investigate security incidents to determine their root causes - Contribute to the automation and enhancement of security processes and technologies - Implement and maintain robust configuration management practices for IT environment stability - Conduct supplier assurance activities to ensure vendor security compliance - Establish and enforce governance processes for IT security compliance Essential … Requirements: 5 years of relevant experience in information security management activities Strong experience with Microsoft Security Suite products, including Azure, Sentinel, and Defender Proficiency in Microsoft 365 and Azure services such as Entra ID, Conditional Access, Enterprise Apps, App Registrations, Identity Protection, Privileged Identity Management, Identity Governance, Azure … Infrastructure, Entra Connect, Intune etc Experience with firewalls, SIEM, EDR, IDS/IPS concepts, email security, vulnerabilitymanagement Understanding of common industry standards and frameworks ie NIST, ISO 27001 etc Microsoft Security Operations Analyst certification is essential Reperio Human Capital acts as an Employment Agency and an Employment more »
providing input into the uplift of sensory tools, detection tuning, and access to data sources to increase detection effectiveness. Convey complicated technical analysis to management via investigation synopses, graphical depictions of attacks, and comprehensive presentations. Act as a liaison to stakeholders, including those outside of the technology team(s … the relevant protective and detective security measures. Report the status of ongoing incidents, as well as the follow-up actions for resolved incidents to management Support Compliance, regulatory, or litigation related investigations by coordinating e-discovery, evidence collection and other such activities. Communicating status and risks in a succinct … direct and open manner for proper issue management life cycle tracking. Drafting responses to requests for information from regulators in the jurisdictions in which the bank operates Coordinating engagements with regulators, including periodic reporting, preparation of presentations and written deliverables Conducting analysis to identify potential gaps and issues from more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerabilitymanagement and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerabilitymanagement and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and more »
members of the team and fulfil this opportunity? Responsibilities: Provide support and consultation across all elements of Cyber Security including Threat intelligence, cyber risk management, security operations, data loss and fraud preventions, IDAM, vulnerabilitymanagement and more. Arrange materials for the Cyber Risk and Information Security committee … and manage the Security operations - KPIs/KRIs, threat analysis, ensuring quality of security control operations, develop security tooling etc. Responsible for the risk management and Governance Develop the NIST-based Cyber Security framework to recognise key risks, mitigations, and improvements to the security posture. Conduct risk assessments Required more »
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerabilitymanagement tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
Llantwit Major, Vale of Glamorgan, South Glamorgan, United Kingdom Hybrid / WFH Options
Artis Recruitment
technologies that will effectively and efficiently meet our clients security requirements. Manage annual PEN test and subsequent remediations. Manage improvements highlighted in 3rd party vulnerability scans. Monitor the systems and respond to any potential cyber issues, acting as a point of escalation for the ICT team. Monitor of network … operational needs of the business. Required Background: Proven track record and experience in a similar cyber security role. Experience of working with cyber defence vulnerabilitymanagement/threat detection platforms. Experience/understanding of how technology can be leveraged to support data management practices. Broad understanding of … including Microsoft Azure cloud services, hybrid cloud environments, LAN/WAN networking and BCP/DR. Solid understanding of security, risk, compliance, and data management frameworks such as ISO27001, Cyber Essentials, NIST, TOGAF, COBIT, MITRE ATT&CK. Understanding of secure by design principles. Ability to travel between sites and more »
be responsible for researching, supporting and configuring to analyse security risks and ensure security policies are in place and being followed. The Role: Handling vulnerabilitymanagement tools, creating reports for fixing issues, and prioritising actions. Investigating incidents and trends, as well as identifying threats using SIEM tools like … Splunk and Microsoft Sentinel. Using IT Service Management tools to classify cyber incidents and analyse trends for management reports. The Candidate: Working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus Experience of public cloud infrastructure and cloud delivery models more »
security within a fast-paced environment and may be involved in SOX control responsibilities. Day to Day of the role: Assist with security incident management and response activities. Manage and respond to security alerts from systems and end-users. Perform security checks, reconciliation, compliance checks, and investigate exceptions. Complete … information security standards such as Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. Proficiency in Microsoft O365 Security solutions, Networking, Security operations, VulnerabilityManagement, and Security Auditing. Experience in security testing, vulnerability scanning, and risk management. Ability to create formal documents such as reports or more »
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerabilitymanagement processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Primary Responsibilities: The ISSO's primary duties will consist of: Meeting regulatory and non-regulatory compliance requirements for systems supported on the TF2200 contract. Management and enforcement of information security policies, conducting security and risk assessments using security frameworks (e.g., NIST, RMF, Common Criteria, etc.), mitigating risk via security … controls, vulnerabilitymanagement (scanning, assessment, reporting, and mitigation verification). Protection of information and maintain security controls for TF2200 systems in order to reduce risk. Support IA continuous monitoring tasks (auditing, security patching, scanning) to ensure compliance with security policies and procedures. Respond to and perform IT troubleshooting … of TF2200 systems as required. Assist with maintaining the security posture of TF2200 systems by performing regular cybersecurity updates to systems. Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE). Perform in-office IT tasks as more »
Primary Responsibilities: The ISSO's primary duties will consist of: Meeting regulatory and non-regulatory compliance requirements for systems supported on the TF2200 contract. Management and enforcement of information security policies, conducting security and risk assessments using security frameworks (e.g., NIST, RMF, Common Criteria, etc.), mitigating risk via security … controls, vulnerabilitymanagement (scanning, assessment, reporting, and mitigation verification). Protection of information and maintain security controls for TF2200 systems in order to reduce risk. Support IA continuous monitoring tasks (auditing, security patching, scanning) to ensure compliance with security policies and procedures. Respond to and perform IT troubleshooting … of TF2200 systems as required. Assist with maintaining the security posture of TF2200 systems by performing regular cybersecurity updates to systems. Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE). Perform in-office IT tasks as more »
Primary Responsibilities: The ISSO's primary duties will consist of: Meeting regulatory and non-regulatory compliance requirements for systems supported on the TF2200 contract. Management and enforcement of information security policies, conducting security and risk assessments using security frameworks (e.g., NIST, RMF, Common Criteria, etc.), mitigating risk via security … controls, vulnerabilitymanagement (scanning, assessment, reporting, and mitigation verification). Protection of information and maintain security controls for TF2200 systems in order to reduce risk. Support IA continuous monitoring tasks (auditing, security patching, scanning) to ensure compliance with security policies and procedures. Respond to and perform IT troubleshooting … of TF2200 systems as required. Assist with maintaining the security posture of TF2200 systems by performing regular cybersecurity updates to systems. Support the Risk Management Framework (RMF) authorization process to include developing and maintaining artifacts for the IS Body of Evidence (BoE). Perform in-office IT tasks as more »
infrastructure. * Familiarity with enterprise information security standards: Cyber Essentials, ISO 27001, 27002, Data Protection Act, GDPR. * Proficiency in Microsoft O365 Security, Networking, Security operations, VulnerabilityManagement, and Security Auditing. * Strong understanding of security testing principles, including hands-on experience in vulnerability scanning, risk identification, resolution, and reporting. more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »
the following skills and experience; - Strong understanding of networking, operating systems and cyber security concepts - Strong knowledge of security pactices such as IAM, SIEM, Vulnerabilitymanagement, Malware protection and Back up and Recovery - Strong experience with Microsoft security products such as Defender and Sentinel. - Experience mentoring teams or more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
duties as assigned. • Ability to work on a shift basis including weekends and evenings. Skills Theoretical knowledge of security toolsets such as SIEM, IDS, VulnerabilityManagement, Availability Monitoring and other threat detection technologies. · Pre-existing knowledge of common network protocols. · Pre-existing knowledge of Windows and Linux based more »
to head up their 7 man dedicated unix estate. This is a seriously interesting role to have a fine blend of both technical and management split, spearheading a team of genuine SME's. This is a great opportunity for someone who has previous experience leading a team or been … You will also be able to get your hands on industry leading tools such as RedHat Servers and help pioneer a new dedicated threat management pillar in the financial space. Responsibilities Leading a team of 7, you will be in charge of the day to day management of … the team and patch vulnerabilities in both the Linux and Windows Servers. Communicate with senior stakeholder management, Identifying where and why vulnerbailtiies are occurring. Creation of new and current IT processes and procedures to improve the service operation and transition lifecycle phases. Requirements Experience with vulnerabilitymanagementmore »
changing environments Demonstrable experience SIEM & Network technologies using Sentinel. Detailed experience of log analysis including KQL and SQL queries. An understanding of Threat and Vulnerability Management. Experience with Defender XDR, Defender Endpoint Identity, Defender for Cloud and Cloud Apps. Strong understanding of Azure and M365 Security. Experienced with either more »
to ensure the implementation of security processes aligns KPMG’s security frameworks, policies, standards, whilst collaborating with other security teams in areas such as vulnerabilitymanagement, and incident management. In this delivery-focused Security Engineer role, you will have the exciting opportunity to manage multiple workstreams simultaneously. Your … doing? Develop, document, and maintain Platform security processes and plans per KPMG’s trust and verify framework. Support in the development/design and management of Product/Platform security processes and automated tooling that prevent security issues. Lead on threat modelling exercises for our products. Perform security-focused … code reviews. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and risks raised by the SOC. What will you need to do it? Excellent understanding of security controls within Azure environments Previous more »
tech teams to ensure Security best practice is followed and compliance is met Push Security framework maturity Deliver projects to improve Security compliance Conduct vulnerability scans/reviews and schedule pen tests Provide an understanding of Security tools (SIEM, EDR, IAM, Network devices etc) Handle and investigate incidents Conduct … internal & external Security assurance reviews What skills do you need as an Information Security Manager? People management ISO27001 NIST Cloud Security principles, controls and tools experience Vulnerabilitymanagement expertise Experience with Security tooling Managing, implementing and reporting on Security frameworks Security related degree or relevant certifications Experience more »
a completely cloud environment and the continued enhancement of workplace technology. Working directly with Windows 10/11, laptop devices, Intune, PowerShell, Azure, and vulnerability management. Experience required: PowerShell scripting from scratch Microsoft Azure Azure AD Background in infrastructure Hands on experience with Intune Device Management and User … support Windows 10/11 Desirable but not required: SCCM MDM VulnerabilityManagement Please apply directly and we will be in touch to provide further information more »
departments and serving as a strategic advisor, playing a pivotal role in safeguarding our digital infrastructure and navigating complex security challenges. Key Responsibilities: System VulnerabilityManagement Lead the charge in identifying and mitigating system vulnerabilities. This involves continuous monitoring of our IT landscape, implementing effective patches, and configuring … systems to enhance their security posture against evolving threats. Develop, implement, and monitor a strategic, comprehensive enterprise cybersecurity and IT risk management program. Compliance and Standards Adherence Ensure our international IT operations are in strict adherence to SOC2 and GDPR compliance. Work in collaboration with the Compliance, Legal, and … Information Systems, Computer Science, or a related field a plus. About us: Loftware is the world’s largest cloud-based Enterprise Labeling and Artwork Management provider, offering an end-to-end labeling solution platform for companies of all sizes. Maintaining a global presence with offices in US, UK, Germany more »
SW9, Oval, Greater London, United Kingdom Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerabilitymanagement and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »