Senior Technician (Device Compliance and VulnerabilityManagement ), joining a journey of modernisation IT services, through leveraging the public cloud (Microsoft Azure, M365 and Amazon AWS), delivering managed, protected, security-centric and reliable IT Services. If you are a motivated specialist with a passion for security and compliance, and more »
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerabilitymanagement requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
related field or equivalent training and/or experience. Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), Global Information Assurance Certification (GIAC), or CompTIA Advanced Security Practitioner (CASP+). Track … had to collaborate across partners with differing levels of technical security competency. Advanced knowledge and an understanding of operational excellence in Cloud Security Posture Management and VulnerabilityManagement programs. Understanding risk, resource availability and business objectives at a group level is necessary. Putting our customer's interests more »
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & VulnerabilityManagement: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerabilitymanagement and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Manchester, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
West Bromwich, West Midlands, United Kingdom Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerabilitymanagement The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. VulnerabilityManagement to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great team and help us safeguard systems … Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerabilitymanagement, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and vulnerabilitymanagement (TVM) documentation, policies, and procedures. Integrate advanced cyber security solutions with existing systems and infrastructure. Investigate and mitigate newly identified cyber security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Cyber Threat & Vulnerability Analyst – Reading/Hybrid up to £50k + Benefits An opportunity for a Cyber Threat & Vulnerability Analyst to join the team of a growing Cyber Security team at a large enterprise serving millions of customers! The business is making a big investment in Cyber and … impact and have your voice heard! In this role, you will be responsible for supporting the design, implementation, and maintenance of the Cyber Threat & VulnerabilityManagement solutions, controls, and processes across the business. Your responsibilities will be but not limited to: Support vulnerabilitymanagement across the … infrastructure Investigate newly identified Cyber Security vulnerabilities and provide appropriate mitigation actions Work closely with technology and business stakeholders about Cyber Security patching and vulnerabilitymanagement issues/actions Perform proactive threat hunting for new and emerging cyber threats Maintain dashboards with Cyber Security threat and vulnerabilitymore »
Bath, England, United Kingdom Hybrid / WFH Options
Peaple Talent
as a System Administrator, Infrastructure Engineer, or similar role at a minimum of 2nd line level. MS Azure knowledge, with experience of: Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management MS Exchange Management (Ideally Exchange Online) On-premises infrastructure experience including … Building and configuration of MS Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Desirable: Knowledge and experience of: MS 365 applications e.g. SharePoint, Teams, OneDrive, etc. SSL certificate managementVulnerabilitymanagement SIEM experience (Ideally MS Sentinel) Infrastructure As Code more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerabilitymanagement reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerabilitymanagement reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »