Stevenage, Hertfordshire, United Kingdom Hybrid / WFH Options
GlaxoSmithKline
offers a hybrid working model, empowering you to find the optimal balance between remote and in-office work. R&D OperationalTechnology (OT) Network Security Engineer Within R&D Digital & Tech we are looking for an OperationalTechnology (OT) Network Security Engineer who will oversee networks … used for R&D operations and have the necessary operational knowledge to specify network changes, assuring continued network availability. The OT Network Security Engineer will support Site Focal Point with technical insight necessary for secure file management according to policies and have a role in new system implementation and … incident response. It is key for the OT Network Security Engineer to have in-depth understanding of network architecture to design, implement, and manage secure and efficient networks and proficiency with cybersecurity tools (e.g., firewalls, intrusion detection/prevention systems) and techniques to protect network integrity and respond to security More ❯
Huntingdon, England, United Kingdom Hybrid / WFH Options
Anglian Water Services
additional flexible benefits to suit you. We are looking for a proactive, self-motivated and enthusiastic individual to join our OperationalTechnology (OT) team on a permanent basis. Our goal is to exceed customer expectations whilst embracing new technology to drive digital transformation; better connecting our customers … the mentorship of our Senior Engineers and technical experts. More about our team and what we will need from you... OperationalTechnology (OT) refers to the set of digital assets which are at the very heart of Anglian Waters industrial operations. Operationaltechnology systems are deployed … distribution processes. The demand for OperationalTechnology solutions within the Water sector is soaring due to the opportunities associated with IT/OT integration and Industry 4.0 applications. It is recognised that OT is key in enabling us to achieve our performance commitments (including reduction in leakage and More ❯
Project Engineer (Water Industry) Salary: Competitive plus benefits Hours: 37 hours per week Location: Cambridge (travel required) Join our innovative OperationalTechnology (OT) team as a Project Engineer and play a vital role in delivering cutting-edge Instrumentation, Control, and Automation (ICA) projects across South Staffs Water and … manage a Supporting Operations Technician in the Cambridge region, driving effective on-site support for maintenance and operations. If you are passionate about leveraging technology to enhance operational efficiency and thrive in a dynamic environment, this is your opportunity to make a meaningful impact! About Us At South … our customers with high-quality water, exceptional service, and great value for money. The Role Working as part of the OperationalTechnology (OT) department, the Project Engineer will support the organisation with the delivery of ICA/ICS projects across water production, distribution, and storage facilities. The role More ❯
Basildon, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
ambitious growth plans for 2025 and beyond, they are looking to add Security Analyst to their team that can work with clients on managing OperationalTechnology Risk. This can be a home-based role anywhere in the … UK. This will require someone with extensive knowledge of the Microsoft Security stack with an interest in Cyber Security in OperationalTechnology (OT) environments. Position Responsible for detecting, analysing and responding to security incidents through to resolution. Providing support on baseline security analysis in OT projects. Manage operational … Requirements Proven experience with Microsoft Sentinel, Defender for Endpoint, Defender for Identity KQL experience In depth understanding of PCAP analysis using Wireshark or equivalent. OT operations/security (optional, but a bonus) #J-18808-Ljbffr More ❯
Water Industry) Salary: Competitive plus benefits Hours: 37 hours per week Location: Cambridge (travel required) Role Overview Join our innovative OperationalTechnology (OT) team as a Project Engineer and play a vital role in delivering cutting-edge Instrumentation, Control, and Automation (ICA) projects across South Staffs Water and … safety standards. You will also manage a Supporting Operations Technician in the Cambridge region, supporting maintenance and operations. If you are passionate about leveraging technology to enhance operational efficiency and thrive in a dynamic environment, this is your opportunity to make a meaningful impact! About Us At South … or similar sector. Knowledge of PLC, SCADA, telemetry, and control systems. Understanding of health and safety regulations, including CDM. Experience managing technical staff or operational support is advantageous. Skills and Competencies Strong project management and organizational skills. High technical knowledge in ICA, automation, and electrical systems. Leadership and team More ❯
technical acumen, to help the business implement and run a new IT risk management framework. This is a multi-faceted role supporting both a Technology Transformation Programme as well as maintaining oversight over current operationaltechnology and applications. Assist the implementation of risk identification control strategies; this … risks, which includes working with Legal and Compliance teams to monitor regulatory changes; Manage changes to a risk taxonomy and reference library to support technology risk identification and assessment. 2. Risk and event analysis Review, triage and analyse internal and external technology issues and risk events, and provide … to support continuous organisational learning and improvements; Assist change reviews, periodic Risk Control Self-Assessment exercises, control testing and thematic deep dives and analyse technology issues and risks; Support the Third Party Risk & Assurance Specialist with vendor risk assessments, controls assurance and compliance attestations for the clients and other More ❯
technical acumen, to help the business implement and run a new IT risk management framework. This is a multi-faceted role supporting both a Technology Transformation Programme as well as maintaining oversight over current operationaltechnology and applications. Assist the implementation of risk identification control strategies; this … risks, which includes working with Legal and Compliance teams to monitor regulatory changes; Manage changes to a risk taxonomy and reference library to support technology risk identification and assessment. 2. Risk and event analysis Review, triage and analyse internal and external technology issues and risk events, and provide … to support continuous organisational learning and improvements; Assist change reviews, periodic Risk Control Self-Assessment exercises, control testing and thematic deep dives and analyse technology issues and risks; Support the Third Party Risk & Assurance Specialist with vendor risk assessments, controls assurance and compliance attestations for the clients and other More ❯
technical acumen, to help the business implement and run a new IT risk management framework. This is a multi-faceted role supporting both a Technology Transformation Programme as well as maintaining oversight over current operationaltechnology and applications. Assist the implementation of risk identification control strategies; this … risks, which includes working with Legal and Compliance teams to monitor regulatory changes; Manage changes to a risk taxonomy and reference library to support technology risk identification and assessment. 2. Risk and event analysis Review, triage and analyse internal and external technology issues and risk events, and provide … to support continuous organisational learning and improvements; Assist change reviews, periodic Risk Control Self-Assessment exercises, control testing and thematic deep dives and analyse technology issues and risks; Support the Third Party Risk & Assurance Specialist with vendor risk assessments, controls assurance and compliance attestations for the clients and other More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) #J-18808-Ljbffr More ❯
monthly. Deploy new information security tools, services, processes, and procedures to support the information security roadmap. Support information security services including SIEM, MDR, endpoint technology, secure email gateway, cloud security, certificate management, network security, and vulnerability management. Respond to critical incidents in a timely manner in partnership with security … etc. Qualifications & Experience: Bachelor’s degree; Preferred Management Information Systems, Computer Science, Engineering, or related discipline. 5-10 years of information security and information technology desired Strong communications skills; written and verbal. Industry security certifications preferred; CISSP, CompTIA +, CEH, SSCP, Security +, etc. Must have a solid understanding … Log Management, Patch Management, Vulnerability Management, eDiscovery, Cloud Security, Virtual Machine Security, Wireless and Mobile Security, and Industrial Controls/OperationalTechnology (OT) Please note that if you are NOT a passport holder of the country for the vacancy you might need a work permit. Check our Blog More ❯
procedures and technical acumen, to help the business implement and run a new IT risk management framework. This is a role supporting both a Technology Transformation Programme and current operationaltechnology and applications. Assist in implementing risk identification control strategies, working with multiple teams to create learning … and emerging risks, working with Legal and Compliance teams to monitor regulatory changes; Manage changes to a risk taxonomy and reference library to support technology risk identification and assessment. Risk and event analysis Review, triage, and analyze internal and external technology issues and risk events, updating a knowledge … base for organizational learning; Assist with change reviews, Risk Control Self-Assessment exercises, control testing, and deep dives, analyzing technology issues and risks; Support vendor risk assessments, controls assurance, and compliance attestations with the Third Party Risk & Assurance Specialist. Risk controls and management Assist in developing the technologyMore ❯
technical acumen, to help the business implement and run a new IT risk management framework. This is a multi-faceted role supporting both a Technology Transformation Programme as well as maintaining oversight over current operationaltechnology and applications. Assist the implementation of risk identification control strategies; this … risks, which includes working with Legal and Compliance teams to monitor regulatory changes; Manage changes to a risk taxonomy and reference library to support technology risk identification and assessment. Risk and event analysis Review, triage, and analyze internal and external technology issues and risk events, and provide updates … base to support continuous organizational learning and improvements; Assist change reviews, periodic Risk Control Self-Assessment exercises, control testing, and thematic deep dives, analyzing technology issues and risks; Support the Third Party Risk & Assurance Specialist with vendor risk assessments, controls assurance, and compliance attestations for clients and third parties. More ❯
individual with attention to detail, procedures, and technical skills to help implement and manage a new IT risk management framework. This role supports a Technology Transformation Programme and oversees current operationaltechnology and applications. Responsibilities include: Risk identification and control strategies: Collaborate with teams to develop learning … Horizon scanning: Monitor regulatory changes with Legal and Compliance teams to identify emerging risks. Risk taxonomy management: Update and maintain risk reference libraries for technology risk assessment. Risk and event analysis Review and analyze technology issues and risk events, maintaining a knowledge base for organizational learning. Assist in … deep dives. Support vendor risk assessments and compliance attestations alongside the Third Party Risk & Assurance Specialist. Risk controls and management Develop and maintain the technology governance framework, policies, standards, and procedures. Manage the IT controls library, review change requests, and analyze control performance. Support GRC platform operations, including writing More ❯
eye for detail, procedures and technical acumen, to help the business implement and run a new IT risk management framework. This role supports a Technology Transformation Programme and maintains oversight over current operationaltechnology and applications. Assist in implementing risk identification control strategies, working with multiple teams … and emerging risks, working with Legal and Compliance teams to monitor regulatory changes. Manage changes to a risk taxonomy and reference library to support technology risk identification and assessment. 2. Risk and event analysis Review, triage, and analyze internal and external technology issues and risk events, providing updates … dives. Support vendor risk assessments, controls assurance, and compliance attestations for clients and third parties. 3. Risk controls and management Assist in developing the technology governance framework and controls reference library, and support policy development. Support management of the IT controls library, including reviewing change requests and analyzing control More ❯
for detail, procedures, and technical acumen, to help the business implement and run a new IT risk management framework. This role supports both a Technology Transformation Programme and current operationaltechnology and applications. Responsibilities: Risk Identification and Control: Assist in implementing risk control strategies, create learning materials … and templates, facilitate workshops, and support horizon scanning exercises with Legal and Compliance teams. Risk and Event Analysis: Review and analyze technology issues and risk events, support risk assessments, control testing, and vendor risk assessments. Risk Controls and Management: Develop and maintain the technology governance framework, policies, standards … audits and certifications. Reporting & Documentation: Prepare reports, maintain documentation, develop risk visualizations, and support learning and awareness campaigns. Qualifications and Skills: Experience with enterprise technology services, ITIL, and asset management. Understanding of enterprise IT environments, including cloud, cybersecurity, and applications. Experience deploying and operating IT controls and procedures. Knowledge More ❯