with regulatory requirements (e.g., GDPR, HIPAA). Security and Compliance: Develop and enforce IT security policies, procedures, and best practices to protect against cyberthreats and data breaches. Conduct regular security audits and risk assessments to identify vulnerabilities and implement appropriate safeguards. Strategic Planning: Collaborate with senior management more »
for aviation, ports, borders, defense, and security across 55 countries around the globe Job Purpose: We are seeking an experienced Head of Product Cyber Security to join our team. This role is pivotal in developing, sustaining, and enhancing our cyber security architecture across all products and … from potential threats while effectively managing various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed … experience in cyber security leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as more »
systems are secure and resilient. Position Summary: As a SOC Analyst, you will be responsible for monitoring security events, conducting incident response, and providing threat intelligence. You will work closely with other SOC analysts to enhance security operations and protect clients from cyber threats. Key Responsibilities: Monitor … security events and logs to identify potential security incidents. Perform incident analysis, classification, and response actions. Provide proactive threat intelligence and recommend mitigation strategies. Collaborate with other SOC Analysts and Shift Leads on incident handling and investigations. Conduct threat hunting activities to identify potential security breaches. Assist in … processes, and technologies (firewalls, SIEM, IDS/IPS). Proficiency in TCP/IP protocols, network analysis, and troubleshooting. Experience with incident response and threat intelligence. Excellent written and verbal communication skills. Ability to work independently and as part of a team. Eligible to obtain Security Clearance. Desired Qualifications more »
in Operational Technology (OT) security risk management. Your expertise in integrated information systems and OT, coupled with your ability to identify and address cyberthreats, will be invaluable in propelling our clients' businesses forward through digitalization. What we're looking for: Experience in security management of industrial control more »
servers, networking equipment, and storage systems. Security Management: Implement and maintain security measures to protect the company's IT systems and data from cyber threats. System Administration : Perform system administration tasks, including user management, system monitoring, and backup management. Technical Documentation: Maintain accurate documentation of IT systems, configurations more »
this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyberthreat intelligence sales who has taken ownership of the entire sales process, from cradle to grave. We are looking to speak with problem solvers and more »
Security Engineer, you will be responsible for designing, implementing, and maintaining secure network infrastructures to protect our organization's data and systems from cyber threats. Key Responsibilities: - Design, implement, and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches more »
Swindon, Wiltshire, South West, United Kingdom Hybrid / WFH Options
Global Technology Solutions Ltd
including high-level designs, detailed designs, architecture diagrams, and data flow diagrams. ? Execute comprehensive security solutions to safeguard client systems and data against cyber threats. Key Skills and Experience ? Microsoft Server & Enterprise App Services, including: Windows Server 2022, 2019, 2016, 2012R2 and previous versions Microsoft Active Directory Microsoft more »
West Bend, Wisconsin, United States Hybrid / WFH Options
Delta Defense
and our customers' critical assets are safeguarded. Your work will directly support our broader mission of self-defense, empowerment, and personal protection - making cyber-resilience a tangible impact on the lives we serve and support everyday! If you're ready to take your career to the next level … environment, we want to hear from you! Essential Duties and Responsibilities: Evaluate, design, and implement robust security systems. Shield our information assets from cyberthreats and continuously fortify our security posture. Lead the charge in our Security Operations Center, offering crucial oversight and direction. Be the beacon for … including associates in the field (outside sales). Deep understanding of key industry frameworks and controls including NIST CSF, CIS CSC, PCI-DSS, Cyber Defense Matrix, ISO 27001, and MITRE ATT&CK. Familiarity with a broad range of security tools and technologies including EDR, SIEM, SWG, CASB, DLP more »
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and … external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as … investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on more »
Northallerton, North Yorkshire, Yorkshire and the Humber
Computer Futures
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and … external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as … investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on more »
Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and … external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of junior analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as … investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on more »
including high-level designs, detailed designs, architecture diagrams, and data flow diagrams. Execute comprehensive security solutions to safeguard client systems and data against cyber threats. SKILLS & EXPERTISE Microsoft Server & Enterprise App Services, including: * Windows Server 2022, 2019, 2016, 2012R2 and previous versions * Microsoft Active Directory * Microsoft Hyper V more »
and developing automated solutions through code. Experience in configuration management systems like Ansible Passion for network security and desire to protect organisations from cyber threats. Keen on Open Source development. Collaborative and able to communicate effectively and asynchronously. more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusion detection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance of on-prem Windows server infrastructure. Experience in the more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »
plant teams. Cybersecurity: Collaborate with IT teams and cybersecurity experts to implement robust security measures and protocols to protect process network systems from cyber threats. Monitor and assess system vulnerabilities, recommend, and implement security enhancements, and ensure compliance with cybersecurity standards. Essential Experience and Skills Bachelor's degree more »