Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Security Manager to join their fast-paced Operations team on a permanent basis. The Lead IT Security Manager is responsible for is the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. Key focus areas … for this role, the ideal candidate will have experience in each of the below; Threat & VulnerabilityManagement Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to … provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerabilitymanagement (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and compliance of security operations procedures, reviewing more »
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerabilitymanagement tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Crimson
business objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, IT Security Management experience the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response, threat … management, and vulnerabilitymanagement, among other areas. the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. with IT Service Frameworks more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerabilitymanagement, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerabilitymanagement, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
the organizationWork with developers on the InfoSec team to build security automation workflows, enrichments and mitigationsEvaluate SOC policies and procedures and recommend updates to management as appropriateWork with the security engineering team to improve tool usage and workflows, as well mature monitoring and response capabilities.WHAT YOU WILL NEEDExperience working … in cybersecurity operations and incident response, to include utilizing Security Information and Event Management (SIEM) platforms, Intrusion Detection/Prevention Systems (IDS/IPS), and VulnerabilityManagement and Threat Intelligence applications3+ of the following certifications: CEH, CISM, GIAC, GCIH, GCIA, GSLC, GICSP, GSEC, CEH, GWAP, CompTIA Net+ …/EDR, SIEM, IPS/IDS, HIDS/NIDS, Networking, firewalls, WAFs, Edge/endpoint security, DNS security, layered security, defense in depth practices, vulnerability scanning, malware analysis tools, networking tool for full packet analysis, data encryption, data loss prevention, etc.Forensics and/or malware analysis experience is a more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. * Lead reviews of governance practices with appropriate and sufficient independence from management activity. * Develop policies, standards, processes, guidelines for ensuring appropriate security standards are in place and are adhered to. * Ensure architectural security principles are applied … and assessments of product security architectures and designs across a diverse range of complex infrastructure, data and application systems. * Ensure timely and robust incident management resolution, including major incident response coordination and management. * Deputise for the Senior IT Security Manager as and when required. Education, Qualifications & Training * Achieved one … more relevant qualification/certification (i.e. CISSP, CISA, CISM Knowledge & Experience * Expert knowledge of security data tools, information security controls, security best practice and management strategies. * Experience of designing control maturity tests and conducting control maturity assessments. * Experience of overseeing and leading remediation of security assessments, technical testing, and more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »
cyber security architecture. - Deliver subject matter expertise to key stakeholders to drive the implementation of security controls to meet the target architecture. - Accountable for vulnerability scanning, including the prioritisation of unpatched vulnerabilities and reporting against agreed KPIs and KRIs. - Support the annual penetration testing schedule by arranging penetration testing … improvement work to automate and improve critical cyber security processes such as monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerabilitymanagement, cyber incident response, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the … Problem solving skills, and the ability to come up with new solutions to existing challenges. - Strengths in key ‘soft skill’ areas such as relationship management, communication, and presentation of technical security information to a variety of audiences. - Technical skills to investigate potential breaches through existing tools, packet capture and more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Avanti Recruitment
considered Kubernetes – proven production experience, autoscaling, overprovisioning etc. Serverless - Lambda Scripting for automation Good knowledge of Cloud Security – Security hub, guard rails, RBAC, IAM, vulnerabilitymanagement, Patch Management. A Security first mentality to ensure Security is built into all elements of their platforms. Linux Server Administration – Command Line more »
Birmingham, England, United Kingdom Hybrid / WFH Options
Recruit with Purpose
security principles are applied during project design to reduce risk. Education, Qualifications & Experience Required: proficiency in security technologies such as Microsoft XDR stack and vulnerabilitymanagement tools. in SIEMS (Azure Sentinel) and Powershell Automation. exposure to enterprise networking and infrastructure technologies. one of more relevant Cyber Security qualification more »
Birmingham, West Midlands (County), United Kingdom
Computacenter
group, customers and if applicable direct reportsManage and implement projects relevant to specialist areaManages, develops and coaches team of staff and implement s performance management solutions where requiredActing as a point of escalation on complex issues and providing appropriate support to other team membersLiaise with colleagues to ensure best … practice and continual improvement in delivery of service to the businessEstablishes productive relationships and networks at Senior Management level to build and maintain customer relationshipsResponsible for managing budget/P&L to maintain spend in line with budgetary limitationsResponsible for the adoption of CC best practice and service offerings … Orchestration, CI/CD, Testing etc.)An understanding of Agile Delivery (Kanban/SCRUM/XP/Lean/SAFe)An understanding of DevOps Management (JIRA, Confluence)Awareness of CI/CD tooling such as Jenkins, GitLab or similarExperience of Hashicorp TerraformExperience of Hashicorp VaultAwareness of SAST Security Testing more »
to agreed service levels, compliance requirements in line with business needs. Supports shift left initiative – providing supporting documentation for L1 services Provides proactive problem management and engages in continuous improvement. Manages 3rd party warranty contracts and relationships for all end user IT equipment ensuring all incidents be logged with … OKTA, Multi-Factor Authentication Active Directory Services, Group Policy Manager, Enterprise printing and Enterprise Telephony Corporate Security Administration Obligations including AV, VPN, Rapid 7 Vulnerability Mgmt. Mobile device Technologies, Management and encryption, Mobile Iron DESIRABLE ITIL SCRUM RELEVANT CAREER HISTORY/EXPERIENCE NECESSARY TO FULFILL THE JOB ROLE … Demonstrable experience with enterprise class software solutions. DESIRABLE Relevant and most recent professional IT certification is desirable, though not critical. COMPETENCIES (RELATING TO PERFORMANCE MANAGEMENT SCHEME COMPETENCY MODEL) Customer Obsession : With an intense focus on our customers, we will do what is in our power to establish and maintain more »