I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
from home, that's to be agreed upon between you and your manager. About the Role We are seeking a highly motivated and experienced Vulnerability Manager to lead a growing vulnerabilitymanagement team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by … threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. This person will help present this information in a simple digestible format, and coordinate remediation and mitigation efforts with … teams across remote and office locations. There will be opportunities to guide continual improvement of the vulnerabilitymanagement process. Responsibilities Lead a team of information security professionals to: Assess, investigate and provide guidance on emerging vulnerabilities, incorporating information from threat intelligence sources, internal software and infrastructure scans. Collate more »
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
the team on a full time, permanent basis. You will be leading and delivering crucial projects for their clients including Risk Assessments, Security Controls, VulnerabilityManagement, acting as their Security Subject Matter Expert. Key requirements: 🟢 Previous background working within the Public/Defence sector 🟢 Strong understanding of Network more »
managing cyber risks across our client and their vendors/3rd party suppliers. Our client is looking for candidates who hold strong skills in vulnerabilitymanagement, vendor relationship management, incident response, and possess a deep understanding of cyber risk. Main Responsibilities: Develop and implement cyber risk management strategies, policies, and procedures. Lead vulnerabilitymanagement efforts, including identifying, assessing, prioritising, and remediation of vulnerabilities. Establish and maintain strong vendor relationships to ensure third-party vendors comply with cybersecurity requirements and standards. Oversee incident response activities, including incident detection, analysis, containment, eradication, and recovery. Conduct risk … specialist to our client and their vendors. To be considered for this role, you should have: Must have a strong background in cyber risk management, vulnerabilitymanagement, vendor relationship management, and incident response. Strong understanding of standards such as PCI-DSS, NIST, ISO27001, GDPR, and similar. more »
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerabilityManagement will be more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
real-world experience. Worked on a Managed Security Service previously. Previous experience of working as a Cyber Security Consultant across multiple customers. Microsoft stack, vulnerabilitymanagement tools (Nessus and Rapid 7), EDR platforms, SIEMs. Previous experience of delivering security projects, including implementation and post- implementation support, providing guidance … and support to customers throughout. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Responsibilities: Deliver the technical and advisory aspects of our Managed Security Service across the customer base. Join security incident response calls more »
you do it for? Would like to do this with well recognised eCommerce brand where you get the opportunity to lead programs across across vulnerabilitymanagement? You could even tell your friends about it and they would at least know exactly who you work for. You'll get more »
Office 365, Defender for Cloud, Defender for Cloud Apps (CASB) Preferrable: Defender for Identity, Azure MFA), IBM QROC/QRadar. Desirable: Any experience of VulnerabilityManagement Optimisation at scale in an enterprise environment. (e.g., Kenna. VM/Cisco VulnerabilityManagement, Nucleus, Rapid 7, Armis – other similar … VulnerabilityManagement Optimisation platforms also considered) In addition you must have Prior experience in Security Engineering and track record in carrying out technical security risk assessments. Good understanding for how to assess third-party suppliers of cloud/SaaS based technology platforms. Experience in vulnerabilitymanagement optimisation (e.g., Kenna. VM/Cisco VulnerabilityManagement, Nucleus, Rapid 7, Armis – other similar VulnerabilityManagement Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (i.e., Security Analysis, Penetration Testing, Malware Analysis, Digital more »
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerabilitymanagement A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerabilitymanagement strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate … with IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed more »
changing environments Demonstrable experience SIEM & Network technologies using Sentinel. Detailed experience of log analysis including KQL and SQL queries. An understanding of Threat and Vulnerability Management. Experience with Defender XDR, Defender Endpoint Identity, Defender for Cloud and Cloud Apps. Strong understanding of Azure and M365 Security. Experienced with either more »
. Ability to develop and implement strategies for compliance with data protection regulations. Knowledge and experience in security technologies such as EDR, SIEM, and VulnerabilityManagement is a plus. Relevant security certifications (CISSP, GCIA, CISM, etc.) and/or product certifications (Azure, Windows, AD, etc.) are desirable. This more »
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) VulnerabilityManagement and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerabilitymanagement You will advise on Security best practices, and act more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »
in support of C&A/A& and ICD-503, NIST 800-53 security controls mappings, reporting of FISMA and reporting of Information Assurance Vulnerability Alerts (IAVA)/Intelligence Community Vulnerability Alerts (ICVA). Monitor and report on integrating and testing features and functions within the A&A … Management solution. This includes, but may not be limited to, DoD 8500.2, and NIST 800-53 Security Controls mappings; implementing updates business processes, workflow, and templates; and direct support to the government customer Handle information system Assessment and Authorizations (A&A) as well as Continuous Monitoring (ConMon) tasks. Prepare … Collaborate with cross-functional team to implement security controls and measures and provide technical guidance to team members on security-related issues. Conduct Configuration Management (CM) tasks to ensure all associated hardware, software, and security relevant functions are maintained and documented. Review system vulnerability scans, verify implementation of more »