and maintaining the integrity, confidentiality, and availability of our information systems. Your expertise in Microsoft technologies and experience with SIEM (Security Information and Event Management) tools will be instrumental in identifying and mitigating security threats proactively. Responsibilities: 1. Security Monitoring and Incident Response: - Utilize SIEM tools such as Microsoft … analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. VulnerabilityManagement: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers more »
are conducted, and improvements implemented and ensure colleague queries around policies and requirements are appropriately answered in a timely manner. Be responsible for the VulnerabilityManagement process. Act on vulnerability information and conduct Cyber Security risk assessments and work with suppliers, partners, and internal teams to ensure … need: In depth knowledge of Information Security concepts and principles, including cloud security capabilities. Experience with configuring and utilising security tooling, including SIEM, EDR, vulnerability scanners, CASB, network scanning, DLP. Hands-on IT experience with proven expertise in a previous Information Security role. Vendor management experience. A relevant more »
London, England, United Kingdom Hybrid / WFH Options
ITRS
with all staff and clients to implement appropriate IT infrastructure balanced against regulation requirements, risks, and cost. As part of the IT global senior management team, you will lead a global team of Infrastructure Technicians, ensuring that efficient and high-quality IT services and projects are delivered to support … available and fit for purpose to meet our needs as we scale our business. As a Global IT Infrastructure Manager, you will: Provide line management for the Global infrastructure staff. Lead the strategy, scalability, innovation, and best practices for local and global infrastructure solutions with service improvement reviews and … infrastructure services delivered. Directly contribute to ITRS Group's goal for achieving and maintaining ISO 27001 accreditation across the group. Be responsible for Problem management and helping in finding solutions. Integrate future acquisitions into the existing ITRS Group Infrastructure, systems, and processes Identity and Access Management (IAM) for more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
out Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … day London office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, VulnerabilityManagement, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & Access Management (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits Key Activity: * Develop more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerabilitymanagement, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerabilitymanagement, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. VulnerabilityManagement: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
Lead and deliver Cybersecurity work packages on behalf of Synoptix clients or as part of internal delivery programmes. This may include: Development of Security Management Plans Understanding and defining the capability context Performance of Risk Assessments (System Driven or Component Driven) Define and architect of Security Controls Development of … SyOps Development of CoCos VulnerabilityManagement Planning Development of Key/Certificate Management Plans Development of Security Case Reports. Support to Security Working Groups Management (but not delivery of) Penetration Testing and/or TEMPEST Testing Act as an SME for security requirements. Assist in the …/certificate management. Extensive experience in embedding security best practices within multi-disciplinary product teams. Experience in conducting security risk assessments. Experience of Security Management Plan (SMP) Generation Experience of Security Case/Security Case Report Generation Strong communication and stakeholder management skills. Strong analytical and problem-solving more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
the confidentiality, integrity, and availability of information systems are maintained to protect customer, corporate, and third-party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC partners. This is a hybrid position with … required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are … is maintained and in line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes, and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Experience Minimum 5+ years commercial experience more »
Hove, England, United Kingdom Hybrid / WFH Options
HCLTech
Type of Role: Full-time Employee/Full-time contract Job Description: To front end/interface with client leadership team on security delivery management activities. Perform stakeholder management both within HCL and client. Chair periodic governance calls with client stakeholders. Ensure security deliverables are meeting the client … technologies/domains:- EDR/Nextgen AV solutions Data security platforms (Varonis, MS Purview, Stealthbit) FWs/IPS and perimeter security (Proxy, WAF etc) VulnerabilityManagement and security assessments Governance, Risk & Compliance areas Digital certificates/PKI SOC and SIEM tools/log management Qualifications & Experience Should more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and VulnerabilityManagement is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerabilitymanagement, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerabilitymanagement tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerabilitymanagement You will advise on Security best practices, and act more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerabilitymanagement and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and more »
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of … for an individual that has: At least 2 years cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerabilitymanagement tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerabilitymanagement tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
Center (SOC) team. Your role will involve managing both external and internal SOC personnel, overseeing security monitoring and analysis, incident response, threat intelligence, and vulnerabilitymanagement activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC team and a more »
youll be doing Day to day monitoring and administration of security controls around tooling solutions and Cloud based systems such as Office 365, Azure. Management and configuration of our key security systems, Crowstrike, Rapid7, Mimecast, Azure security suite & Netskope. Monitor the GPHG security services to ensure the patching, security … controls and mechanisms are operating effectively. Investigate issues and escalate. Assist in delivering security reviews and the management of metrics to ensure confidentiality, integrity, standardisation and consolidation for ease of support and maintenance. Take ownership in obtaining information, evidence and data required to diagnose and resolve complex problems. Proactively … security, technology architecture or an infrastructure role. Experience in designing and implementing written and technical information including security policies. Experience in IT security incident management Practical knowledge of information security risks, controls and frameworks (e.g., NIST, COS or ISO27001) Experience of security withing Azure/Cloud environment, Mimecast or more »
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »