Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
vulnerabilities or breaches. Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis More ❯
Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
telephony/contact center platforms, and cloud data services. • Define correlation rules and alerts for proactive incident detection and response. Application Security: • Conduct secure code reviews, threat modelling, and vulnerability assessments. • Work with development and operations teams to integrate security into the SDLC and CI/CD pipelines. More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
encryption. Ensure the security and integrity of the organisation's network infrastructure. Collaborate with various departments to develop and enforce network security policies and procedures. Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. Development of OT security solutions Stay up to date with the latest industry trends and emerging technologies in network security. Provide support More ❯
encryption. Ensure the security and integrity of the organisation’s network infrastructure. Collaborate with various departments to develop and enforce network security policies and procedures. Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. Development of OT security solutions Stay up to date with the latest industry trends and emerging technologies in network security. Provide support More ❯
for a driven technology auditor who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as access management, IT operations, job … scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology consulting or other relevant industry experience Basic understanding of software More ❯
Birmingham, West Midlands, England, United Kingdom
James Andrew Recruitment Solutions (JAR Solutions)
organisation Analyse future AI possibilities to drive operational efficiencies Identify and mitigate emerging technology challenges Security & Compliance: Ensure robust GDPR practices and data protection protocols Manage cybersecurity frameworks and vulnerability assessments Develop and test business continuity and disaster recovery plans Maintain IT policies and procedures for new technologies Operational Excellence: Coordinate with third-party IT providers for seamless service More ❯