Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, ThreatManagement, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas … for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to … provide value and reduce risk across proactive monitoring, incident response, threatmanagement and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing more »
you will Provide Security Input for projects in a Digital Transformation Programme as well as establish and maintain cyber security policies and procedures. Own threatmanagement and response. Manage and mentor the cyber security team. Manage Security tooling risks and processes. Own vulnerability management through the whole … infrastructure to identify vulnerabilities and implement necessary improvements. Act as the escalation point on monitoring of corporate environment to identify security issues or incidents (Threat Hunting) Manage and mentor the security analyst, (monitoring, Investigation, root cause analysis of Security alerts from multiple information sources. Including, but not limited to … end users. Perform root cause analysis of security incidents and participate in post-incident reviews to provide practical recommendations for improving the organisation's threat detection and incident response capabilities and overall security posture Perform malware analysis and digital forensics where appropriate Drive internal phishing campaigns (KnowBe4 platform) and more »
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background … in threatmanagement, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive Proficient in more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threatmanagement, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threatmanagement, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
advising staff and 3 rd parties IT Support, administration and monitoring of a Microsoft, Windows and Linux environment Windows and Linux server support MDM management and remote access Provide a knowledge base for IT best practices, information security and date protection Support business application support & software implementations Support and … SEO and advertising Skills & Experience: Microsoft 365 & Azure Windows & Linux servers andservices SharePoint Active Directory & Azure Active Directory Networking including Printing, Wireless, Firewalls, Proxies, ThreatManagement Hyper-V virtualisation Data Storage Web support skills e.g. Websites, Browser services, Web analytics, SEO, Web Apps, SaaS, APIs, CMS, HTML, JavaScript more »
on two new positions. My clients UK SOC is going through a state of transformation and they need someone to help scope and develop threatmanagement as a function. You will be working on nation state threat actors and need to be eligible for or currently hold … candidate should possess a minimum of 2 years of experience in a SOC environment. This role necessitates the ability to Identify, analyze, and mitigate threat intelligence from various sources, underscoring the importance of an understanding of OSINT. Additionally, the Lead role involves additional responsibilities, including direct management of more »
/2012/2016,2019) Experience of Microsoft Office Support and Development, Microsoft 365 and Microsoft SQL In depth knowledge of Anti-virus and ThreatManagement Systems A Level/NVQ/BTEC or equivalent in ICT Systems Support or related field Ability to communicate at all levels more »
/2012/2016,2019) • Experience of Microsoft Office Support and Development, Microsoft 365 and Microsoft SQL • In depth knowledge of Anti-virus and ThreatManagement Systems This comoany offer a 35 hour working week along with great benefits. more »
Architect will join the CRM tech team and be responsible for complex changes and supplier assurance, covering business as usual for Customer Identity Access Management (CIAM), the Customer Data Platform (CDP), and the Customer Engagement Platform (CEP). Role responsibilities: Accountable for publishing and maintaining design artifacts throughout the … such as UML, BPMN, ArchiMate, Essentials Project, and Lucidchart) is a must-have. Background architecture design, with an appreciation for security risk assessment and threatmanagement, is a must-have Experience with technical architectural development, policy, asset management and modeling is a must-have. Experience and/ more »