is made up of many teams that work together to support our information systems and infrastructure. The teams include: IT Applications, IT Infrastructure and Cybersecurity, IT Services and IT Portfolio and Project Management The role - The successful candidate must possess an excellent knowledge of frontend technologies and good knowledge of more »
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Adecco
legislation analysis and interpretation and compliance to our client's defined secure product development process. Responsibilities include: Assess, interpret and track new or amended cybersecuritysecurity/software update management legislations to relevant functions and cascade interpretation to subject matter experts. Develop and or maintain security specifications for … vehicle components and functions for all projects. Analyse and update cybersecurity requirements based on the applicable cybersecurity legislations for the project. Ensure traceability between regulations and requirements are maintained and available for audit purposes. Deliver cybersecurity work products aligned to the clients Secure Development Process(for e.g. … sector. The successful candidate will be able to demonstrate: Product security technical competency (UNECE, R155, R156, ISO21434) Good knowledge of legislative landscape for cybersecurity and connected services in different regions( like China, South Korea, Japan, South Africa) in addition to Europe. Ability to analyse and interpret cybersecuritymore »
resolving issues related to Windows desktop, Windows server and MAC environments. Administer Office 365 and Google Workspace environments, including user management, email configurations, and security settings. Work collaboratively with the wider IT Team to resolve service requests and incidents logged into the service desk system, including service desk tickets … from end users and the internal team. Proactively respond to alerts and monitoring notifications, demonstrating our dedication to excellence. Maintain security measures to protect systems, networks, and data from unauthorised access, cyber threats, and malware, installing and maintaining firewalls, antivirus software, and intrusion detection systems, and conducting securitymore »
Not only do we advise businesses regarding their IT transformation needs, we also provide advice to businesses regarding business operating models, network architecture and cybersecurity to name a few. The Academy will train you to understand our business, the role of a Consultant and the Consulting Industry more »