Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Accenture
Requirements Further education in Computer Science, Telecommunications or Information Security or equivalent work experience. At least 6 years of experience in an information/cybersecurity role focused on security monitoring and analysis. Knowledge of IT security solutions (Security Information and Event Management, Cloud Access Security Broker, Data Leakage Prevention More ❯
and secure cloud-native solutions using technologies such as Kubernetes, Ceph, and associated tooling. Collaborate with cross-functional teams including software engineering, architecture, and cybersecurity to design and implement infrastructure solutions that meet functional and security requirements. Lead or significantly contribute to the automation of infrastructure using modern Infrastructure More ❯
IT systems and planning IT implementation. Strong project management skills Strong understanding of IT infrastructure, systems, and landscapes including Microsoft Server, Hyper-V, M365 & Cybersecurity frameworks such as CIS. Strong understanding of data analysis, hardware/software and statistics. Ability to work with a range of stakeholders throughout the organisation. More ❯
Cheltenham, Gloucestershire, United Kingdom Hybrid / WFH Options
Searchability
Infrastructure as Code, DevOps Tools, IPv4, Containerisation Who We Are? We are seeking a Lead DevOps Engineer to join a globally renowned defence and cybersecurity company in Cheltenham. Our mission is to safeguard the UK through cutting-edge technology, and our teams are at the heart of this effort. More ❯
Value Creation, One Global Network, Respect for the Individual and Integrity. As a team: We are one of the world's leading providers of cybersecurity solutions. You'll work on innovative projects with colleagues to drive collaboration from strategy through to implementation. You will be using the latest technologies with … two years of experience in a similar role desirable. A good understanding of computer networks, operating systems, software, hardware and security. An understanding of cybersecurity risks associated with various technologies and ways to manage them. A good working knowledge of various security technologies such as network and application firewalls … host intrusion prevention and antivirus. Any relevant academic or industry specific training. Set yourself apart: Understanding of basic cybersecurity principles and concepts. Knowledge of common attack vectors and malware types. Awareness of security tools and technologies. Good understanding of incident response principles. Networking fundamentals. Analytical and problem solving skills. What More ❯
Coordinate and prioritize small changes, enhancements, and product upgrades/patching with implementation and engineering teams. • Manage CMDB/ServiceNow product owner responsibilities, including cybersecurity assessments and data classification. • Support L2 and L3 operational activities related to CMMC, disaster recovery, cybersecurity, EVM, and other infrastructure support activities. • Demonstrate business acumen More ❯
The Jr. Cybersecurity Threat Researcher works in the KnowBe4 Threat Research Lab, and is responsible for deploying and configuring various security products and solutions such as endpoint, email, web and network protection. Responsibilities: Assisting in deploying and maintaining cybersecurity products in lab settings. Supporting inventory management of licenses and updates. … Collaborating with team members on cybersecurity projects. Reviewing, understanding and reverse engineering attacks and technologies. Proactively interact and communicate with internal and external stakeholders to drive tactical and strategic direction. Assisting and empowering Sales, Marketing, Product and Engineering with the latest cyber threats and your expertise. Requirements: BS in Computer … Science, Cybersecurity, or related field. Internship experience or up to 1 year of experience in cybersecurity preferred. Basic understanding of IOCs and threat analysis. Familiarity with scripting for task automation. Detail oriented individual that enjoys the challenge of a fast-paced environment. Well versed with IOCs, reverse engineering and threat More ❯