Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Last Mile Infrastructure Limited
youll lead and develop a team of security professionals, oversee the delivery and ongoing management of our security infrastructure, and act as the go-to technical expert in threat detection, incident response, and vulnerability management. Were looking for someone with strong leadership skills, a deep knowledge of the cyber security landscape, and a real passion for safeguarding digital assets. … of experience in a hands-on cyber security role, with a proven track record of leading and mentoring a team. Extensive experience with security technologies such as SIEM, firewalls, intrusiondetection/prevention systems, and vulnerability scanning tools. In-depth knowledge of incident response procedures, threat hunting, and forensic investigation techniques. Strong understanding of networking protocols, operating systems More ❯
of the Programme. Overseeing cyber security operations and control position for Transmission systems and assets working with system and service owners including network security, vulnerability management, identity management and detection and response. Perform business unit testing to identify control issues and work with owners to drive control improvement. Work with peer Heads of Cyber Security to align and challenge … and service delivery. Proficiency in OT cybersecurity, including relating to Industrial Control Systems (ICS) and Supervisory Control and Data Acquisition (SCADA) security including experience with security systems like firewalls, intrusiondetection systems, anti-virus software, authentication systems, log management, and content filtering. Strong ability to convey complex information risk and security issues in a manner that is easily More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
the security team to ensure adequate resource availability. Maintains awareness of industry best practices and applies them to organisational security policies. Implements and monitors security systems such as firewalls, intrusiondetection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetration More ❯