be responsible for researching, supporting and configuring to analyse security risks and ensure security policies are in place and being followed. The Role: Handling vulnerabilitymanagement tools, creating reports for fixing issues, and prioritising actions. Investigating incidents and trends, as well as identifying threats using SIEM tools like … Splunk and Microsoft Sentinel. Using IT Service Management tools to classify cyber incidents and analyse trends for management reports. The Candidate: Working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus Experience of public cloud infrastructure and cloud delivery models more »
departments and serving as a strategic advisor, playing a pivotal role in safeguarding our digital infrastructure and navigating complex security challenges. Key Responsibilities: System VulnerabilityManagement Lead the charge in identifying and mitigating system vulnerabilities. This involves continuous monitoring of our IT landscape, implementing effective patches, and configuring … systems to enhance their security posture against evolving threats. Develop, implement, and monitor a strategic, comprehensive enterprise cybersecurity and IT risk management program. Compliance and Standards Adherence Ensure our international IT operations are in strict adherence to SOC2 and GDPR compliance. Work in collaboration with the Compliance, Legal, and … Information Systems, Computer Science, or a related field a plus. About us: Loftware is the world’s largest cloud-based Enterprise Labeling and Artwork Management provider, offering an end-to-end labeling solution platform for companies of all sizes. Maintaining a global presence with offices in US, UK, Germany more »
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerabilitymanagement processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Our client, a critical national infrastructure organisation in the energy sector, are looking for VulnerabilityManagement Analysts to join their Security Team and lead the charge in building a robust cyber testing team to fortify their national infrastructure. As a vital member of our team, you will: Conduct … regular vulnerability assessments, utilising cutting-edge tools and techniques, to identify vulnerabilities in their systems and networks. Manage the entire lifecycle of vulnerabilities, from discovery to remediation, ensuring prompt and effective resolution. Analyse risks associated with identified vulnerabilities and collaborate with stakeholders to develop comprehensive remediation plans. Work closely … with IT teams to ensure timely application of security patches and updates. Generate detailed vulnerability assessment reports to communicate status and recommendations to management. Foster a culture of security awareness by providing guidance and training to employees. Essential skills and qualifications: Strong analytical and investigative skills. Knowledge of cybersecurity more »
infrastructure. * Familiarity with enterprise information security standards: Cyber Essentials, ISO 27001, 27002, Data Protection Act, GDPR. * Proficiency in Microsoft O365 Security, Networking, Security operations, VulnerabilityManagement, and Security Auditing. * Strong understanding of security testing principles, including hands-on experience in vulnerability scanning, risk identification, resolution, and reporting. more »
of security awareness to mitigate cyber risks and safeguard critical information.What you will be doingOverseeing day-to-day security operations, including monitoring, incident response, vulnerabilitymanagement, and threat intelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilitiesEstablishing and maintaining cyber security policies … standards, and procedures, ensuring compliance with industry regulations and best practices, and creating a framework for security governanceWorking closely with senior management, IT teams, legal and compliance departments, and other stakeholders to align cyber security initiatives with business objectivesProviding strategic guidance to senior management, ensuring that cyber security … forExperience in Information Security across IT and business within areas such as PCI-DSS, GDPR, ISO/IEC 27000+, etc.Experience in an Information Security management function and/or related functions (such as IT audit and IT Risk Management)Experience of IT Architecture including the development (and ensuring more »
working with the latest Azure cloud technologies. You will be responsible for a number of cyber tasks such as working with the SOC provider, vulnerabilitymanagement along with ensuring the digital transformation project is secure. This is your opportunity to work alongside an experienced CISO, who thinks outside … standard · Develop company-wide best practices for IT security · Perform internal penetration testing if required · Help colleagues install security software and understand information security management · Be an escalation point for the service desk with resolving security/network related issues Security Engineer Skills, Experience, Qualifications and Requirements: · Strong knowledge more »
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
awareness to mitigate cyber risks and safeguard critical information. What you will be doing Overseeing day-to-day security operations, including monitoring, incident response, vulnerabilitymanagement, and threat intelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cyber security … policies, standards, and procedures, ensuring compliance with industry regulations and best practices, and creating a framework for security governance Working closely with senior management, IT teams, legal and compliance departments, and other stakeholders to align cyber security initiatives with business objectives Providing strategic guidance to senior management, ensuring … in Information Security across IT and business within areas such as PCI-DSS, GDPR, ISO/IEC 27000+, etc. Experience in an Information Security management function and/or related functions (such as IT audit and IT Risk Management) Experience of IT Architecture including the development (and ensuring more »
skills across the implementation, maintenance, and configuration of security tools and platforms; creating policy changes, completing constant monitoring, identifying/resolving issues. and performing vulnerability testing. The role is very diverse covering all aspects of Cyber Security and would offer an excellent opportunity to further your skills and expand … of different security products and offer the chance to gain additional certifications and experience. You will gain further exposure to End to end threat & vulnerabilitymanagement Operational support of security technologies, products, and services Vulnerability scans and identifying vulnerabilities in systems Monitoring for unusual activities, implement defensive … of contemporary standards, practices, procedures, and methods. Wireless security, network monitoring, network design, windows desktop/server security, database security, routing protocols and incident management Aptitude to use online research tools and internal documentation to find resolutions to problems Be able to conduct cyber essential assessments. Any experience with more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerabilitymanagement A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Birmingham, England, United Kingdom Hybrid / WFH Options
CRG Recruitment Ltd
Cyber Security Assurance Engineer to come on board to my client to act as Cyber Security Assurance support for my clients Technology Team, providing management of risk in a pragmatic and cost-effective manner to ensure stakeholder confidence. Please note with role is Hybrid, and will require 3 days … per week in the office Knowledge and experience required, Expert knowledge of security data tools, information security controls, security best practice and management strategies. Experience of designing control maturity tests and conducting control maturity assessments. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability … of security monitoring, alerting, and reporting. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools (Nessus and Rapid 7), EDR platforms, SIEMs (Splunk/Azure Sentinel), Powershell automation etc. Previous exposure to enterprise networking and infrastructure more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
a completely cloud environment and the continued enhancement of workplace technology. Working directly with Windows 10/11, laptop devices, Intune, PowerShell, Azure, and vulnerability management. Experience required: PowerShell scripting from scratch Microsoft Azure Azure AD Background in infrastructure Hands on experience with Intune Device Management and User … support Windows 10/11 Desirable but not required: SCCM MDM VulnerabilityManagement Please apply directly and we will be in touch to provide further information more »
SW9, Oval, Greater London, United Kingdom Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerabilitymanagement and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
currently looking for a Cyber Security Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving forward … Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerabilitymanagement Skills more »
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter expertise across a … of DevOps and IaC concepts You have a good understanding of cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi You have automation and scripting (PowerShell or similar) skills You're more »
and other risk frameworks (e.g. ISO27001/ITIL/Sarbanes-Oxley/NIST/PCI). Assisting in the development and optimization of control management processes to ensure IT Operations operates and can evidence effective controls which address risks, local legislative or regulatory requirements, company policies, and best practice. … IT Operations’ audit findings, and mitigation efforts, ensuring gaps are understood and that appropriate action plans are determined and tracked to completion Ensure effective management of IT Operations’ risks, recommending mitigations and track and reporting on remediations required to bring residual risks in line with targets Work with the … the Encore IT Risk and Control team, and colleagues in related functions (e.g. Finance for Sarbanes Oxley work) Support I.T Operations on patch/vulnerabilitymanagement Follow any reasonable instructions as directed by management Things we need from you: Proven track record of delivery in an IT more »
pension contributions, flexible working, in house L&D, 28 days holiday +BH Skills required for this role: - Experience working with SIEM solutions (ideally Sentinel) - Vulnerabilitymanagement (Nessus) - Incident Response - Implementing appropriate mediation Desirables: - SC Clearance - Large guideline expérience (ISO27001, Cyber Essentials, etc) This role gives the right candidate more »