and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
Northampton, Northamptonshire, East Midlands, United Kingdom
Tech 4
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerabilitymanagement tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerabilitymanagement the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerabilitymanagement, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Doncaster, Yorkshire, United Kingdom Hybrid / WFH Options
Lorien
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities You will work alongside the SOC team to … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Assistance with Active Directory administration. Assistance with Firewall management. Key Skills The successful candidate will exhibit the following key skills and more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Didcot, Oxfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Manchester, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerabilitymanagement processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerabilitymanagement oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
Peterhead, Aberdeenshire, Scotland, United Kingdom
PIVT Group Ltd
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerabilitymanagement requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »