as Data Protection, Identity and Access Management, Cyber Defense, Network Security and/… Cloud). Ability to judge effectiveness of security control implementation against threats and risk scenarios •good understanding of cyber and information security risk or threatmanagement frameworks, for example NIST CSF, CRI Profile, COBIT and MITRE ATT&CK •experienced in engaging with senior stakeholders •excellent communication and interpersonal … deadlines About us UBS is the world’s largest and the only truly global wealth manager. We operate through four business divisions: Global Wealth Management, Personal & Corporate Banking, Asset Management and the Investment Bank. Our global reach and the breadth of our expertise set us apart from our more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber incident response … are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threatmanagement reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify any … use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerability management reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools such as more »
recovery as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threatmanagement and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to … and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privileged access management, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Some duties include: This role will be required to research, implement, and integrate new security systems more »
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threatmanagement frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best … 7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incident response and security monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN more »
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threatmanagement frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best … 7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incident response and security monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN more »
transition with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … relationships. As the local Cyber management presence, provide guidance and support for the area. Key Tasks and Responsibilities: Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects Continuously improve the integration and effectiveness of implemented technologies Maintain awareness of cybersecurity threats, events, tactics, techniques … ISO 27001 requirements Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber management presence, provide guidance and support for the area. Build and establish a strong relationship with Local IT in the area offices to ensure both more »
transition with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … relationships. As the local Cyber management presence, provide guidance and support for the area. Key Tasks and Responsibilities: Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects Continuously improve the integration and effectiveness of implemented technologies Maintain awareness of cybersecurity threats, events, tactics, techniques … ISO 27001 requirements Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber management presence, provide guidance and support for the area. Build and establish a strong relationship with Local IT in the area offices to ensure both more »
recovery as well as leading our Information Governance function. The Cyber Security Manager will be responsible for the strategic and practical approach to cyber threatmanagement and will lead the planning of current and future IT security solutions, researching and reviewing industry best practice and upcoming changes to … and a keen interest in cyber security best practices including but not limited to firewalls, Intrusion protection systems, protected monitoring solutions (SIEM), privileged access management, SharePoint, servers, laptops, desktops, tablets, and mobile phones. Interviews to be held Tuesday 18th June2024 Main duties of the job Please refer to the … Foundation ITIL Foundation Specific Skills Essential Advanced knowledge of security technologies including firewalls, anti-malware, IDS/IPS, web filtering, email filtering, SIEM, patch management, MDM, DLP, PKI and cryptography, IAM (Identity and access management) including MFA (multi-factor authentication) Advanced knowledge of ICT infrastructure including; networking and more »
/2012/2016,2019) • Experience of Microsoft Office Support and Development, Microsoft 365 and Microsoft SQL • In depth knowledge of Anti-virus and ThreatManagement Systems This comoany offer a 35 hour working week along with great benefits. more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threatmanagement, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »