Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
understanding of network security components, log management, multitier application architecture, and scripting knowledge. Should have 3-5 years of cybersecurity experience in areas focused on controls like security logging, incidentresponse, forensic analysis, and audit remediation. Strong analytical abilities to interpret security reports and identify vulnerabilities are essential, along with excellent communication, teamwork, multitasking, and attention to detail. More ❯
level. Generation of Key Components across various platforms (including IBM, Tandem, Unix) together with management of Cryptographic infrastructure. SSH Key Management. Certificate management. HSM configuration/installation/support. Incident management. Change management. ITIL. Ensure the integrity and availability of cryptographic and key management services to business functions and applications. Key Accountabilities: Cryptographic Hardware Management - including on site local … core geographic locations globally. Management of Cryptographic infrastructure to include Out of Hours Support, production of Monthly management information and risk statements. Adherence to Group IT Security Standards. Problem, Incident & Change Management including root cause identification. Procedure/process development. Project delivery. Cryptographic Hardware Management. Auditable Record Management. Excellent Risk and Control Maintenance. Ensure governance and clear record keeping … creation and maintenance. Deep understanding of change disciplines including change and release management and track record of delivering change projects in a timely manner with high quality. Strong in incidentresponse procedures and standards, strong communication skills and ability to articulate complex events to management. Experience of Sharepoint, Confluence and JIRA. Unix/Windows O/S skills. More ❯
infrastructure automation capabilities Proficiency in configuring, managing, and troubleshooting Firewalls. Cisco, Palo Alto etc, Experience with intrusion detection/prevention systems, as well as with SIEM tools and security incident response. Design and implement secure network architectures, including Firewalls, intrusion detection/prevention systems, and encryption technologies. Be able to communicate to technical and non-technical stakeholders Must have More ❯
Change and Transformation• Professional Collaboration• Digital and Technology Communication• Business Acumen• Problem Solving Tools• Risk and Controls Distributed Systems.• To apply software engineering techniques automation and best practices in incidentresponseMore ❯