faults and determine the most effective course as a subject matter expert in an expedited manner. o Implementing server hardening standards as advised by InformationSecurity team. o Maintain register of IT assets. o In addition to the duties and responsibilities listed, the job holder is required to more »
Rugby, Warwickshire, United Kingdom Hybrid / WFH Options
Stoneseed Ltd
successful candidate will ensure core applications remain current across the estate such as SentinelOne/Nessus/Netskope, and work closely with various technical, informationsecurity and application teams. Key Responsibilities Support and manage patches and vulnerabilities within the Server and EUC estate Provide technical analysis and design more »
to date system installation and configuration documentation, as well as related processes and procedures. * Perform periodic audit and determine the operating effectiveness of the informationsecurity controls * Physically moving the devices from build location to users desk and set up OR dispatch area of courier the devices to … Microsoft Team chat for any incoming incidents Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment … single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. more »
duration: 6 months Clearance required: Must be DV cleared Role and tasks Cyber Defence Engineer Role Description: Cyber Defence Engineer will join a growing security team responsible for the testing, implementation, deployment, maintenance, configuration and troubleshooting of the SOC's technology stack (hardware and software). The engineer will … big data technologies and ecosystems (eg, NiFi). Knowledge of current market and emerging leaders in data analytical and SIEM platforms. Knowledge of network security implementations (eg, host-based IDS, IPS), including their function and placement in a network. Knowledge of intrusion detection systems and signature development. Knowledge of … concepts for operating systems such as but not limited to Unix/Linux, IOS, Android, and Windows operating systems. Knowledge of cyber defence and informationsecurity policies, procedures and regulations. Knowledge of network security architecture concepts including topology, protocols, components and principles. Skills/Experience: Previous experience more »
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Identity and Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity. Knowledge of SAML/OAUTH protocols. Experience of working and influencing cross-functionally and managing external agencies. Good more »
Our client is seeking a dedicated and knowledgeable Security identity access Manager to join their dynamic team. This role sits within the Cyber Security product group, focusing on Identity & Access platforms for Privileged Access Management and Identity Governance and Administration. The successful candidate will have the opportunity to … deliver enterprise security services to the organisation, acting as a subject matter expert in identity and access technologies. This role offers an exciting opportunity to drive forward the Digital Identity function within Cyber Security, creating a community of inter-departmental identity and access teams. Opportunity to be a … subject matter expert in identity and access technologies Drive forward the Digital Identity function within Cyber Security Create a community of inter-departmental identity and access teams What you'll do: As a Security identity acess Manager, you will play a pivotal role in shaping our client's more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
Digital Infrastructure department, adepartment that provides the infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral … routine incident response. Your contribution of relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant informationsecurity/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder … management skills. Knowledge of InformationSecurity standards,legislation, and practices, including the GDPR & Data Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerability management, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
journey to implement a nationally-leading EPR system that will transform the quality of care for our patients and staff by having instantly accessible information using the latest mobile technology, reducing paper usage and utilising clinical decision support tools. The Application Architect will play a pivotal role in the … appropriate NHS data and usability standards to ensure best fit of the emerging IT architecture and solutions to the Group. Work with the Trusts InformationSecurity Manager to ensure that Trust EPR systems are compliant with best practice and conform to standards expected in the security section … of the IG Toolkit. Provide evidence of effective security controls for the purpose of the annual IG Toolkit Submission to HSCIC. Collaborate with colleagues to ensure effective integration of the Clinical Applications with other systems with the aim of maximising the efficiency of the clinical workflow overall, and longer more »
Business Analyst - InformationSecurity - PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged Identity Management, Network Access Control, Secure access service edge Our leading law firm client are currently looking to take onboard a new Business Analyst - InformationSecurity (PIM, PAM, NAC, SASE, Exabeam, Privileged Access … Our client are an extremely laid back and very anti-micromanaged law firm with a fantastic and relaxed collaborative environment, this new Business Analyst - InformationSecurity (PIM, PAM, NAC, SASE, Exabeam, Privileged Access Management, Privileged Identity Management, Network Access Control, Secure access service edge) role will join the … edge) role, it's ideal you have: 3-5 years within a similar position Information/Cyber Security exposure (ideally within an Infosec/CyberSec role Professional services experience Duties, Responsibilities & Person Specification Business process mapping Identify, define and document business requirements and objectives Support project managers by more »
Cyber Security Engineer 6 Months Inside IR35 2/3 Days Per Week On-Site (Corsham, Portsmouth or Northallerton) DV Clearance We are looking for a DV Cleared Cyber Security Engineer to join a security team within the Military/Public Sector field who are responsible for … designing, delivering and maintaining cybersecurity capabilities. Job Role: - Responding to security incidents as part of an incident response team - Develop security event monitoring and incident management services - Standardisation of Security Operating Procedures - Provide SME on a broad range of informationsecurity standards and best practices … Job Requirements: - Skilled in maintaining Microsoft directory services - Knowledge of Key Security frameworks - Virtualisation Software - Experience of writing Defence/Government documentation If you are interested please apply here or reach out to me directly on more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Experis IT
breadth of opportunities in the evolving world of cloud, digital and platforms. Role purpose/summary The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
Lorien
Duration: 6 months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role: . Develop and integrate security event monitoring and incident management services. . Respond to security incidents as they occur as part of an incident response team. . Implement … assist with playbook automation and case management capabilities to streamline team processes and tools. . Produce documentation to ensure the repeatability and standardisation of security operating procedures. . Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. . Maintain a baseline more »
Corsham, Wiltshire, United Kingdom Hybrid / WFH Options
fortice
Farnborough or Corsham. Role Description : Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Hays
Cyber Security Officer - Maternity Cover Fixed Term Contract 10 months: £34,000 - £35,500 Location: Hybrid - Southampton, Hampshire Your new company A local government organisation, based in the South of the UK, are currently looking for a Cyber Security Officer to come and assist the Cyber Security … part in saving lives, and they truly make a real difference to the local area. Your new role You will be supporting the Cyber Security Manager with their day-to-day duties. A big part of the role will be the GRC elements, mainly ISO27001. The role is covering … for another member of the team, who are currently on maternity leave. Provide interpretation of the InformationSecurity Standards and Cybersecurity best practices to support complex decisions across the organisation. Support the Cybersecurity Manager in the implementation and maintenance of the cybersecurity incident response procedures and processes. Implementation more »
problem-solving skills, and a keen eye for detail. Proficiency in Windows OS deployment, Microsoft Powershell, Office Applications, Active Directory management, networking technologies, and informationsecurity practices is essential. If you're ready to adapt to new challenges and provide top-notch IT support, this position is perfect more »
problem-solving skills, and a keen eye for detail. Proficiency in Windows OS deployment, Microsoft Powershell, Office Applications, Active Directory management, networking technologies, and informationsecurity practices is essential. If you're ready to adapt to new challenges and provide top-notch IT support, this position is perfect more »
Powershell. Microsoft Office Applications and Office 365. Familiar with Microsoft Active Directory user account management. An understanding of NTFS Permissions. Both local and GPO Security Policies. User Hardware Board level support and configuration including desktops and laptops. PC Peripherals such as Printer configuration and support. Core knowledge in networking … technologies such as TCP/IP, 802.1X and VLANs. A working understanding of DHCP and DNS. Awareness of InformationSecurity best practices. Conceptual understanding of AntiVirus, URL Filtering and spam identification. Business Audio and Visual Solutions such as projectors and conference systems. Backup Methodologies and practices. Understanding of more »
Security Engineer - Cloud/Appsec £600-£650 p.d Outside IR35 Occasional Travel to Leeds Office 3 Months + Likely extension Start Date - ASAP Key Responsibilities: Secure Configurations & Compliance Implementation: Planning and implementation of the Center for Internet Security Microsoft Dynamics 365 Power Platform benchmark. Planning and implementation of … the Center for Internet Security Microsoft 365 Foundations Benchmark. Collaborating with cloud and DevOps engineers to refactor Terraform code for secure configurations and compliance with the Center for Internet Security Microsoft Azure Foundations Benchmark. Work with colleagues to raise any required exceptions with InformationSecurity Governance … Risk and Compliance so that any associated operational risk is identified, assessed and managed. Work with Security Operations to onboard Azure Landing Zones into Qualys Total Cloud and address any findings relating to non-compliance. Auditing configurations in order to plan remediations and verify compliance requirements are met. SIEM more »
Role: OT Security Engineer Duration: 6 Months Location: Coventry Key responsibilities: Overall responsibility to represent the policy and views of the ICS team within the wider business acting as a consultant to product teams Identify informationsecurity risks and proactively work to ensure that Information risks more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
J & C Associates Ltd
Duration: 6 months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify … broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and … to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system more »
of cloud infrastructure principles and Terraform for infrastructure as code - Familiar with postman for API testing, docker and podman for running applications - Knowledge of informationsecurity controls to eliminate threats within solutions and services Skills - Experience in Data migration, profiling and data quality enhancement - Experience in Agile (Scrum … code reviews, source control management, build processes etc If you think you would be a good fit for the role, please apply. For more information about Senitor and the opportunities we have to offer follow Senitor Associates on Linkedin. Senitor Associates Ltd is acting as an Employment Business in more »
and maintenance of our development and production environments within Azure cloud infrastructure. You will collaborate with our Cloud Centre of Excellence, Enterprise Architecture, Compliance, InformationSecurity, Customer IT and various Product teams to drive quality and repeatability into our work. Your role will include: Monitoring infrastructure and environments … cross-platform issues Documenting your knowledge of environments and systems Seeking opportunities to apply automation to tasks performed manually Keeping up-to-date with security best-practice Experience required: We are seeking candidates with a minimum of 5 years' experience with Azure cloud infrastructure, a demonstrable experience in modern … Integrations Infrastructure as Code, including PowerShell scripting, Azure CLI Azure DevOps, including Repos, Pipelines Please click here to find out more about our Key Information Documents. Please note that the documents provided contain generic information. If we are successful in finding you an assignment, you will receive a Key more »
Head of InformationSecurity and Cyber Risk Contract 12 Months £1000 p/d Outside IR35 Hybrid Insurance I'm currently supporting my insurance client in the search of a Head of InformationSecurity to support the team with the implementation of the new DORA regulation. Responsibilities: Assess and set the strategy to achieve and maintain appropriate infoSec practices, controls, resilience, risk identification and responses across Tech and Data Determine, adopt, embed and assess the infoSec framework and certification appropriate to our organisation … medium and long-term investment considering resilience and risk factors Work with stakeholders to assess impact of new projects, solutions, partnerships and regulations to security and data protection posture and support implementation Lead and collaborate across the group to ensure uniformity in cybersecurity policies and practices Must have worked more »
Head of InformationSecurity and Cyber Risk Contract 12 Months £1000 p/d Outside IR35 Hybrid Insurance I'm currently supporting my insurance client in the search of a Head of InformationSecurity to support the team with the implementation of the new DORA regulation. Responsibilities: Assess and set the strategy to achieve and maintain appropriate infoSec practices, controls, resilience, risk identification and responses across Tech and Data Determine, adopt, embed and assess the infoSec framework and certification appropriate to our organisation … medium and long-term investment considering resilience and risk factors Work with stakeholders to assess impact of new projects, solutions, partnerships and regulations to security and data protection posture and support implementation Lead and collaborate across the group to ensure uniformity in cybersecurity policies and practices Must have worked more »
Redditch, Worcestershire, West Midlands, United Kingdom Hybrid / WFH Options
First Recruitment Group - IT
level documents and filing systems. Create and maintain the Document Control Management Plan Assist with the creation and maintenance of Framework Management Plan and Information Execution Plans. Ensure the MIDP and TIDP's are fully utilised across the board. Ensure the correct client Specifications, Design Manuals and Catalogues are … iCosnet") for the Contract Team and Supply Chain. Updating the relevant registers and trackers to ensure they are up to date with the required information including drawing numbers and creating the necessary hyperlinks. Support the Contract Team by promoting the correct filing of relevant emails. Support the Contract Team … good practice with the wider Document Control community in our drive for continuous improvement. Knowledge of the requirements of IS09001 (Quality Systems) and IS027001 (InformationSecurity) Undertake regular audits on contract governance, deliverables, and key client deliverables. Highlight upcoming deadlines and outstanding actions for the Contract Team Assist more »