Worcestershire, United Kingdom Hybrid / WFH Options
Cubiq Recruitment
those who make the world a safer place benefit from cutting-edge technology. Specializing in system design, integration, and development, they empower armed forces, security agencies, and first responders with the tools to perform their duties more effectively. Though based in Bristol, this role is primarily located in Hereford. … frontline operators. Vision: Providing fast, flexible solutions to public sector technical challenges. Specialists in software-centric systems, particularly for constrained networking environments or challenging cybersecurity requirements. Core Values: User Focus: Deliver the best outcomes for system users. Urgency: Solve pressing problems quickly. Diversity: Inclusive and multidisciplinary teams more »
Have a sound understanding of meaningful HR topics (including Recruitment, Training, mobility, up/re/self-skilling, etc.) Experience with and knowledge of cybersecurity domains and profiling as a baseline for creating and enhancing learning paths for security professionals and experts Strong organisational change skills more »
St. Neots, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
NES Fircroft
Function Safety standards (IEC 61508/61511), certification (FSEng) and/or project experience working with Safety Instrumented Systems (SIS) Good understanding of OT CyberSecurity requirements (IEC 62443) Experience with modification/configuration of industrial ethernet networks, including switches, routers and/or firewalls Experience with modification more »
existing PowerBi based reporting. Successful candidates be responsible for, and have experience in the following: Technical Standards (current and emerging) Non Functional Requirements Baseline security requirements Review the current A4E (Analytics for Everyone) PowerBi reporting platform design Advise and recommend technical options for progressing against project objectives. Map a … transformation journey from existing on-premise data structures to future Azure state. Provide assurance that cybersecurity standards and technical standards are met and that the solution is technically compatible with our platforms, infrastructure and processes. Document configuration, development and common maintenance procedures Work alongside local IT Teams … to create and document these through the local Technical Design Authority and change process. Confirm that the proposed solution is fully compliant with Baseline Security requirements and the Forces non-functional requirements. Produce a high-level design and a low level design to be submitted and approved at the more »
in the financial sector. The candidate will play a crucial role in identifying and implementing the most effective approaches to enforce containment actions during cybersecurity crises within our infrastructure. This role involves designing and developing both technical and procedural implementations for manual execution, conducting feasibility studies, and identifying prerequisites and … stakeholders. The candidate will also develop and document processes/procedures, conduct simulated testing, and ensure effective execution of these processes during cybersecurity incidents. Key Responsibilities: Containment Action Planning: Identify the most effective approaches to enforce containment actions in case of a cybersecurity crisis. Feasibility Studies: Conduct feasibility studies and … these are discussed and agreed upon with major stakeholders. Simulated Testing: Conduct simulated testing of developed processes and procedures to ensure effective execution during cybersecurity crises. Documentation: Ensure process/procedure documentation is agreed upon and approved by all stakeholders. Required Knowledge, Skills, and Competences: Enterprise Architecture: Good general knowledge more »
Lancashire Teaching Hospitals NHS Foundation Trust
to users and support staff. Troubleshoots problems with in-house developments. Project Management - Produces project plans and estimates. Evaluates new hardware and software. Evaluates cybersecurity notices Assists third party suppliers in setting up and testing of bought-in solutions as directed by line management. Maintains an up … of Power Automate . Experience of NHS processes, systems and workflows. Experience of Data Science. Knowledge and experience of Information Governance, Data Protection/Security and GDPR. Knowledge of ITIL, especially Software Configuration Management. Disclosure and Barring Service Check This post is subject to the Rehabilitation of Offenders Act more »
focus on transitioning to a cloud-based identity and access management solution. The ideal candidate will bring a wealth of knowledge in cloud technologies, security, and identity management, coupled with the ability to navigate a complex, supplier-heavy environment. Key Responsibilities: Coordinate the analysis of applications and authentication methods … golden source." Assist with standardising Jira reporting to enhance project tracking and reporting. Conduct extensive analysis of applications, identifying requirements for cloud migration and security improvements. Collaborate with a core team, and various external suppliers to drive the migration of critical systems to cloud. Address legacy system challenges, leveraging … application teams, clarifying roles and expectations in the project. Required Skills and Experience: Proven experience as a Business Analyst, with a strong background in cybersecurity, identity management (IDAM), and cloud technologies. Demonstrated ability to work in complex, supplier-heavy environments, ideally with experience in managing relationships with more »
/or IT risks and/or IT governance skills. Certified CRISC/CISA/CISM/CISSP or other relevant qualifications. Knowledge of cybersecurity controls and tooling desirable. Enact the department’s strategy and roadmap Ensure strong relationship is built with both 2nd line (ORM) and … timely Work with 2nd line to populate the risk system accurately for IT Ensure FFIEC is thoroughly prepared for and managed Ensure that all security regulatory requirements are fully complied with across EMEA IT, including SOX and that internal IT assessments and appropriate defences and controls are in place … to deal with all cyber risks. Lead the audit process for technology, working closely with all areas, especially the Infrastructure team for alignment of controls Manage the risk portfolio to include linking risk to controls, acceptance of risk and managing remediation plans; conducting control testing when appropriate. Manage the more »
IT Disaster Recovery. Ensure all relevant network hardware, software/firmware is within supported life. Work with vendors to obtain, schedule and implement updates. CyberSecurity Operational monitoring & reporting Continuous improvement Skills and experiences required: Previous experience in a similar role (minimum 3 years). Proven technical experience more »
Kanban and lean development. Experience of delivering complex operational technology (OT) projects, demonstrating and meeting business value and outcomes (Desirable) Knowledge of OT and cybersecurity risks. (Desirable) What will you be doing? Managing product development projects from initial inception through to operational deployment in line with business more »
to define cloud strategy and perform PoC on new technologies. Keep up-to-date and have expertise on current tools, technologies and areas like cybersecurity and regulations pertaining to aspects like data privacy, consent, data residency etc. that are applicable. Key Skills 6+ years working with Kubernetes more »
existing process landscape and requirements o Definition of new processes to meet requirements o Identification of roles, responsibilities, and engagement points o Collaboration with Cybersecurity SMEs to create work instructions Qualifications and Skills: Minimum 6 years of service design experience Senior service designer background Proficiency in choosing and applying design … design practices Ability to work with both waterfall and Agile methodologies Exposure to various industries, from small enterprises to blue-chip organizations Knowledge of CyberSecurity and IT disciplines About You: Excellent consultancy skills, adept at leading diverse stakeholders Strong verbal and written communication Effective presentation skills to more »
optimisation/rationalisation initiatives to drive value in improving the overall operating model Need to have worked across; Applications, ERP, Infrastructure, Data, Cloud, Architecture, CyberSecurity Standard experience of delivery, budgetary management and risk management. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced more »
months €300 - €320 per day My client is looking to hire a IT PMO to Support the Programme Management Office in overseeing IT and Cybersecurity projects for their business functions (Manufacturing, Finance, HR, Supply Chain, Engineering, Legal, Marketing). Responsibilities: Administer PMO tasks: onboarding, training, compliance. Generate portfolio reports using more »
has become a global technological leader and established go to Engineering Services provider, working within many industries including Aerospace, Defence, Marine, Nuclear, Automotive and Cyber Security. This vacancy is being advertised by Belcan more »
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
First Recruitment Group - IT
As. Strong stakeholder management skills, with the ability to influence and negotiate at all levels. Experience across applications, ERP, infrastructure, data, cloud, architecture, and cyber security. Competence in delivery, budgetary management, and risk management. At First Recruitment Group we understand just how important it is to secure the right more »
Chesterfield, Derbyshire, East Midlands, United Kingdom
Belcan Technical Recruiting (UK) Ltd
discipline Desirable * Providing mentoring to new or developing engineers * DCS, Drives, Plant Historians, MES, Industry 4.0 * IT/OT Convergence, Network design and configuration, CyberSecurity * Functional Safety, Database implementation, Energy Efficiency and OEE * Industrial Protocol Knowledge (IEC 61850, DNP3, Modbus, OPC etc), Bespoke code development, TIA Portal … has become a global technological leader and established go to Engineering Services provider, working within many industries including Aerospace, Defence, Marine, Nuclear, Automotive and Cyber Security. This vacancy is being advertised by Belcan more »
Lytham St. Annes, Lancashire, North West, United Kingdom
JAM Recruitment Ltd
or leading in the following activities for mission systems as part of a multi-functional engineering team: Concepting, Architecting, Requirements management, Design, Testing, Safety, CyberSecurity, Qualification and certification. You will be positioned as and where needed on any of these activities. Lead and support team meetings/ more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Belcan Technical Recruiting (UK) Ltd
has become a global technological leader and established go to Engineering Services provider, working within many industries including Aerospace, Defence, Marine, Nuclear, Automotive and CyberSecurity with over 10,000 professionals serving hundreds of customers in over 60 locations worldwide. This vacancy is being advertised by Belcan more »
engagement bonus in first pay What our courses cover: Our courses cover everything from the basics of computer programming to robotics, advanced programming, and cybersecurity, designed to prepare children for the digital world. You'll work with small class sizes of no more than 8 children per more »
I am hiring for a Senior Cloud DevOps Engineer with an esteemed cybersecurity company in Galway. The successful candidate will be required to work a hybrid set-up in Galway. Requirements: Very strong knowledge in at least one major cloud platform (multi-cloud exposure is desirable) Experienced with monitoring tools more »
IT support or related roles within an IT department. Proficiency in troubleshooting general IT hardware, software, and network issues. Basic to intermediate understanding of cybersecurity principles. Excellent communication skills in English, both verbal and written. If you're a results-driven IT professional with a passion for excellence in technical more »
understanding of IT drivers, including customer and regulatory needs To excel in this role, you will need: Expertise in IT technologies such as network cybersecurity, cloud architecture, data intelligence/analytics, and database management A high level of product and industry knowledge Experience in Healthcare IT technologies, Pharmacy or clinical more »
to design, develop and deploy a containerised microservice based application hosted on Kubernetes Ability to implement solutions that meet customer control requirements including IAM, cybersecurity and change management needs Ability to design, develop and implement GitOps based CICD strategies Ability to author technical documentation that customers and colleagues can consume more »