or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerabilitymanagement, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerabilitymanagement, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerabilitymanagement, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
or US Person with the ability to obtain a Public Trust Clearance. Responsibilities: Lead a team of security engineers for delivery of Cybersecurity project management, continuous diagnostics and mitigation, threat mitigation and incident response, security architecture support, critical infrastructure protection, patch management, vulnerabilitymanagement, risk management … IDS), Network Access Control (NAC), Domain Name Systems (DNS), Remote Access VPN (RA-VPN), Application Delivery/Load Balancing, Secure Sockets Layer (SSL) Certificate Management solutions Lead implementation of new security projects including estimation, design, development, testing and deployment and track status throughout Support operations team with cybersecurity guidance … capabilities Demonstrated experience working in large Federal agency preferably in HHS. Possess the knowledge of security best practices, security solutions, and methodologies for risk management Demonstrated understanding of the life cycle of cybersecurity threats, attacks, attack vectors and methods of exploitation with an understanding of intrusion set tactics, techniques more »
Threat & Vulnerability Manager London – Hybrid Salary: DoE Gresham Hunt is currently partnered with a leading financial services client in the search for an experienced VulnerabilityManagement professional for their London based team. This is an exciting opportunity to help drive the vulnerabilitymanagement programme as … part of the global technology team. The successful candidate will have: 8 years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance … frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and other standards/frameworks relevant to application security and vulnerability management. Experience with cloud technologies, preferably Azure and AWS. Familiarity with security methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell more »
VulnerabilityManagement Internal : Operations (metrics, ID & triage/resolution initiation, patching, hardening, verification scans, maintenance, changes) VulnerabilityManagement External : Operations (metrics. ID & triage/resolution initiation. Track internet endpoints/DNS be this TSB or 3rd party hosted) One FTE as a hands-on engineer LA more »
clearance Willingness to be on-site in Corsham 5 days per week Experience required: SOC transformations and operations Developing security operation processes and procedures VulnerabilityManagement - using Tripwire and Tanium Incident Management - using DCC and Elastic Stack Endpoint security - using vSphere, SolarWinds, Trend Intelligence Driven Defence, Cyber … CONSULTANT/CYBER SECURITY/LEAD/LEAD CONSULTANT/LEAD CYBER CONSULTANT/LEAD CYBER SECURITY CONSULTANT/SOC/SOC OPERATIONS/VULNERABILITYMANAGEMENT/INCIDENT MANAGEMENT/NIST/ENDPOINT SECURITY/CORSHAM/BRISTOL/SOUTHWEST/DV/DV CLEARED/DV more »
operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerabilitymanagement activities, collaborating with the vulnerabilitymanagement team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. more »
be leading 5 to 10 VAT members, perform research on current threats and vulnerabilities, will be responsible for authoring security advisories and manage enterprise vulnerability compliance and will conduct vulnerability assessments of IT systems. The VAT Lead will be assisting the government with the Enterprise Information System VulnerabilityManagement (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: BS degree Science, Technology, Engineering, Math or … experience may be considered in lieu of a degree. Relevant experience is within one of the following areas pentesting, security technical assessments or supporting vulnerability scanning/management program. Experience managing teams Experience with vulnerability analysis Ability to identify false positives within scan results and work with more »
to ensure staff are aware of their responsibilities and can act in a manner that minimizes risk to the organization. Regularly report to senior management about the status of the organization's security posture, regulatory compliance status, audit findings, and any other security-related issues and plans. Regularly review … in the decision-making process to obtain needed information, make the most appropriate decisions, and ensure buy-in and understanding of resulting decisions. Task Management Skills: The candidate is expected to proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, and … Publication (SP) 800-53, Revision 4 or Revision 5 Demonstrated success in achieving project completion in a timely manner. This includes having effective project management skills and correctly assessing the time required to carry out given tasks. Experience using Cyber Security relevant tools, systems, and applications to include but more »
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Planet Recruitment
installation and configuration of hardware, applications, and software as part of Privacy by Design and Default. Manage and coordinate operational components of security incident management, including detection response and reporting. Manage the day-to-day activities of threat and vulnerabilitymanagement, identify risk tolerances, recommend treatment plans … and audit requirements. Review, escalate and action any unusual event behaviour identified through the groups information security systems. Create standards in system hardening, change management, documentation. Perform periodic firewall Ensure disaster recovery and data restoration processes work. Ensure appropriate Corrective and Preventative Actions are implemented in line with best … in broad domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, storage and backups, and related monitoring and management systems. Demonstrable experience of applying security controls in one or more of the following areas: Unix/Linux Servers, Windows servers, firewalls, IDS/ more »
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, VulnerabilityManagement, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, VulnerabilityManagement, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA's … Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/design/decision templates … or difficult it will be to exploit these vulnerabilities. Must be well versed in the application of security policies and standards, governance, compliance, risk management and technical assurance practices Must have expertise and experience in one or more of the following technical domains: Cloud/Hybrid security Infrastructure and more »
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as VulnerabilityManagement and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerabilitymanagement tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerabilitymanagement, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
Raleigh, North Carolina, United States Hybrid / WFH Options
First Citizens Bank
installs, and upgrades systems. Resolves complex, escalated technical issues. Responsible for administration, communication, and documentation throughout technical support activities. Manages technical projects and assists management with other business initiatives. System Testing - Leads testing and monitoring activities that ensure all applications dependent on the infrastructure function without issues. Automates tasks … tests to provide continuous monitoring. Designs solutions that address system weaknesses or common issues and oversees their implementation. Data Security - Responsible for the security, management, and recovery of the Bank's distributed data assets. May lead disaster recovery efforts and other initiatives designed to protect the Bank's assets. … related database infrastructure through ongoing research. Communicates effective and clear technical information to associates and management. Serves as a resource to wider business unit, management, and project teams. Vulnerability Assessment: Conducting vulnerability assessments using Qualys tools. Analyzing and interpreting vulnerability data. • Remediation Strategies: Developing and implementing more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials more »
assurance capabilities across various platforms and technologies. • Ensure that the IT estate complies with technical standards and the company policies to safeguard company assets. Management oversees directing the required remediation actions and countermeasures to lessen vulnerabilities and weaknesses that have been identified. • Create and enhance a regular penetration testing … programme for the red and purple teams that are in line with industry cyber threats and primary threat intelligence. • Create a VulnerabilityManagement procedure to guarantee that all security flaws and vulnerabilities that are known to exist are located, evaluated in context, given priority, and tracked for remediation … task requiring cross-partner cooperation at varying degrees of technical security proficiency. • In-depth knowledge and comprehension of operational excellence in programmes related to vulnerabilitymanagement and cloud security posture management. • A working knowledge of compliance and regulatory frameworks, including GDPR, ISA/IEC 62443, ISO/IEC more »
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Gen+
strong technical skills and a great customer service approach. You will have a good understanding of platform operations, integrations and surrounding technology (preferably Learning Management Systems), knowledge around cloud hosting and be able to use SQL to create custom reports. What you will be doing LMS/Platform Administration … monitor school sync systems (Includes Glow/RM and Xporter sync systems) Maintain/Develop the platform staging site for testing, demos, etc. Bug Management – Collate information, document, test and raise bugs with the development partner using Jira Maintain progress Reports for the education team – utilising PowerBI Build light … team around Educational technology, LMS/Platform functionality, accessibility and general technology Prepare reports for CEO, COO and wider Gen+ team IT and Security management Maintain the platform DPIA/Risk Assessment process – feeding into the Risk Register DNS record and certificate management relating to platform Manage GitHub more »
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerabilitymanagement tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Dublin, City of Dublin, Republic of Ireland Hybrid / WFH Options
The Recruitment Company
network issue resolution Contribute to budget development Monitor spending Your Experience: Windows Server (Apply online only), Windows 10/11, Hyper-V, Active Directory Management, Group Policy Management, SCCM, SQL 2016+, Microsoft 365 and Azure platform administration and security, SharePoint, Endpoint Protection Technologies, Network Access Control (NAC) solutions … Backup methodology and management, Check Point firewall Excellent knowledge of and proven experience in best practice Information Security, e.g. Incident Response, Intrusion mgmt., Attack Monitoring, Network mgmt., Threat and VulnerabilityManagement, e.g. SIEM, XDR, Firewall, IPS, NAC, Server config controls Excellent knowledge of and proven experience in … netting, Firewalls, routing protocols, encryption standards Proficient in automation tools including PowerShell, Power Automate, Office apps Excellent knowledge of and proven experience in Data Management - including database technologies and methodologies around implementing data privacy and data encryption Proven experience in liaising with an array of external vendors Strong English more »
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) VulnerabilityManagement and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerabilitymanagement across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »