us and see how you can elevate the power of your work at Iron Mountain. We provide expert, sustainable solutions in records and information management, digital transformation services, data centers, asset lifecycle management, and fine art storage, handling, and logistics. We proudly partner every day with our … skills in a culture that will welcome your unique contributions? If so, let's start the conversation. The Role: Senior System Engineer, IT Systems Vulnerability & Patch Management In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day activities related … to our Vulnerability & Patch Management Program. The VulnerabilityManagement Engineer is expected to deliver results while maintaining positive relationships with other IT infrastructure teams and project sponsors. The Vulnerability & Patch Management Engineer will work in a team based environment performing technical duties supporting Vulnerabilitymore »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
Security Review (CSR) Compliant Using expert knowledge of Cybersecurity Frameworks and Standards Using legal and regulatory understanding to provide guidance to wider teams Personnel Management & in-house training Stakeholder engagement Management Analysis of vulnerabilitymanagement tools reverse engineering rule engineering & Crisis Management (Alert Triage) Required … Purple Teaming Understanding of computer forensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in networking, routing, and switching Use of frameworks such as NIST, ISO 27001,MITRE ATT&CK and CIS. Familiarity with cybersecurity laws more »
role involve? Defining and implementing security countermeasures Driving suppliers to deliver necessary systems and changes Managing projects focused on improving cyber security Ensuring effective vulnerabilitymanagement Collaborating with the Head of Cyber Security and other colleagues to identify, plan, and deliver projects to enhance cybersecurity Focus on security … and keep programme leads informed of progress. Proficiency in planning and driving the delivery of security improvements Strong understanding of security best practices and vulnerabilitymanagement Desirable Skills: A working knowledge of security testing tools Knowledge of formal standards eg NIST/NCFC/CIS Experience of implementing more »
instrumental in defining, identifying, and specifying security countermeasures. You will drive suppliers to deliver the required systems and changes, manage projects, and ensure that vulnerabilitymanagement is advanced to provide top-tier cyber security. Key Responsibilities: Collaborate with the Head of Cyber Security and other security and engineering … communicate the security context, consider solutions (both tactical and strategic), and ensure successful delivery. Maintain a good working knowledge of security best practices and vulnerability management. Essential Qualifications and Experience: At least 5 years technical security experience Strong technical skills including Azure, Microsoft Defender, M365 networking and firewalls. Able … consider solutions (both tactical and strategic) and drive the delivery to completion A good working knowledge of security best practice Good working knowledge of vulnerabilitymanagement . Desirable Skills and Experience: Experience with security testing tools. Knowledge of formal standards such as NIST, NCFC, and CIS. Experience in more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Tech 4
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
Lincoln, England, United Kingdom Hybrid / WFH Options
4Recruitment Services
a vital part in defining identifying and specifying security countermeasure, driving suppliers to deliver the required systems and change, managing projects and ensuring that vulnerabilitymanagement is driven forward to provide the best levels of cyber security to support the best outcomes for Lincolnshire citizens and the council. … a vital part in defining identifying and specifying security countermeasure, driving suppliers to deliver the required systems and change, managing projects and ensuring that vulnerabilitymanagement is driven forward to provide the best levels of cyber security to support the best outcomes for Lincolnshire citizens and the council. … hardworking and enthusiastic technical specialists across the technology domain both in-house and through delivery partners, and provide input to their service, and contract management expertise and skills. Qualifications: Bachelor’s degree in Computer Science, Information Security, related field or equivalent experience Relevant certifications (e.g., CISSP) are a plus. more »
Rugby, Warwickshire, United Kingdom Hybrid / WFH Options
Stoneseed Ltd
Job Title: Infrastructure Vulnerability Engineer Location: Remote/Flexible hours available Contract: Inside IR35 Duration: 6 Months Start Date: Immediate The role of Infrastructure Vulnerability Engineer Our prestigious client, who is well established within the construction industry has a rare and exciting opportunity for an Infrastructure Vulnerability … flexibility around hours. This contract is expected to last 6 months in duration, with the client looking for someone to join immediately. The Infrastructure Vulnerability Engineer will be working on predominantly Windows infrastructure and utilising SCCM/Intune/PatchMyPC amongst other tools to remediate vulnerabilities. The successful candidate … estate Provide technical analysis and design skills to ensure compliance and CVE resolution Be able to report on the company position for patching and vulnerabilitymanagement Identify and report on Key Performance Indicators around compliance and vulnerabilities About You Our ideal candidate will have a strong technical background more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerabilitymanagement, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerabilitymanagement, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »