commissioning new services. Ensure operating procedures are provided to the Infrastructure Operations function in a comprehensive and timely manner. Oversee the configuration, installation and testing of network hardware, and software; includes but not limited to routers, switches, firewalls and SD-WAN. Where necessary, support Infrastructure Operations in monitoring, collecting … business. Recommend, cost-justify and lead execution of modifications to the existing infrastructure design to improve efficiency, reliability, and performance. Participates in disaster recovery testing and rehearsals. Who You Are: Minimum 10 years of experience in infrastructure support, delivery and design. The Infrastructure Solution Architecture Manager must be a … that enable applications and data). experience to include building an enterprise architecture. Planning and supporting processes and adhering to best practices. Knowledge of penetrationtesting methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerability assessment tools. Extensive switching, routing and firewall more »
and empower a team of security professionals: Guide, mentor, and inspire your team to achieve peak security awesomeness. Get technical: Analyze security logs, conduct penetrationtesting, and troubleshoot security incidents like a boss. Stay ahead of the curve: Continuously research and implement new security technologies and best practices. more »
including clustering. implement, and manage network security solutions, including firewalls, intrusion detection/prevention systems, VPNs, and secure access controls. regular security assessments and penetrationtesting to identify vulnerabilities and recommend remediation measures. network traffic for suspicious activity and respond to security incidents in a timely manner. with more »
of Azure PAAS database technologies (e.g. Azure SQL) of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerability scanning, Penetrationtesting and ISO27001/17/18). more »
Azure PAAS database technologies (e.g. Azure SQL) Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerability scanning, Penetrationtesting and ISO27001/17/18). more »
of key concepts and protocols '€¢Understanding and interest in low level concepts including operating systems and networking '€¢Ideally you will some commercial experience in PenetrationTesting and/or Security Monitoring '€¢Knowledge/experience of one or more programme skills (Python, Ruby, RHP, C, C#, Java, Regex) '€¢Knowledge more »
as firewalls, intrusion detection/prevention systems, SIEM, antivirus, and data loss prevention. Experience with security assessment tools and techniques, including vulnerability scanning and penetration testing. Proven experience as an IT Security Engineer with exposure to OT security - Claroty For more details, please reach out to Mary Pearson on more »
across the Network infrastructure Reviewing network configurations and device hardening Ensuring compliance with industry best practice Development and maintenance of vulnerability management programs (Pen-testing, risk assessment, remediation planning) Designing and implementing network segmentation strategies to enhance network security and isolate sensitive data Conducting and organising security assessments including … vulnerability scanning and penetrationtesting Providing expert guidance on security related alerts and incidents Key Experience: experience in network security engineering (Cisco & Fortinet experience desired) with access control, VLANS and network segmentation techniques with pen-testing frameworks, security assessments and scanning tools to configure detection/prevention more »
Develop and Test Group Disaster Recovery Plans Maintain Information Security policies, making sure data centres and users adhere. Manage cyber security tools and regular penetration testing. Assist in the delivery of CyberEssentials+ (or similar as deemed appropriate) for group companies Verify application, data, and network security to assure confidentiality … systems, backup systems, ensuring continued system functions and maintaining data integrity and retrieval. Analyse network security events by participating in and supporting audit processes, penetrationtesting, and reviewing log reports from network systems and other systems for actionable items and remediation. Monitor and reports on the performance of more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
and using purple team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetrationtesting, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage more »
detection and insider threat detection, malware analysis, reverse engineering, threat intelligence, decoys and deception, application of AI/ML techniques, orchestration and automation, and penetrationtesting across a variety of environments. The successful candidate will be expected to have a customer centric mind-set, but take an active more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
NQB International
they boast a team of highly skilled professionals, including Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. With expertise in system penetration, network intrusion, incident response, user awareness, and information governance, they are at the forefront of developing and delivering cutting-edge solutions, strategies, and services more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Persistent Systems
7. Hands-on experience on Kali Linux and NMAP. 8. Able to perform application scans using Burp enterprise, Veracode etc. 9. Perform Application pen testing for OWASP top 10 issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent more »
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. more »
solid understanding and fascination with fundamental concepts in operating systems and networking. Displays a keen interest in security principles and protocols. Demonstrates experience in penetrationtesting and/or security surveillance. Exhibits eagerness to absorb new knowledge and technologies. Has practical experience with diverse operating systems and network more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Gen+
Skills Tracker) Configure and monitor school sync systems (Includes Glow/RM and Xporter sync systems) Maintain/Develop the platform staging site for testing, demos, etc. Bug Management – Collate information, document, test and raise bugs with the development partner using Jira Maintain progress Reports for the education team … issues to supplier when required Monitor and act upon the platform vulnerability system Monitor and verify platform backups Manage and act upon the annual penetrationtesting exercise Maintain Cyber Essentials accreditation for organisation Maintain and update the key security policies Supplier and Contract Management Manage technology partner to more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
technical risks. - Recommend and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetrationtesting and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
technical risks. - Recommend and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetrationtesting and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring more »
Employment Type: Contract
Rate: £500 - £550/day £500-£550 Per Day Inside IR35
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
implementation in GCP In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetrationtesting tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/CD pipelines more »
security vulnerabilities across our client and their vendors and suppliers. Work with various teams across our clients Cyber Security function on efforts ranging from penetrationtesting, incident response, governance, risk, and compliance, and more. To be considered for this role, you should have: Must have prior experience in more »
Mitre Attack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetrationtesting, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors more »
Being a proficient communicator that allows you to share your knowledge and collaborate with the development team. Preferred qualifications, capabilities and skills Knowledge of penetrationtesting techniques Knowledge of tools used in the security industry (e.g. Burp, OWASP ZAP) Python, Ruby, Go or a similar language that can more »
user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusion detection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company's services and there is an opportunity in more »