Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
of coordination and communication. Security Clearance Required: Active/Current Top Secret clearance to be considered. Must be US Citizen. Primary Responsibilities Information Security VulnerabilityManagement Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for … presence of the vulnerability, and work with the NOSC and enterprise networking teams to proactively block exploitation within the DHS environment. Perform enterprise-wide network scans, agent scans, including credentialed scans of UNIX, Windows, Network devices, and VMware assets Develop and execute vulnerability/compliance scans through Tenable.SC … maintain scan templates based on asset types, repository, credentials, etc. in support of continuous scanning requirements for various FISMA systems Perform security compliance and vulnerability assessments, specifically developing and applying STIG or CIS baselines for various operating systems, including Windows or RHEL and CentOS Maintain, optimize, and troubleshoot scan more »
youll be doing Day to day monitoring and administration of security controls around tooling solutions and Cloud based systems such as Office 365, Azure. Management and configuration of our key security systems, Crowstrike, Rapid7, Mimecast, Azure security suite & Netskope. Monitor the GPHG security services to ensure the patching, security … controls and mechanisms are operating effectively. Investigate issues and escalate. Assist in delivering security reviews and the management of metrics to ensure confidentiality, integrity, standardisation and consolidation for ease of support and maintenance. Take ownership in obtaining information, evidence and data required to diagnose and resolve complex problems. Proactively … security, technology architecture or an infrastructure role. Experience in designing and implementing written and technical information including security policies. Experience in IT security incident management Practical knowledge of information security risks, controls and frameworks (e.g., NIST, COS or ISO27001) Experience of security withing Azure/Cloud environment, Mimecast or more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
from home, that's to be agreed upon between you and your manager. About the Role We are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerabilitymanagement team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by … threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with … teams across remote and office locations. There will be opportunities to guide continual improvement of the vulnerabilitymanagement process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans. Collate more »
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of VulnerabilityManagement Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco VulnerabilityManagement, Nucleus, Rapid 7, Armis – other similar … VulnerabilityManagement Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerabilitymanagement optimisation (e.g., Kenna. VM/Cisco VulnerabilityManagement, Nucleus, Rapid 7, Armis – other similar VulnerabilityManagement Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
managing cyber risks across our client and their vendors/3rd party suppliers. Our client is looking for candidates who hold strong skills in vulnerabilitymanagement, vendor relationship management, incident response, and possess a deep understanding of cyber risk. Main Responsibilities: Develop and implement cyber risk management strategies, policies, and procedures. Lead vulnerabilitymanagement efforts, including identifying, assessing, prioritising, and remediation of vulnerabilities. Establish and maintain strong vendor relationships to ensure third-party vendors comply with cybersecurity requirements and standards. Oversee incident response activities, including incident detection, analysis, containment, eradication, and recovery. Conduct risk … specialist to our client and their vendors. To be considered for this role, you should have: Must have a strong background in cyber risk management, vulnerabilitymanagement, vendor relationship management, and incident response. Strong understanding of standards such as PCI-DSS, NIST, ISO27001, GDPR, and similar. more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerabilitymanagement strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
London, England, United Kingdom Hybrid / WFH Options
Ripple Labs Inc
and strategic related issues related to information security systems and services Collaborate with product owners and engineering teams to ensure smooth transition of the VulnerabilityManagement technologies into production and ensure maximum visibility into a variety of environments Work closely with engineering to identify opportunities for automation eliminating … service available across AWS, GPC and other public cloud providers Responsible for maintaining current versions of functionalities and technologies in production by effecting change management processes Proactively participate in compliance support activities such as trainings, audit prep, playbook authoring and ensure business as usual (BAU) activities are completed accurately … Familiarity with the CIS benchmarks and how to monitor and remidiate deficiencies Experience in Cloud Computing like AWS, GCP with emphasis on Cloud Baseline management tools like Lacework Experience in Information Security frameworks and best practices for Vulnerabilitymanagement, Risk Analysis, Reporting Metrics and Assessments Problem solving more »
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) VulnerabilityManagement and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerabilitymanagement You will advise on Security best practices, and act more »
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and VulnerabilityManagement is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »