incorporated into the business Risk Register. Participate in supplier reviews, serving as the subject matter expert in cybersecurity. Provide support during the Bank's incidentresponse process involving suppliers. Contribute to the continuous monitoring of key third-party relationships. Enhance awareness of third-party cybersecurity risks through local more »
policies and audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incidentresponse, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM more »
London, England, United Kingdom Hybrid / WFH Options
Client Server
the appropriate SIEM platform and then once it's embedded ensuring BAU and leading security monitoring, carrying out indepth investigations and actively participating in incident response. This is a high profile role where you'll establish Security Operations Centre procedures and processes from the ground up, collaborating with senior more »
security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerability management, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge, provide guidance and support colleagues; equally willing and capable more »
manage, upgrade, and improve a centrally managed infrastructure and provide customer support Demonstrated subject matter expertise with vulnerability and patch management, insider threat and incident response. Broad knowledge in risk analysis, threat mitigation, and other security domains. Understanding of various networking ports, protocols and services. Scripting experience (e.g. JavaScript more »
services. * Experience using virtualisation software. * Excellent communication skills * Experience of writing Defence/Government documentation Responsibilities include: * Develop and integrate security event monitoring and incident management services. * Respond to security incidents as they occur as part of an incidentresponse team. * Implement metrics and dashboards to give more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
matters. This includes drafting and implementing privacy strategies, negotiating Data Processing Agreements (DPAs), Standard Contractual Clauses (SCCs), and other privacy-related documentation with clients. IncidentResponse: You’ll assist with incident reports and reviews, ensuring compliance with relevant regulations. DORA Expertise: As part of the escalation point more »
/Public Sector field who are responsible for designing, delivering and maintaining cybersecurity capabilities. Job Role: - Responding to security incidents as part of an incidentresponse team - Develop security event monitoring and incident management services - Standardisation of Security Operating Procedures - Provide SME on a broad range of more »
Worcestershire or Herefordshire, United Kingdom Hybrid / WFH Options
NHS Herefordshire and Worcestershire Integrated Care Board
of finances, people and contracts Experiencing of managing digital infrastructure services to UK cyber security standards Experience of managing business continuity and major IT incidentresponse and recovery Experience of managing external audits against technology standards Excellent people management and leadership skills, including ability to accurately assess the … critical in securing the strategic objectives of the business. Excellent stakeholder management skills. Ability to work, think clearly and lead others under pressure (e.g incident, cyber attack) Demonstrated capability to act upon incomplete information, using experience to make inferences and decision making. The ability to show tact and diplomacy more »
Cyber Security Analyst Key responsibilities; - Oversee network and system security, analyse incidents and identify threats - Support with incidentresponse, working with other teams to mitigate security threats - Identifying system vulnerabilities, conducting risk assesments Therefore, they are looking for candidates with the following skills and experience; - Experience with Microsoft more »
in all vendor and project activities. - Develop and maintain frameworks for security assessments. - Stay updated on emerging security threats and industry trends. - Participate in incidentresponse and investigations. - Collaborate with procurement to evaluate and manage vendor security. - Review vendor documentation to assess security posture. - Apply risk management principles more »
suppliers and external auditors. In addition to this, you will deliver awareness training, test and report on the business's disaster recovery, continuity and incidentresponse plans, and carry our internal audits of the InfoSec governance frameworks. In order to be suitable for this role, you must be more »
party suppliers and external auditors. In addition to this, you will deliver awareness training, test and report on the businesss disaster recovery, continuity and incidentresponse plans, and carry out internal audits of the InfoSec governance frameworks. In order to be suitable for this role, you must be more »
Wrexham, Wales, United Kingdom Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
Risk Management, CPSM & Threat Intelligence. Skills required: Control Frameworks & Industry Standards (ISO27001, 27002, GDPR, NIST) Security Operations Performance Tracking Data Security, Malware Detection, Threat & Incidentresponse For the right person this is a huge opportunity - considering the sustained growth that they're going through, this role has a more »
Potters Bar, Hertfordshire, South East, United Kingdom
Ashdown Group
party suppliers and external auditors. In addition to this, you will deliver awareness training, test and report on the businesss disaster recovery, continuity and incidentresponse plans, and carry our internal audits of the InfoSec governance frameworks. In order to be suitable for this role, you must be more »
experience with any of the following is a plus: Observe IT, Symantec MessageLabs, IronPort, Splunk Phantom and Recorded Future. Experience or demonstrable knowledge in Incidentresponse, log analysis and PCAP analysis Good level of understanding in the approach threat actors take to attacking a network; phishing, port scanning more »
or autonomy, with little need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incidentresponse, code/malware analysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP more »
or autonomy, with little need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incidentresponse, code/malware analysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Sopra Steria Limited
or autonomy, with little need for escalation It would be great if you had: Knowledge of; Cloud, on-prem, SaaS, PaaS, IaaS environments Security incidentresponse, code/malware analysis Strong coding skills CISSP-ISSEP (Information Systems Security Engineering Professional) Other Cyber/information Security qualification (e.g. CISSP more »
the appropriate tools, technologies & processes to mitigate critical security risks (e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incidentresponse plans, forensic capabilities, and regulation compliance). Conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the more »
including next generation firwalls, network segmentation technology (Forescout preferred) and internet connectivity. Experience with EDR, M365 security, SIEM, Vulnerability management, MITRE attack framework and Incident response. Experience of providing knowledge transfer to Service Delivery teams and developing other cybersecurity team members. Having an in-depth understanding of threats in more »
Responsibilities: Conduct security risk assessments, provide recommendations, and implement controls. Possess a thorough understanding of advanced threat detection, continuous vulnerability assessment, and strategies for response and mitigation in information/cyber security operations. Contribute to the implementation IT security roadmap, including the development of supporting policies and procedures. Oversee … network perimeter, internal, and application levels. Monitor the external threat landscape and recommend appropriate actions for emerging threats. Provide guidance and support for cyber incidentresponse during tests and actual breach/security incidents. Provide expertise and leadership to the Firm in the understanding and execution of compliance … Information Security or IT Security, Data Protection. Self-motivated, proactive, and able to take responsibility. Strong understanding of advanced threat detections, continuous vulnerability assessment, response and mitigation strategies used in Cyber Security operations. Ability to define the technology security requirements in conjunction with technical teams. Interfacing with clients, business more »
Years experience Nice to Have Skills: Any of Network+, Security+, CCNA, DEVOPS, JUNOS, Salesforce or other recognised IT admin certification Knowledge of Cyber Incidentresponse and Linux environments Non internet facing IT environments Computer Science Degree or any similar field Benefits: Competitive salary and promotions based on excellence. more »
security function. As such, you will provide the day-to-day technical expertise and guidance on security operations activities, such as vulnerability management, major incidentresponse, and security monitoring improvements. Perform requirements analysis following customer engagements. Design, architect, and deliver security projects. Document and transition projects into support. more »
trends and threats to proactively protect the organisation's digital assets. Create and update security event investigation notes and maintain case data in the IncidentResponse Management platform. Document information security operations policies, process and procedures. Monitor threat and vulnerability news services for any relevant information that may more »