was created on January 1, 2019. It is a fully-owned AXA Group subsidiary, providing AXA Group companies the best IT and telecommunications infrastructure management services. While the AXA Group represents 157,000 employees and more than 102 million customers, AXA Group Operations operates from 16 locations across the … that information security across the local entity is relevant and cost-effective. You serve as a senior security expert to Group Operations and to management of the entities in the implementation and maintenance of information security Your Main Tasks: As an Information Security Engineer (m/f/x … in the local Operations Security department, you will focus on various infor-mation security activities with the following main responsibilities: • Operate and maintain vulnerabilitymanagement and policy compliance scanning tool • Perform and improve vulnerabilitymanagement processes as well as ensure remediation and mitigation actions are appropriately more »
operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerabilitymanagement activities, collaborating with the vulnerabilitymanagement team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. more »
configuring SIEM Required qualifications to be successful in this role Track record of moving from project into service delivery Elastic SIEM experience Vmware experience VulnerabilityManagement Tooling #LI-SB2 Together, as owners, lets turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and … and broaden your horizons. Come join our teamone of the largest IT and business consulting services firms in the world. Skills Security Operations Centre VulnerabilityManagement(IAVM) Reference (phone number removed more »
are conducted, and improvements implemented and ensure colleague queries around policies and requirements are appropriately answered in a timely manner. Be responsible for the VulnerabilityManagement process. Act on vulnerability information and conduct Cyber Security risk assessments and work with suppliers, partners, and internal teams to ensure … need: In depth knowledge of Information Security concepts and principles, including cloud security capabilities. Experience with configuring and utilising security tooling, including SIEM, EDR, vulnerability scanners, CASB, network scanning, DLP. Hands-on IT experience with proven expertise in a previous Information Security role. Vendor management experience. A relevant more »
Lead and deliver Cybersecurity work packages on behalf of Synoptix clients or as part of internal delivery programmes. This may include: Development of Security Management Plans Understanding and defining the capability context Performance of Risk Assessments (System Driven or Component Driven) Define and architect of Security Controls Development of … SyOps Development of CoCos VulnerabilityManagement Planning Development of Key/Certificate Management Plans Development of Security Case Reports. Support to Security Working Groups Management (but not delivery of) Penetration Testing and/or TEMPEST Testing Act as an SME for security requirements. Assist in the …/certificate management. Extensive experience in embedding security best practices within multi-disciplinary product teams. Experience in conducting security risk assessments. Experience of Security Management Plan (SMP) Generation Experience of Security Case/Security Case Report Generation Strong communication and stakeholder management skills. Strong analytical and problem-solving more »
be responsible for researching, supporting and configuring to analyse security risks and ensure security policies are in place and being followed. The Role: Handling vulnerabilitymanagement tools, creating reports for fixing issues, and prioritising actions. Investigating incidents and trends, as well as identifying threats using SIEM tools like … Splunk and Microsoft Sentinel. Using IT Service Management tools to classify cyber incidents and analyse trends for management reports. The Candidate: Working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus Experience of public cloud infrastructure and cloud delivery models more »
skills across the implementation, maintenance, and configuration of security tools and platforms; creating policy changes, completing constant monitoring, identifying/resolving issues. and performing vulnerability testing. The role is very diverse covering all aspects of Cyber Security and would offer an excellent opportunity to further your skills and expand … of different security products and offer the chance to gain additional certifications and experience. You will gain further exposure to End to end threat & vulnerabilitymanagement Operational support of security technologies, products, and services Vulnerability scans and identifying vulnerabilities in systems Monitoring for unusual activities, implement defensive … of contemporary standards, practices, procedures, and methods. Wireless security, network monitoring, network design, windows desktop/server security, database security, routing protocols and incident management Aptitude to use online research tools and internal documentation to find resolutions to problems Be able to conduct cyber essential assessments. Any experience with more »
currently looking for a Cyber Security Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving forward … Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerabilitymanagement Skills more »
relation to Cyber Security Experience of working in environments using ISO27001 or Cyber Essentials Plus Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement or similar Experience of Cloud platforms, either AWS or Azure A CISM, CISSP, CISA or similar professional qualification As a Cybersecurity Lead more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
with resolutions. Keeping company up to date and compliant with industry best practice, policies, and guidelines. Managing penetration tests. End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
as part of a collaborative and innovative team where you will be hands-on with various Security & Infrastructure products including Azure, WAF, Internet protection, Vulnerabilitymanagement, SIEM, Firewalls, CASB and EDR. Within this role, you will work with the team to engage and technically support in driving performance more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based in Cirencester. The company is well-established and financially very secure The ideal person will be comfortable … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a deep knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques. They are currently transitioning from a hybrid to a cloud-centric infrastructure , They are in the process of … of a whole host of legacy infrastructure and the adoption of new private cloud solutions. Part of your responsibilities will include the creation and management of detailed documentation covering infrastructure setups, operational processes, and guidelines. Additionally, you should possess the ability to demystify technical concepts for a non-technical more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »
risks and protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerabilitymanagement, incident response as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team more »