on complex and interesting systems at the cutting edge of technology, with excellent career growth opportunities? You could be joining a successful and growing CyberSecurity Risk Management tech company. As a Software Engineer you'll take a lead role in the Product Engineering team working on the development of more »
Back End Developer who enjoys using a range of languages whilst continually learning? You could be progressing your career at a successful and growing CyberSecurity Risk Management tech company, working on complex and interesting systems at the cutting edge of technology. As a Back End Developer you'll join more »
you a technologist who enjoys using a range of languages whilst continually learning? You could be progressing your career at a successful and growing CyberSecurity Risk Management tech company, working on complex and interesting systems at the cutting edge of technology. As a Backend Software Engineer you'll join more »
mid-market organisations. And in response to our customers changing needs, and the growing threats we all face, weve massively strengthened our well-established cybersecurity capabilities. Our mission is to unleash the potential of people through amazing IT experiences. Role Overview As Sales Operations Coordinator you will be instrumental more »
how to configure the GRC platforms we work with and the basics of Risk Management, with the options to specialise in other aspects including CyberSecurity, Compliance, Business Continuity Management, Audit and more. Key responsibilities Collecting and understanding business requirements required for successful implementations. Finding elegant solutions to difficult technical more »
South East London, London, United Kingdom Hybrid / WFH Options
Risktec Solutions Ltd
how to configure the GRC platforms we work with and the basics of Risk Management, with the options to specialise in other aspects including CyberSecurity, Compliance, Business Continuity Management, Audit and more. Key responsibilities Collecting and understanding business requirements required for successful implementations. Finding elegant solutions to difficult technical more »
coaching of junior analysts, and ongoing development of our service. This is a hands-on role and requires both a broad technical knowledge of CyberSecurity, as well as specific focused knowledge of CTI tools and processes. Knowledge and/or experience of modern IT Systems, particularly Microsoft solutions and … and implementation of comprehensive security policies and procedures to strengthen the organisation's overall cyber defence posture. Stay up to date with the latest cybersecurity trends and developments through continuous learning and participation in industry conferences and training programs. Mentor and support junior cybersecurity analysts within the team. … and their programming interfaces such as UNIX Shell and PowerShell. Experience with scripting languages (Python, Bash) and familiarity with APIs beneficial. An awareness of cybersecurity related standards and regulations, for example, NIST, CIS, ISO 27001 and PCI DSS. Experience leading teams and providing deputy support to Management. Experience designing more »
We’re looking for an experienced Cybersecurity Analyst to join our growing Cybersecurity Company This new and exciting opportunity is open ended for someone with initiative, ideas and enthusiasm for change and continuous improvement. Help us challenge the status quo within our client organisations by using our knowledge and experience … to ensure compliance with the government scheme Conducting reviews of current security measures and recommending suitable enhancements Identifying areas of weakness relating to clients cybersecurity posture Providing clear and concise advice and guidance on information security Occasional pre sales support when technical explanations are required Conducting cyber essentials assessments and … qualified) The Candidate: A broad range of cybersecurity knowledge and skills covering security, standards, and compliance Draw on their own technical expertise to deliver cybersecurity guidance and advice to our clients The ability to review the effectiveness of existing security controls and propose proportionate security improvements A strong understanding more »
Life on the team A fantastic opportunity has arisen for a Identity Security Consultant to join our dynamic and rapidly expanding Network & Security Consultancy Practice within Computacenter. The successful candidate will report directly to the Practice Leader, joining an already more »
The CyberSecurity Specialist holds the key responsibility of safeguarding the company's vital infrastructure, intellectual assets, and customer information from evolving cyber threats, ensuring uninterrupted operations. You will adopt a proactive stance in constructing, implementing, and managing our Cyber capabilities to bolster our defences, utilizing innovative and state-of … the-art cyber technologies. As a CyberSecurity Specialist you will be managing cyber threats, detecting and preventing real-time attacks promptly, and swiftly addressing them, integrated with advanced artificial intelligence and machine learning. Moreover, you will harness Cyber DevOps automations to expedite deployment and mitigate threats rapidly, guaranteeing the … strategies, and critical management protocols to ensure operational resilience in the face of cyber threats and other emergencies. Key Responsibilities: Technical: Extensive background in CyberSecurity engineering and implementation with a comprehensive understanding of both Operational Technology (OT) and Information Technology (IT) services. Proficient in CyberSecurity practices for safeguarding more »
Line of Service Assurance Industry/Sector Not Applicable Specialism Risk Management Level Senior Associate Job Description & Summary About our practice Cybersecurity is one of the defining topics of our age, and cyber risk represents one of the most significant strategic risks to PwC’s clients. In a recent … facing disrupted supply chains, rapidly changing workforces and accelerating digital transformation on an unprecedented scale. At PwC we help our clients transform, and our cybersecurity practice enables them to execute that transformation securely and to become more resilient to cybersecurity threats. Our cybersecurity practice operates nationally, and … serves clients holistically with strategy, risk and governance advice, and with deep technical implementation and assurance expertise. As one of the largest cybersecurity specialist consulting practices in the UK, we have over 250 practitioners who range from business risk advisors who work with CEOs, CFOs and boards, to transformation more »
About this Role Role Title: CyberSecurity Operations Engineer Location: UK- London La Fosse Associates are working with a Web3 business who are looking to add a Security Operations Engineer to their developing internal security function. You will report directly into the Lead Security Architect and be a key element more »
About this Role Role Title: Senior CyberSecurity Operations Engineer Location: UK- London La Fosse Associates are working with a Financial Services business who are looking to add a Senior Security Operations Engineer to their developing internal security function. You will report directly into the Head of Security and be more »
Analyze security logs, events, and alerts to detect any abnormal or suspicious activities, conducting regular security assessments and risk evaluations. Remain updated on emerging cybersecurity threats and vulnerabilities, utilizing threat intelligence to enhance security measures. Prepare and deliver routine security reports to management and stakeholders, summarizing the organization's securitymore »
This role offers a unique blend of project delivery and operational responsibilities. Requirements: Proven experience in diagnosing and troubleshooting networking faults. Strong grasp of cybersecurity principles and incident management. Proficiency in maintaining network software and hardware. Ability to proactively monitor network performance and health alerts. Experience in network commissioning more »
and help improve the teams ability to monitor systems effectively through scripting and or collaborating with Developers for more complex dtasks. Working closely with CyberSecurity to mitigate threats and stay on top of vulnerabilities. Ensuring firewall policies are up to date against security standards and business requirements Key requirements more »
your career as part of a hugely talented team at a rapidly expanding scale-up software house that is developing a highly complex network cybersecurity platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by more »
your career as part of a hugely talented team at a rapidly expanding scale-up software house that is developing a highly complex network cybersecurity platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by more »
experienced in the application of information security standards and frameworks, you'll have extensive hands-on technical experience in at least one IT or cybersecurity discipline and be skilled in determining, establishing, and maintaining appropriate security strategies, policies, standards, and procedures for protecting Clarion's information security assets. With more »
CyberSecurity Analyst | High Level Security Clearance Required | Up to £80,000 + Bonus | London | 2 Stage Interview Process Yolk Recruitment are working with a National Security Consultancy looking to grow their CyberSecurity division. They're looking for experience CyberSecurity Analyst's to join at their London site. … you will join an experienced team working to keep critical UK assets & applications secure. You will play a crucial role in identifying and mitigating cybersecurity risks, conducting security assessments, and helping protect clients' most valuable assets. They are based in London & the role requires active high level UK security clearance. … incidents, and suspicious activities to identify the root causes and recommend remediation actions. Collaborate with clients to provide guidance and recommendations for enhancing their cybersecurity posture. The experience you will bring to the team: Proven experience in cybersecurity, preferably in a consulting or national security environment. Strong understanding of securitymore »
and security standards. To support the business in achieving export permissions for our products and projects, particularly in regard to security architectures and emerging Cyber-security standards. This may require liaising with MoD and other export authorities, drawing on other businesses and working with external partners to develop the new more »
of operational risk exposures and mitigating activities. You will also be involved in providing an in-depth understanding of technology and risks around IT, CyberSecurity, Data and Emerging Technologies. Responsibilities: Delivering oversight, advisory and guidance on all risks related to Change Management Supporting as needed the digital/technology more »
culture of collaboration, innovation, and continuous learning. Security and Compliance: Establish and enforce security protocols, policies, and procedures to protect company data and mitigate cybersecurity risks. Ensure compliance with relevant regulations and standards. The business has achieved SOC2 certification and is working towards ISO27001. Vendor Management: Having recently acquired a more »
experience? You could be joining a hugely talented team at a rapidly expanding scale-up software house that is developing a highly complex network cybersecurity platform; the platform monitors network protocols in real-time, parses the commands and data structures to extract key metadata which is then analysed by more »
especially VMware · Network infrastructure at LAN, WAN and Multi-Site Internet/Intranet levels. · Security of Connected Services, Cloud Based Services and Remote Services · Cybersecurity prevention methodologies at desktop, server and mobile level · Secure and efficient management of users; remote and on-site · Setup, Maintenance and Distribution of secured Wireless more »