Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA) are highly desirable. ? Bachelors degree in computer science, IT, Cybersecurity or a related field, or equivalent experience. Other considerations The business operates a first responder roster in Infrastructure to provide 24/7/ more »
external stakeholders, including government agencies and defence contractors, to ensure alignment with security policies and best practices. Qualifications: - Bachelor's degree in Information Security, CyberSecurity, Computer Science, or a related field. - Minimum of 3-5 years' experience in information assurance, preferably within the defence sector. - Active British passport and more »
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
At Talion, we provide a leading cybersecurity service to our customers. We rely upon our Desktop Support Engineers to provide technical support to our users, providing a contact that is professional, courteous and delivers confidence in Talion and its ability to service our customer’s needs. Role Duties: Provide more »
Corsham, England, United Kingdom Hybrid / WFH Options
J&C Associates Ltd
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Lorien
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Experis IT
digital and platforms. Role purpose/summary The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
to see...... Your CV Find your place at the Cyberfort Group - Our vision is to bring together technology, people, expertise, facilities and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of more »
to see...... Your CV Find your place at the Cyberfort Group - Our vision is to bring together technology, people, expertise, facilities and leaders in Cybersecurity to create capability that is second to none. We aim to create a workplace that leverages the expertise of people from a diverse range of more »
OpenLDAP, KeyCloak and Microsoft's enterprise Single Sign-On technologies. Mobile device management: Covering 300+ deployed mobile devices, applying best practice and industry standards. Cybersecurity and information assurance: Managing and maintaining intrusion detection apparatus, supporting queries/investigations and hardened configuration of IT equipment. DevSecOps and Site Reliability Engineering more »
Bristol, England, United Kingdom Hybrid / WFH Options
Adecco
with underwriters, engineers, and cyber risk analysts to integrate the cyber risk model with other systems. Stay updated with the latest in data science, cybersecurity, and risk modelling. Utilise probabilistic modelling techniques to account for uncertainties in climate science and financial modelling.Qualifications: At least 5 years of experience as more »
of our key projects include support to various submarine programmes, adaptive camouflage for the British Army, Architectural support on Typhoon and F-35 platforms, cybersecurity support to EW systems. Our customers benefit from lean delivery of agile projects, utilising best practices developed across a range of industries. The Role more »
the South, predominantly within Sussex Familiarity with industry standards and best practices, such as ITIL, ISO Microsoft technologies: 365, Azure, Windows, AD, Server OS Cybersecurity: firewalls, web filters, advanced protection and recovery Cloud technologies Desirable qualifications: Microsoft Certified – 365, Azure, Windows, Server CompTIA – A+, Security+, Network+ Cisco Certified – CCNA more »
of Azure, with a desire to develop and learn.An understanding of Microsoft-connected services and how such SaaS solutions interface with MicrosoftBasic knowledge around cybersecurity best practices or the desire to learn and digExcellent analytical & problem-solving skills combined with the ability to provide quick resolution to problemsA genuine passion more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Maxwell Bond
essential that you are able to obtain security clearance or currently hold security clearance. Responsibilities: Demonstrate extensive Information Security knowledge. Facilitate customer workshops for cybersecurity strategy development. Deliver Information Risk Management services to large organizations. Define controls for mitigating information risks in complex programs and projects. Understand vulnerabilities in modern more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
relevant experience. IT skills Network Security System Administration Malware Analysis Security Information and Event Management (SIEM) Incident Response Tools Professional Competencies Solid grasp of cybersecurity concepts, including threat identification, risk assessment, and incident management, coupled with practical experience in applying security measures and utilizing relevant tools and technologies. more »
services organisation based in the heart of Bristol who are recruiting for a Cybersecurity Lead will be responsible for providing leadership and expertise in CyberSecurity across their organisation. Along with defining the overarching security posture, the role will also be responsible for defining the strategies, policies, and procedures commensurate … the organisation. You will ensure that all applications and services are secured and implemented following industry best practices. Job Requirements develop and maintain the CyberSecurity, policies and procedures develop and maintain an appropriate information assurance framework to support delivery of the strategy leadership and insights into security threats working … alongside Technology staff to ensure appropriate remediation an appropriate level of cybersecurity culture and awareness across the whole organisation requests for information relating to cybersecurity matters any investigations into Cybersecurity breaches or suspected breaches on discussions with external parties (partners, suppliers, customers etc) in relation to Cybermore »
deployments Visit client sites to conclude escalated helpdesk support cases IT Support Engineer – Skills and experience: Microsoft technologies: 365, Azure, Windows, AD, Server OS Cybersecurity: firewalls, web filters, advanced protection and recovery Networking: Configuring, maintaining & troubleshooting Cloud technologies: 365, Azure, SharePoint, OneDrive Configuring & maintaining devices with Microsoft Endpoint Management more »
office Must have demonstratable experience in the following areas: Windows AD Storage & Compute Virtualisation & VDI Azure Cloud infrastructure, configuration & management, Microsoft 365, application management, Cybersecurity, Networking and connectivity, Automation and orchestration more »
Gloucester, Gloucestershire, South West, United Kingdom
100% IT Recruitment Ltd
run the whole organisation Monitor the use of IT throughout the organisation, ensuring access to the network and applications is suitably controlled and that cybersecurity provision is robust Manage the maintenance of other IT operated through the network, e.g. telephone system, CCTV Provide technical support for users. 1st line more »
include, but is definitely not limited to, projects and/or programmes centred around data, software development/implementation/migration, IT infrastructure, telecommunications, cybersecurity, service delivery, logistics, robotics and AI.? Qualifications DV (already in place) is required Demonstrable experience of project management methodologies and their application in the more »
PLYMOUTH SCIENCE PARK, 1 DAVY ROAD, DERRIFORD, PLYMOUTH, England
ACRONYMS LTD
and method has yet to be agreed. Details will be made available at a later date Higher Apprenticeships: Level 4 Network Engineer, Level 4 CyberSecurity Technician Higher Education: Level 4 HTQs, University Employment: Job role progression within Acronyms as a First Line Service Desk Engineer. Apprenticeship Standard IT solutions more »
be within commuting distance of their City of London offices and able to commit to 3 days per week in office. Responsibilities: Consult with Cybersecurity to deliver network security layer 3/4 protections Deliver on premise and cloud configuration across our Network Security Infrastructure Provide oversight and contribute to more »
Cyber Defence Analyst - DV Clearance Required! The Cyber Defence Analyst will join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a more »