The main responsibilities are set around, monitoring, compliance, security engagement, and detection/response.Role:· Assist in the design, implementation, and maintenance of security measures.Develop threatintelligence capabilitiesProvide a strong level consultancy when it comes to engineering security solutions.· Provide input for architecture plans with consideration of current standards. more »
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
are set around, monitoring, compliance, security engagement, and detection/response. Role: · Assist in the design, implementation, and maintenance of security measures. . Develop threatintelligence capabilities . Provide a strong level consultancy when it comes to engineering security solutions. · Provide input for architecture plans with consideration of more »
Technical domains and cyber transformation Framework assessments and roadmapping Cyber regulations, governance and compliance Incident Response, Disaster Recovery and Business Continuity Training and Exercising ThreatIntelligence Project Management Support the management of projects, including: Managing client engagement, communication and project planning activities Supporting technical and governance focussed implementation more »
City of London, London, United Kingdom Hybrid / WFH Options
Robert Half
tools for affirmative and non-affirmative coverages. The role includes responsibility for: Lead the gathering of information and analysis of material for insurance market intelligence, collaborating closely with the Senior Cyber Specialist Help deliver cyber training to our cyber insurance and cyber risk community. Monitor and maintain an understanding … governance forums for our community. Stakeholder management including regular communication measures appropriate for the target groups. Desired Skills: Ability to collect, analyse, and disseminate threatintelligence, both actionable and strategic Fundamental knowledge of cyber insurance At least three years' relevant professional experience Excellent Microsoft Office Skills, being able more »
role as this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyber threatintelligence sales who has taken ownership of the entire sales process, from cradle to grave.We are looking to speak with problem solvers and … to business growthYour sales experience is from dealing with leading enterprise companies or organisations, communicating and closing deals with CISOs, CSOs, CIOs, Heads of Intelligence or equivalent level of seniorityPositive, energetic and driven by achieving personal and company/team successYou enjoy working in a fast-paced, entrepreneurial environment more »
role as this vendor looks to expand their offerings across the UK and Central Europe. We are looking for someone with experience in cyber threatintelligence sales who has taken ownership of the entire sales process, from cradle to grave. We are looking to speak with problem solvers … business growth Your sales experience is from dealing with leading enterprise companies or organisations, communicating and closing deals with CISOs, CSOs, CIOs, Heads of Intelligence or equivalent level of seniority Positive, energetic and driven by achieving personal and company/team success You enjoy working in a fast-paced more »
of security tools such as SIEM, Firewalls and Cloud Security to monitor systems Providing Windows Server and Network Support Assess and respond to external threatintelligence reports Support ISO27001, Cyber Essentials Plus and other internal and external audit programme Implement and improve technical processes to create efficient and more »
your knowledge of security tools such as SIEM, Firewalls and Cloud Security to monitor systemsProviding Windows Server and Network SupportAssess and respond to external threatintelligence reportsSupport ISO27001, Cyber Essentials Plus and other internal and external audit programmeImplement and improve technical processes to create efficient and secure methodologiesThe more »
range of information IT security technologies and embedded security; at the minimum knowledge must cover key cybersecurity domains such as Identity and Access Management, ThreatIntelligence, Risk Evaluation, Security Assessment/Testing, Incidence Management and Vendor/Cloud products assessment Experience carrying out IT Security Assessments I will more »
developing technology and cyber capability; we aim to deliver innovation to our customers as fast as possible. Whether it's AI-driven ML-based threatintelligence or rapid start hybrid Cloud; our goal is to implement solutions that make us stand out in the market. If that sounds more »
have a broad remit ensuring high availability and performance, and currently have a particular focus on security system efficiency, monitoring and sustainability, looking at threatintelligence, IAM, data and application security across the Kubernetes and Linux based environments. For this position we will be looking for those from more »