Cyber Threat Jobs in Merton

2 of 2 Cyber Threat Jobs in Merton

Infrastructure Engineering Lead

New Malden, England, United Kingdom
Northrop Grumman UK
all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate security risks, ensuring the environment is protected against potential cyber threats. Cybersecurity & Compliance: Implement and enforce cybersecurity best practices for both IT and OT systems in the development environment. Ensure compliance with defence cybersecurity standards, including securing Windows Server … Reporting: Develop automated solutions for continuous monitoring of IT assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment More ❯
Posted:

Infrastructure Engineering Lead

london (new malden), south east england, united kingdom
Northrop Grumman UK
all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate security risks, ensuring the environment is protected against potential cyber threats. Cybersecurity & Compliance: Implement and enforce cybersecurity best practices for both IT and OT systems in the development environment. Ensure compliance with defence cybersecurity standards, including securing Windows Server … Reporting: Develop automated solutions for continuous monitoring of IT assets, network traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment More ❯
Posted: