Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerabilityManagement will be more »
Llantwit Major, Vale of Glamorgan, South Glamorgan, United Kingdom Hybrid / WFH Options
Artis Recruitment
technologies that will effectively and efficiently meet our clients security requirements. Manage annual PEN test and subsequent remediations. Manage improvements highlighted in 3rd party vulnerability scans. Monitor the systems and respond to any potential cyber issues, acting as a point of escalation for the ICT team. Monitor of network … operational needs of the business. Required Background: Proven track record and experience in a similar cyber security role. Experience of working with cyber defence vulnerabilitymanagement/threat detection platforms. Experience/understanding of how technology can be leveraged to support data management practices. Broad understanding of … including Microsoft Azure cloud services, hybrid cloud environments, LAN/WAN networking and BCP/DR. Solid understanding of security, risk, compliance, and data management frameworks such as ISO27001, Cyber Essentials, NIST, TOGAF, COBIT, MITRE ATT&CK. Understanding of secure by design principles. Ability to travel between sites and more »
frameworks and standards such as NIST, ISO 27001, and CIS Controls. With security tools and technologies, including SIEM, IDS/IPS, endpoint protection, and vulnerability management. Analytical and problem-solving skills, with the ability to assess complex security issues and recommend effective solutions. Communication skills and ability to collaborate more »
be responsible for researching, supporting and configuring to analyse security risks and ensure security policies are in place and being followed. The Role: Handling vulnerabilitymanagement tools, creating reports for fixing issues, and prioritising actions. Investigating incidents and trends, as well as identifying threats using SIEM tools like … Splunk and Microsoft Sentinel. Using IT Service Management tools to classify cyber incidents and analyse trends for management reports. The Candidate: Working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus Experience of public cloud infrastructure and cloud delivery models more »
to ensure the implementation of security processes aligns KPMG’s security frameworks, policies, standards, whilst collaborating with other security teams in areas such as vulnerabilitymanagement, and incident management. In this delivery-focused Security Engineer role, you will have the exciting opportunity to manage multiple workstreams simultaneously. Your … doing? Develop, document, and maintain Platform security processes and plans per KPMG’s trust and verify framework. Support in the development/design and management of Product/Platform security processes and automated tooling that prevent security issues. Lead on threat modelling exercises for our products. Perform security-focused … code reviews. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and risks raised by the SOC. What will you need to do it? Excellent understanding of security controls within Azure environments Previous more »
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerabilitymanagement processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
infrastructure. * Familiarity with enterprise information security standards: Cyber Essentials, ISO 27001, 27002, Data Protection Act, GDPR. * Proficiency in Microsoft O365 Security, Networking, Security operations, VulnerabilityManagement, and Security Auditing. * Strong understanding of security testing principles, including hands-on experience in vulnerability scanning, risk identification, resolution, and reporting. more »
provide advice and guidance on IT security and further develop IT policies and processes across a multi-region infrastructure. Responsibilities: ▪Assist with security incident management and response activities ▪ Perform daily, weekly, and monthly security checks, reconciliation and compliance checks and investigate exceptions ▪ Completing client security requirement questionnaires and support … of Azure security related technologies ▪An excellent understanding of security technologies: SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. ▪Hands-on experience of security and/or infrastructure ▪Cyber Essentials, ISO 27001, 27002 ▪Networking; Security operations; VulnerabilityManagementmore »
skills across the implementation, maintenance, and configuration of security tools and platforms; creating policy changes, completing constant monitoring, identifying/resolving issues. and performing vulnerability testing. The role is very diverse covering all aspects of Cyber Security and would offer an excellent opportunity to further your skills and expand … of different security products and offer the chance to gain additional certifications and experience. You will gain further exposure to End to end threat & vulnerabilitymanagement Operational support of security technologies, products, and services Vulnerability scans and identifying vulnerabilities in systems Monitoring for unusual activities, implement defensive … of contemporary standards, practices, procedures, and methods. Wireless security, network monitoring, network design, windows desktop/server security, database security, routing protocols and incident management Aptitude to use online research tools and internal documentation to find resolutions to problems Be able to conduct cyber essential assessments. Any experience with more »
be mitigated efficiently. Experience needed: A Cyber Security Analyst with 4+ years' experience in a Cyber Security role A Cyber Security Analyst with strong vulnerabilitymanagement skills A Cyber Security Analyst with proven experience working in an Azure environment A Cyber Security Analyst with an understanding of firewalls more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
duties as assigned. • Ability to work on a shift basis including weekends and evenings. Skills Theoretical knowledge of security toolsets such as SIEM, IDS, VulnerabilityManagement, Availability Monitoring and other threat detection technologies. · Pre-existing knowledge of common network protocols. · Pre-existing knowledge of Windows and Linux based more »
to resolve problems identified and ensure systems are operated, maintained, and disposed of in accordance with established policies and procedures. Develop process for the management, review, and retention of security audit data. Report audit discrepancies to the ISSM. Perform security audits IAW established procedures. Establish system specific recovery processes … to ensure security features and procedures are properly protected and restored. Conduct vulnerabilitymanagement (scanning, assessment, reporting, and mitigation verification), security reviews and tests of systems to verify security features and controls are functional and effective. Take corrective action to resolve identified vulnerabilities. Perform periodic maintenance on systems … training or experience with Windows-based Information Systems with a working knowledge of LINUX operating systems. Current Certified Information System Security Professional (CISSP) certification Vulnerability assessment and analysis experience utilizing SCAP, ACAS/NESSUS and DISA STIGs Experience with DoD implementation of the Risk Management Framework (RMF) and more »
tech teams to ensure Security best practice is followed and compliance is met Push Security framework maturity Deliver projects to improve Security compliance Conduct vulnerability scans/reviews and schedule pen tests Provide an understanding of Security tools (SIEM, EDR, IAM, Network devices etc) Handle and investigate incidents Conduct … internal & external Security assurance reviews What skills do you need as an Information Security Manager? People management ISO27001 NIST Cloud Security principles, controls and tools experience Vulnerabilitymanagement expertise Experience with Security tooling Managing, implementing and reporting on Security frameworks Security related degree or relevant certifications Experience more »
Kingston Upon Thames, England, United Kingdom Hybrid / WFH Options
JNC Recruitment Limited
Data Protection Act 2018 Cyber Essential Plus IASME Governance Sarbanes Oxley On top of this, the role is responsible for: Managing the information security management system (ISMS) Managing information security risk identification and remediation Conduct and document internal audits to support the information security program Ensure adherence to legal … and regulatory compliance Monitor security operations toolsets including SIEM, vulnerabilitymanagement, endpoint protection, intrusion detection and threat intelligence Liaise with and give presentations to all levels of business including clients and senior stakeholders. Promote Info Sec awareness within the business through knowledge transfer and training In line with more »
departments and serving as a strategic advisor, playing a pivotal role in safeguarding our digital infrastructure and navigating complex security challenges. Key Responsibilities: System VulnerabilityManagement Lead the charge in identifying and mitigating system vulnerabilities. This involves continuous monitoring of our IT landscape, implementing effective patches, and configuring … systems to enhance their security posture against evolving threats. Develop, implement, and monitor a strategic, comprehensive enterprise cybersecurity and IT risk management program. Compliance and Standards Adherence Ensure our international IT operations are in strict adherence to SOC2 and GDPR compliance. Work in collaboration with the Compliance, Legal, and … Information Systems, Computer Science, or a related field a plus. About us: Loftware is the world’s largest cloud-based Enterprise Labeling and Artwork Management provider, offering an end-to-end labeling solution platform for companies of all sizes. Maintaining a global presence with offices in US, UK, Germany more »
SW9, Oval, Greater London, United Kingdom Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerabilitymanagement and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »
currently looking for a Cyber Security Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving forward … Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerabilitymanagement Skills more »
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
abreast of the latest cybersecurity trends and technologies to continuously enhance our defence mechanisms. Requirements: Proven experience in cyber threat detection, incident response, and vulnerability management. Proficiency in security tools such as SIEM, IDS/IPS, antivirus software, and penetration testing frameworks. Strong understanding of networking protocols, encryption techniques more »
Employment Type: Permanent
Salary: £35000 - £50000/annum hybrid working + excellent benefits
capabilities across projects and operations. Collaborates with technical teams to establish baseline security configuration standards for operating systems, network segmentation, and identity and access management (IAM). Works closely with technical teams to define standards and procedures for data encryption and tokenisation, aligning with the organisation's data classification … criteria. Drafts security procedures and standards for review and approval by executive management and/or formal authorization by the CISO. Monitors developments and shifts in the digital business and threat landscapes to ensure alignment with security strategy plans and architecture artifacts. Facilitates or conducts threat modelling exercises for … principles, with a deep understanding of methodologies for conducting threat-modelling exercises on new applications and services, as well as proficient knowledge in identity management and securing CI/CD pipelines. Direct, hands-on experience or robust working knowledge of pertinent security patterns, vulnerabilitymanagement tools, and more »
a completely cloud environment and the continued enhancement of workplace technology. Working directly with Windows 10/11, laptop devices, Intune, PowerShell, Azure, and vulnerability management. Experience required: PowerShell scripting from scratch Microsoft Azure Azure AD Background in infrastructure Hands on experience with Intune Device Management and User … support Windows 10/11 Desirable but not required: SCCM MDM VulnerabilityManagement Please apply directly and we will be in touch to provide further information more »
due diligence, gap analysis and make suggestions accordingly Ensure Security best practice is followed and ISO27001 compliance is met Generate metrics/dashboard for management reviews Assist in overseeing the ISMS from a GRC perspective Provide Information Security awareness training to tech & non-tech teams Plan audits, risk assessments … the SecOps team with incident handling, response and escalations, as well as ensuring processes are documented in line with ISO27001 Manage technical risks via vulnerabilitymanagement oversight & gap analysis, whilst also overseeing DLP alerts and creating reports What skills do you need as an Information Security Analyst? ISO27001 more »
identified vulnerabilities and weaknesses. Develop & establish supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. Ensure timely and robust incident management resolution, including major incident response coordination and management. Stay informed about emerging cybersecurity threats and trends, providing recommendations for proactive risk mitigation and threat … CISA, CISM, etc.) are a plus. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, EDR platforms, SIEMs (Splunk/Azure Sentinel), Powershell etc. Strong analytical and problem-solving skills, with the ability to effectively prioritise more »