SAAS) services, containers, Infrastructure-as-code and CI/CD Continuous software delivery pipelines. Solid and demonstrable experience selecting and implementing cyber controls including vulnerabilitymanagement, perimeter security, DLP, Identity and access management, IPS, DDOS, XDR systems, security monitoring/SecOps. Good understanding of AppSec principles; Business … Continuity/Disaster Recovery requirements; and Risk Management Good experience knowledge of DevSecOps methodologies and practices. A strong ability to extract architecture and design requirements from business needs when the latter maybe poorly defined and associated stakeholders have limited or no understanding of Architecture. In return, we offer... At more »
to modernize operations and drive innovation across the entire IT estate. The Security Incident Coordination Analyst has the responsibility for the co-ordination and management of any Security Incidents. You will be a member of the leveraged UK Security Incident Coordination Team that delivers security services to a wide … range of customers in Public Sector, Health, Defence and Commercial Sectors. You will be responsible for the end-to-end management of the security incident life cycle, overseeing each of the relevant stages from triage through to closure, looking to identify patterns from root causes analysis and making recommendations … to the Security Delivery Lead and customer. You will provide a professional interface when required with the customer, the delivery team, and the line management chain, thus being point of contact for operational security advice and guidance. You will also be responsible for escalations of issues as and when more »
Responsibilities The Project Engineer will be expected to have the ability to deploy and troubleshoot the following applications: Tanium - Software/Patch/Asset Management Secureworks (Taegis platform) - Managed Detection and Response Crowdstrike AntiVirus TenableOne - VulnerabilityManagement What we need from our Project Engineers: Good IT knowledge. more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Hargreaves Lansdown Asset Management Limited
and wishes to progress their career, assisting in security assurance across the business. ROLE ACCOUNTABILITIES Design and implementation of automated security testing solutions/vulnerability scanning within an SDLC Supporting senior management in defining testing strategy, tools and technologies Running proof of concepts for new tools to support … of the delivery pipeline, and a secure by design culture Cultivate strong working relationships across the business including IT, projects, squads, SOC, InfoSec and VulnerabilityManagement, to ensure processes are smooth and efficient Adhering to deadlines, prioritising work, and provide progress updates against plan EXPERIENCE/SKILLS Experience … SCA/DAST toolsets such as Veracode, GitLab Experience of API scanning toolsets such as Salt, Cequence, 42crunch Understanding of CVSS, EPSS or other vulnerability risk measurement framework Ability to code in at least one programming or scripting language Appreciation of different types of software development languages and deployment more »
Aylesbury, Buckinghamshire, South East, United Kingdom
Kelltron Consulting Services
Kelltron Consulting Services (KCS) - Information Security Engineer Kelltron Consulting Services (KCS) specializes in providing cutting-edge cybersecurity solutions, focusing on access and identity management, data governance, and privileged access management. Our suite of products, including Kelltron Access Management, Kelltron Identity Management, Kelltron Data Governance Management, and … Kelltron Privilege Access Management, are designed to secure and streamline our clients' IT environments. At KCS, we are committed to building sustainable, inclusive, and positive security cultures for our clients through continuous engagement and reinforcement of good security behaviors. As a vital member of our Information Security team, you … projects, collaborating closely with engineering, ITSM, Data, and Product teams to advance our security strategy. Your responsibilities will include: - Developing and improving alerting and vulnerabilitymanagement solutions. - Implementing essential security tools to enhance visibility and reduce risks. - Championing security best practices across cloud infrastructure and applications. - Automating security more »
as part of a collaborative and innovative team where you will be hands-on with various Security & Infrastructure products including Azure, WAF, Internet protection, Vulnerabilitymanagement, SIEM, Firewalls, CASB and EDR. Within this role, you will work with the team to engage and technically support in driving performance more »
roles Strong understanding of networking protocols and technologies Proficiency in security tools such as SIEM, IDS/IPS, endpoint detection and response (EDR), and vulnerabilitymanagement Knowledge of encryption algorithms and techniques Familiarity with regulatory compliance standards (e.g., GDPR, HIPAA, PCI DSS) Managing identity and access securely Strong more »
includes the provision of escalation security support to the Service Desk, Desktop Support, participation in Infrastructure Security projects and being responsible for Information Security Management System (ISMS) maintenance. Key Responsibilities/Accountabilities Taking responsibility for leading, guiding, supporting and delivering secure architectural design for the group cyber security maturity … or multiple offices location in order to complete your tasks for off the network countries. Knowledge and Experience Experience in Azure cloud and identity management solutions. Specific focus on network equipment. Palo Alto Firewall, Imperva WAF and NAC experience Netskope proxy and CASB experience Microsoft Defender and Crowdstrike experience … SSO & MFA gateway Data loss prevention tools experience Azure security centre and Wiz io experience Cymulate and Ping Castel experience SCCM or enterprise patch management tools TenableOne or enterprise vulnerabilitymanagement tools Sound knowledge of industry best practices such as OWASP, Cyber security framework and NCSC guidance more »
Align with industry frameworks (NIST, ISO 27001 & Cyber Essentials). Manage all areas of Cyber security including policy/governance, threat assessment, identity & access management, vulnerabilitymanagement, security administration (patch management), user engagement and SOC management. About you: Experience as a Head of Cyber Security or more »
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerabilitymanagement tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerabilitymanagement, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Security Engineer - £100K - Great Benefits more »
London, England, United Kingdom Hybrid / WFH Options
(8660) IBM United Kingdom Limited
SAP Security projects, covering all the implementation phases. Big4/leading SI consulting experience, including business development Experience working in both delivery and project management fields. Experience in developing and overseeing the delivery of project deliverables with high standards of quality. Motivation to develop and lead the UKI SAP …/Skills For the SAP Security portfolio, it would be desirable to have experience in the following areas and SAP Security solutions: SAP Access Management: SAP GRC Access Control, Identity & Access Management, Identity and Access Governance (inc Cloud, Cloud Bridge), SoD Models & Implementations, Greenlight AVM SAP Authentication: Single … of custom-made automatic controls (ABAP, HANA, SLT, SDI, SDQ) SAP Security hardening: SAP Security Baseline, BASIS and NetWeaver, SAP best practice security configuration, vulnerabilitymanagement for SAP, SAP Solution Manager in the Security domain, SAP FRUN for Security. SAP-SIEM integration: SAP ETD (Enterprise Threat Detection) implementation more »
security strategy. Proven experience liaising with senior stakeholders and translating technical concepts into business risks. Broad knowledge across different Information and Cyber Security disciplines (VulnerabilityManagement, Security Architecture, Incident Response, IAM, Security Operations, etc) This is an incredible opportunity for an experienced Cyber Security Consultant to join an more »
changing environments Demonstrable experience SIEM & Network technologies using Sentinel. Detailed experience of log analysis including KQL and SQL queries. An understanding of Threat and Vulnerability Management. Experience with Defender XDR, Defender Endpoint Identity, Defender for Cloud and Cloud Apps. Strong understanding of Azure and M365 Security. Experienced with either more »
Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, Threat Management, VulnerabilityManagement, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence into more »
Scheme Your role as a Senior SRE Ensure high levels of security by design, along with architecting a platform which supports monthly patching and vulnerabilitymanagement to meet company approved information security policies and procedures, which includes PCI-DSS v4 and NIST-CSF Configure and monitor infrastructure usage … repeatable processes, including roll-back to a known working state. Deploying and maintaining automation technologies like Octopus, Jenkins, Ansible, Terraform, Packer. Managing Application Log Management tools like ELK Managing Monitoring tools like Zabbix Message queue technology, like RabbitMQ, IBM MQ Ideally to be successful as a Senior SRE Azure more »
manage services to all customers. Ensure consistent compliance to company processes, procedures, and standards. As part of the team you will be responsible for vulnerabilitymanagement of Managed Service Customers using ITL tools (netbox, monitoring platform), arranging maintenance windows with clients, implementing changes for end users, and following … Change Management processes to write changes. Requirements: The most suitable candidates will have a combination of the following: IT-related degree (or equivalent). A familiarity with networking equipment and technologies. Excellent communication and interpersonal skills. Ability to work well in a pressurised environment. If interested, send your CV more »
Bristol Area, South West, United Kingdom Hybrid / WFH Options
Reed Technology
of delivery What are we looking for? * Candidate will be experienced in a broad variety of technology including Azure, 365 E5 products, Internet protection, Vulnerabilitymanagement, SIEM, Firewalls, CASB, WAF and EDR products * Experience in configuring and securing Cloud, SaaS, Endpoint and On-Premises solutions * A proven record more »
part of the Lumen PMO in support of the Axiom Contract. The Main Responsibilities Job Details: Provide security certification test and evaluation of assets, vulnerabilitymanagement and response, security assessments, and customer support Provide support for proposing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies … security posture for an information system or program to ensure information systems security policies, standards, and procedures are established and followed Assist with the management of security aspects of the information system and performs day-to-day security operations of the system Evaluate security solutions to ensure they meet … security requirements for processing classified information Perform vulnerability/risk assessment analysis to support certification and accreditation Provide configuration management (CM) for information system security software, hardware, and firmware Manage changes to system and assesses the security impact of those changes. Prepare and reviews documentation to include System more »
as part of a collaborative and innovative team where you will be hands-on with various Security & Infrastructure products including Azure, WAF, Internet protection, Vulnerabilitymanagement, SIEM, Firewalls, CASB and EDR. Within this role, you will work with the team to engage and technically support in driving performance more »
Tasks: * Act as Service Owner for Network Security * Support IT transformation journey and Zero trust strategy * Design for Remote Access, Secure Internet Access, Patch Management, VulnerabilityManagement, Network Access Control (NAC) * Conduct network security audits and risk assessments for vulnerabilities * Optimization of Network security controls * Monitoring of … the creation of standard network security processes (eg. Firewall rule change) * Stakeholder Management Requirements: * Long-term project experience as Security Network Architect * Experience as Service Owner, Team lead or Coordinator * Experience in designing network security services (Remote & Internet Access, Firewalling, IDS/IPS, NAC)# * Strong experience with Zscaler … and Fortinet * Strong experience with Fortinet management tools, NAC solutions, micro-segmentation tools and vulnerabilitymanagement * Experience with Zero Trust model, industry standards and frameworks (eg NIST,CIS) * Experience in large-scale network environments (30,000+ users) * International project experience * Beneficial: Manufacturing industry experience * Strong communication skills more »
Cyber Threat Intelligence discipline Expert understanding of Cyber Threat Intelligence techniques and best practice Knowledge of Purple/Red Team disciplines, Penetration Testing and VulnerabilityManagement lifecycles Excellent knowledge of cyber threat landscape, current affairs and geopolitics, including activity groups and how to apply this knowledge within an more »
Filton, South Gloucestershire, England Hybrid / WFH Options
BAE Systems
technologies including but not limited to firewalls, IDS/IPS, Active Directory, endpoint protection, Windows Server, Linux, TCP/IP, Networks, Cloud, CDN's, VulnerabilityManagement Benefits: You'll receive benefits including a competitive pension scheme, enhanced annual leave allowance and a Company contributed Share Incentive Plan. You more »
desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a deep knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques. Their transition from a hybrid to a cloud-centric infrastructure is underway, making experience in hybrid environments particularly … of a whole host of legacy infrastructure and the adoption of new private cloud solutions. Part of your responsibilities will include the creation and management of detailed documentation covering infrastructure setups, operational processes, and guidelines. Additionally, you should possess the ability to demystify technical concepts for a non-technical more »
WHAT YOU'LL DO The Global Security Director works in the Information Security Architecture team within BCG's Information Security and Risk management (ISRM) organization. This role will lead the monitoring, assessment, and security standards development of all cyber security solutions deployed by BCG within its on-premises and … years of experience in security assessment of cyber security products and services within the space of systems security, network security, identity and access management and cloud. Hands-on experience in a broad range of enterprise security solutions, identity governance, and in multi-cloud environments. Good hands on experiencing in … requirements, functional requirements and eventually doing a proof of concept (PoC) testing to select the final proposed solution. Have worked with any market leading vulnerabilitymanagement solutions like Tenable.IO, Rapid7; and have triaged and remediated software vulnerabilities in functional products. Have worked in an Agile environment. YOU'LL more »
company committed to delivering excellence in the realm of information security to hire an Information Security Consultant. With a focus on IT Disaster Recovery, VulnerabilityManagement, and PCI-DSS compliance, they strive to ensure the security and resilience of their customer critical assets. We are seeking a talented … posture. Role Overview: As an Information Security Consultant, you will play a pivotal role in enhancing our organization's resilience to IT disasters, strengthening vulnerabilitymanagement processes, and ensuring compliance with PCI-DSS standards. You will collaborate closely with cross-functional teams to identify gaps, develop strategies, and … management. Formulate an iterative approach to understand gaps and issues at a high level. Develop a well-defined IT DR roadmap to achieve objectives. VulnerabilityManagement: Establish robust and measurable processes to identify and remediate vulnerabilities across the organization. Address configuration issues within scanning platforms, such as Qualys. more »