Keighley, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Corriculo Ltd
Project Manager, Network Infrastructure Installation and Security, COR5686 An exceptional opportunity awaits an experienced and technically proficient Network Infrastructure Project Manager to join a rapidly expanding company. The successful candidate will primarily work remotely, with occasional on-site requirements at the Head Office or customer locations. The … Role As the Network Infrastructure Project Manager, you'll be pivotal in managing diverse projects revolving around physical cabling infrastructure, network infrastructure, and networksecurity for clients. Prior experience as a Project Manager on large-scale projects focusing on cabling infrastructure is crucial. Ideally, you'll … critical infrastructure solutions. Our clientele includes organizations operating in essential sectors such as energy, telecommunications, and transportation. What's Required? Commercial experience as a Network Infrastructure Project Manager, with a focus on physical infrastructure installation and large-scale network installation or upgrades Proven track record in managing large more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
BluetownOnline Ltd
companies. We support their IT so they can keep the UK safe. About the Role: Our projects include: On and Offshore renewables Cabling infrastructure Network infrastructure Networksecurity CCTV/ANPR camera estates Our customers in these sectors are demanding - the work they do is mission critical … at a large scale) Infrastructure project management experience Proven hands on technical background Excellent project management reporting experience High on-site Health & Safety and Security Awareness A high level of computer literacy with advanced MS Excel and MS Project skills Experience/certification of following established project management methodologies … such as Prince2 Role Requirements: Full UK driving license The ability to achieve Security clearance (to NPPV3 SC) Home based role with occasional need to work out of our Steeton (West Yorkshire) HQ and customer sites Prepared to work some evenings and weekends as the project demands What We more »
a severe skills shortage in the market, the UK government is supporting individuals to get fully funded training to start a career in cyber security . We will provide entry level training and employability support for individuals who are keen to start a career in this industry. All training … to 17:30, Monday to Fridays The course starts on 4th Dec, 18th Dec 2023 You will learn: L2 TLM Accredited Certificate in Cyber Security and Digital Forensics - Learn the core principles of cybersecurity, networking, online threats and deploying security tools to defend an online system L2 in … Cyber Security - Learn what cybercrime is and the methods that can be used to prevent it. The importance of codes of conduct within the industry and the legislation that applies to cybersecurity Certificate in Securing Employment L1 - Learners will take a deep dive into the activities, attitudes and research more »
PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee, your … professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including networksecurity, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee, your … professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including networksecurity, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee, your … professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including networksecurity, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee, your … professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including networksecurity, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
PROVIDE FULL TRAINING AT NO COST. Overview We have a pool of companies who are looking to employ someone for the role of Cyber Security Trainee. The candidate does NOT need to have any prior experience since all the necessary training will be provided for FREE . The Training … All training is included and is funded by the UK Government and will be delivered online over 16 weeks. Level 2 "Principles of Cyber Security" course 16 weeks ONLINE self-paced course Our tutor will support you along the way The Role As a Cyber Security Trainee, your … professionals in the field to mitigate risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including networksecurity, threat intelligence, vulnerability management, incident response as well as assisting with the implementation of security policies. Furthermore, you more »
Leeds, England, United Kingdom Hybrid / WFH Options
Senitor Associates
centralised and distributed technology. all technology domains, components and services are secure and operated securely. Skills/Experience required: Cloud infrastructure including compute, storage, network & security services, (SaaS/PaaS/IaaS) Server, storage & networking hardware Virtualisation Virtual Desktop Technologies Cloud technologies (Azure) Backup, Recovery & Disaster Recovery (VMware … VEEAM, etc) WAN, LAN DNS Network & information security Microsoft Server Operating Systems Microsoft Active Directory, Federated Services, Azure AD Linux skills an advantage This is an excellent opportunity for an enthusiastic and passionate 2nd/3rd Line infrastructure engineer to join a successful organisation. Interviews are being arranged more »
Job Title: Senior Security Operations Center (SOC) Analyst Location: Leeds, UK Employment Type: Permanent Salary: Up to £75,000 per annum + Benefits Company Overview: Join a leading defense organization dedicated to safeguarding the United Kingdom against cyber threats. As part of a dynamic team based in Leeds, you … Analyst, you will operate across 1st, 2nd, and 3rd line support, providing expertise and leadership to enhance our cyber defense capabilities. Key Responsibilities: Monitor security alerts and events to identify potential threats and vulnerabilities. Conduct in-depth analysis of security incidents, determining their impact and appropriate response. Coordinate … with internal stakeholders and external partners to mitigate security risks effectively. Develop and maintain SOC procedures, documentation, and playbooks for incident response. Mentor junior SOC analysts and provide technical guidance on complex security issues. Continuously assess and improve SOC processes and technologies to enhance threat detection and response more »
Our Client Our client support high-security sectors that rely on technology for critical operations such as Energy, Police, and Critical National Infrastructure. Located in West Yorkshire, their office provides a hub for collaboration. Some travel to the office may be required based on project needs. The Role As … the client base expands, they are seeking a dedicated IT Project Manager to oversee initiatives within the Utilities sector. From bolstering networksecurity to optimizing CCTV camera estates, our projects span diverse domains including data center infrastructure, door entry systems, ANPR camera estates, and offshore panel manufacturing. Working … in project inception, scoping, and execution, ensuring timely delivery, adherence to budget, and surpassing customer expectations. Projects include: • On and Offshore renewables. • Cabling infrastructure. • Network infrastructure. • Network security. • CCTV/ANPR camera estates. What are we looking for? With a hands on background in IT infrastructure installation, i.e. more »
diagnostic programs, isolating problems, and determining and implementing solutions. Your day to day responsibilities will include: Providing desktop support, including troubleshooting hardware, software, and network issues. Responding to support requests and incidents through ticketing systems, email, and phone calls. Setting up, configure, and maintaining PC's, laptop's, peripherals … tech products. Ability to diagnose and resolve technical issues proficiently. Experience with Windows and MacOS environments, Microsoft Office applications, and Active Directory. Knowledge of networksecurity practices and anti-virus programs. Excellent problem-solving and communication skills. A customer-oriented attitude with a passion for delivering exceptional service. more »
and other Subject Matter Experts Be a great collaborator across internal, external, and 3rd party teams Drive best-in-class approaches to automation and security Have the ability to provide education and mentorship covering cloud engineering topics to support different teams on those topics, and drive upskilling Be an … GCP Networking, GCP Databases, GCP API Management (APIgee), GCP Serverless (certifications in areas of specialism are desirable or significant experience). Strong experience of security configuration management via guardrails (Inspec, Org Policy, GCP Policy, OPA) Strong experience of writing and contributing Terraform to curate cloud infrastructure for enterprise. Python … experience of delivering systems based on them. Experience of building DevSecOps approach to infrastructure as code and application CI/CD Understanding of cloud security best practises and principles for enterprise Usage of enterprise Secret Management solutions including GCP Key Vault and Hashicorp Vault Appreciation of networksecuritymore »