knowledge and the capability to manage your own projects Day to day , you will: Suggest Security Improvements Implement new systems Provide an overview of vulnerabilitymanagement Azure and 365 security uplifts 3rd line technical support Assist in the set up, configuration and maintenance of network infrastructure Support the more »
comprehensive in-house delivered training plan covering: Cisco VPN Azure Active Directory/Entra Meraki Wi-Fi Intune/Autopilot (in development) Mobile Device Management and deployment Windows 10 Office 365 and Power BI Microsoft Always On VPN (in development) Microsoft Defender for Endpoint Strong understanding of cyber and … demonstrate that you have actively been developing a journey in reducing on-premise hardware to drive cloud-based benefits. Experience with Microsoft Azure, SaaS, vulnerabilitymanagement, and the ability to work effectively alone or as part of a small busy team are essential for our operational development. The … with other places to enhance Network, WAN, VPN, Telephony, Mobile devices, cyber approach and modern workspace environments. Person Specification Additional Requirements Essential Mobile Device Management and deployment Qualifications Essential Degree in a computing science or equivalent experience delivering IT infrastructure Desirable A certification which confirms ongoing self development Experience more »
Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role more »
Didcot, Oxfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
and best practices across the environment Manage the upkeep, performance, and reliability of the SaaS product hosted on the AWS Conduct regular security assessments, vulnerability testing, and audits to identify and mitigate risks. Monitor and respond to security incidents, ensuring prompt and effective resolution. Collaborate with cross-functional teams … AWS services including EC2, S3, RDS, Lambda, VPC, IAM, and CloudTrail. Proficiency in security tools and practices such as SIEM, IDS/IPS, and vulnerability management. Experience with Infrastructure as Code (IaC) tools like Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python, Bash, or PowerShell. more »
Bournemouth, Dorset, South West, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
role involve? Defining and implementing security countermeasures Driving suppliers to deliver necessary systems and changes Managing projects focused on improving cyber security Ensuring effective vulnerabilitymanagement Collaborating with the Head of Cyber Security and other colleagues to identify, plan, and deliver projects to enhance cybersecurity Focus on security … and keep programme leads informed of progress. Proficiency in planning and driving the delivery of security improvements Strong understanding of security best practices and vulnerabilitymanagement Desirable Skills: A working knowledge of security testing tools Knowledge of formal standards eg NIST/NCFC/CIS Experience of implementing more »
instrumental in defining, identifying, and specifying security countermeasures. You will drive suppliers to deliver the required systems and changes, manage projects, and ensure that vulnerabilitymanagement is advanced to provide top-tier cyber security. Key Responsibilities: Collaborate with the Head of Cyber Security and other security and engineering … communicate the security context, consider solutions (both tactical and strategic), and ensure successful delivery. Maintain a good working knowledge of security best practices and vulnerability management. Essential Qualifications and Experience: At least 5 years technical security experience Strong technical skills including Azure, Microsoft Defender, M365 networking and firewalls. Able … consider solutions (both tactical and strategic) and drive the delivery to completion A good working knowledge of security best practice Good working knowledge of vulnerabilitymanagement . Desirable Skills and Experience: Experience with security testing tools. Knowledge of formal standards such as NIST, NCFC, and CIS. Experience in more »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerabilitymanagement process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT … disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing … techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM more »
enhance a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerabilitymanagement process to identify, assess, prioritise, and track remediation of security vulnerabilities and weaknesses in accordance with UKPN policy. Ensure that robust IT … disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such as Cybersecurity Integration or Engineering, with a focus on assurance testing … techniques and methodologies. Team Management: Proven track record in leading a security team or function, with an emphasis on collaboration across partners with varying levels of technical security competency. Educational Background: Professional Information Security certification by a recognised professional body such as Certified in Information Security Management (CISM more »
managing MDE on Linux platforms (and preferably macOS/Windows) Experience of MDE AV, EDR, and TVM Experience of Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with chef management Excellent analytical and troubleshooting skills across complex systems Able to articulate complicated … that will help you in the role Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and VulnerabilityManagement) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - MacOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
Peterhead, Aberdeenshire, Scotland, United Kingdom
PIVT Group Ltd
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerabilitymanagement requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. VulnerabilityManagement: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
The apprentice will be tasked with sending regular reports using tools like our Security Awareness Training platform, VulnerabilityManagement tool and conducting various scans to assess security posture. Role A IT and Security Apprentice is an integral part of the security team, responsible for a variety of tasks … protection and integrity of data and systems. The apprentice will be tasked with sending regular reports using tools like our Security Awareness Training platform, VulnerabilityManagement tool and conducting various scans to assess security posture. They will also be responsible for the setup and configuration of security solutions … cyber security services. They will assist in the automation and maintenance of various tools streamlining processes to enhance operational efficiency. The role extends to vulnerabilitymanagement, where the apprentice will identify, evaluate, and address security vulnerabilities within the organization's network and systems. RMM (Remote Monitoring and Managementmore »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerabilitymanagement, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »