Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
comprehensive in-house delivered training plan covering: Cisco VPN Azure Active Directory/Entra Meraki Wi-Fi Intune/Autopilot (in development) Mobile Device Management and deployment Windows 10 Office 365 and Power BI Microsoft Always On VPN (in development) Microsoft Defender for Endpoint Strong understanding of cyber and … demonstrate that you have actively been developing a journey in reducing on-premise hardware to drive cloud-based benefits. Experience with Microsoft Azure, SaaS, vulnerabilitymanagement, and the ability to work effectively alone or as part of a small busy team are essential for our operational development. The … with other places to enhance Network, WAN, VPN, Telephony, Mobile devices, cyber approach and modern workspace environments. Person Specification Additional Requirements Essential Mobile Device Management and deployment Qualifications Essential Degree in a computing science or equivalent experience delivering IT infrastructure Desirable A certification which confirms ongoing self development Experience more »
managing MDE on Linux platforms (and preferably macOS/Windows) Experience of MDE AV, EDR, and TVM Experience of Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with chef management Excellent analytical and troubleshooting skills across complex systems Able to articulate complicated … that will help you in the role Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and VulnerabilityManagement) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - MacOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
approach threat actors take to attacking a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusion detection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role more »
IaC) for secure cloud deployments Implement and manage cloud security tools, including CSPM, CWPP, and CNAPP solutions Conduct security risk assessments, threat modeling, and vulnerabilitymanagement Develop and enforce security policies, standards, and best practices Automate security processes and workflows using scripting and programming languages Collaborate with cross more »
Romsey, England, United Kingdom Hybrid / WFH Options
CBSbutler Holdings
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge VulnerabilityManagement and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Romsey, Hampshire, South East, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited
to a wide range of defence clients. You will contribute to the development of security capabilities ranging from Security & Assurance services to leading edge VulnerabilityManagement and Protective Monitoring capabilities. Based in Romsey/Gloucester (Remote working available) £55,000 - £60,000 per annum + 6% bonus Must … be eligible for Security Clearance Key Responsiblities: Production and maintenance of security documentation including, Secure by Design Documentation, Security Management Plans, RMADS, Security Operating Procedures, Security Cases and Test Security Instructions (TSI). Coordinate Security Risk Analysis and Management activity to support design and accreditation of solutions. This … includes creation and maintenance of the security risk register and management of Risk Balance Cases. Supporting the team lead in the development and deployment of cyber services. Acting as the Security SME for proposals and ITT/ITN responses. Working as part of an Integrated Delivery Team including: Technical more »
Bournemouth, Dorset, South West, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Farnborough, England, United Kingdom Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerabilitymanagement systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, VulnerabilityManagement Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Manchester Area, United Kingdom Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) VulnerabilityManagement/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
knowledge and the capability to manage your own projects Day to day , you will: Suggest Security Improvements Implement new systems Provide an overview of vulnerabilitymanagement Azure and 365 security uplifts 3rd line technical support Assist in the set up, configuration and maintenance of network infrastructure Support the more »
Portsmouth, England, United Kingdom Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & VulnerabilityManagement OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
applications specifically including O365 and associated applications. o Application and OS life cycle management. o Patching, specifically Intune, Autopilot, MDM, and OS Patching. o Vulnerability Management. o Print Services. o Facilities, physical security services and supporting platforms. * Make sure operational service are delivered to agreed SLAs, where service does more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth … security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … business objectives. Stay current with evolving cyber threats and industry best practices to ensure the organization's readiness and resilience. Team Leadership: Matrix management of a diverse team of product cyber security professionals across different geographical locations. Foster a collaborative and inclusive work culture that encourages innovation and excellence. more »
York, England, United Kingdom Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
and best practices across the environment Manage the upkeep, performance, and reliability of the SaaS product hosted on the AWS Conduct regular security assessments, vulnerability testing, and audits to identify and mitigate risks. Monitor and respond to security incidents, ensuring prompt and effective resolution. Collaborate with cross-functional teams … AWS services including EC2, S3, RDS, Lambda, VPC, IAM, and CloudTrail. Proficiency in security tools and practices such as SIEM, IDS/IPS, and vulnerability management. Experience with Infrastructure as Code (IaC) tools like Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python, Bash, or PowerShell. more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »