infrastructure. Develop and enforce security policies, standards, and guidelines to ensure compliance with ISO27001, NIST, PCI-DSS, Cyber Essentials, and GDPR. Conduct security assessments, vulnerability scans, and penetration tests to identify and mitigate risks. Monitor and respond to security incidents, including conducting forensic investigations and root cause analyses. Collaborate … cloud environments such as AWS, Azure, or GCP. Proficiency in security technologies and tools such as firewalls, intrusion detection/prevention systems, SIEM, and vulnerability management. Experience with IaC tools like Terraform, CloudFormation, or ARM templates. Deep understanding of IAM, encryption, network security, and data protection strategies in the more »
Operations. The Team The three Egress security teams report to the Chief Information Security Officer (CISO), these are: Security Operations – the day-to-day management of operational processes and incidents Cyber Security – defining security best practice of technologies and internal pentesting Compliance & Risk – managing accreditations, auditing, and risk management … and manage all group security incidents. Whilst there are process aspects to the role there are two main areas of focus for the team: Vulnerability management. The team manage issues identified through internal and external vulnerability testing. Internally we use tools like Snyk (one of several tools available … vetting, Business Continuity Planning (BCP) and supplier onboarding. The wider security team work closely together with opportunities for cross-training and career development. The management team actively support personal development, with access to training tools such as Percipio, O’Reilly and Microsoft’s ESI. We are looking for a more »
Portsmouth, England, United Kingdom Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & VulnerabilityManagement OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth … security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … business objectives. Stay current with evolving cyber threats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cyber security professionals across different geographical locations. Foster a collaborative and inclusive work culture that encourages innovation and excellence. more »
York, England, United Kingdom Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
limited to: * Server OS. * Group Policy. * File systems (on-premises and cloud). * Exchange (on-premises and cloud). * M365. * SQL. * Active Directory. * Server Vulnerability Management. * Identity and Access Management. * Multi-Factor Authentication. * Active Directory. * Azure Active Directory. * ADFS (Active Directory Federation Services). * Azure Active Directory Privileged Identity … Management (PIM). more »