Wigan, Greater Manchester, United Kingdom Hybrid / WFH Options
Tilt Recruitment
base) This role will suit a seasoned Contractor or Interim, delivery focused Head of IT Services or (technical) Service Delivery Manager – ideally someone with InfoSec or informationsecurity experience as part of their previous roles. Reporting into the CIO, this ambitious and fast growing business is looking for … a strong leader with proven experience of successfully partnering with, and managing 3rd party suppliers (including MSP and IT security functions) to optimise efficiencies and deliver successfully to the business. There are a number of projects on the roadmap, so lots of exciting items on the agenda technically….. … be fast, reliable, secure and compliant -An accomplished manager of 3rd parties ensuring vendors appreciate the technology impact to business stakeholders -Experienced in implementing infosec best practice ideally gained within an ISO 27001 environment -A strong communicator to technical and non-technical peers and colleagues across the business at a more »
ZUID) Task description: Resolution of Incidents and Service requests. Installation of software . Administer day-to-day operations to satisfy continuity of service, recovery, security and performance needs. Application troubleshooting, deployments, minor configuration changes. End-to-end infrastructure/application monitoring. Job requirements: Bachelor degree of 3 years attested … setup, configuration, troubleshooting MS Teams Document management and MS SharePoint Good experience in User support, Change support, Service Delivery, Problem Management; Experience in Testing, Information and Knowledge Management, InformationSecurity Management ; Good knowledge of Component Integration and Solution Deployment; Good understanding of IT security and best more »
Hatfield, Hertfordshire, South East, United Kingdom
Experis UK
experience of high standards of customer service Good administrative experience, attention to detail , ensures accuracy of data, provides data for reporting and processing of information Excellent Interpersonal, literacy and numeracy skills and ability to build relationships at all levels Clearance Level: Must be eligible for SC clearance Daily Responsibilities … Complies management information reports through relevant business tools to provide accurate/up to date data Prioritise and co-ordinate own and others work schedules to ensure that business and customer needs are met and deadlines are adhered to. Ascertain customer requirement in order to direct the enquiry to … and customer requirements to avoid escalations. Assess cost implication of best solution to ensure adherence to budget constraints. Act in accordance with the client' InformationSecurity Policies and report any potential or actual Security events or other Security risks to the organisation. If you are eligible more »
be SC clearable as well, so they don't need to hold SC clearance, but need to be able to pass it Complies management information reports through relevant business tools to provide accurate/up to date data Prioritise and co-ordinate own and others work schedules to ensure … are met and deadlines are adhered to. Good administrative experience, attention to detail, ensures accuracy of data, provides data for reporting and processing of information Ascertain customer requirement in order to direct the enquiry to relevant department. Able to communicate on complex issue to meet business and customer requirements … to avoid escalations. Assess cost implication of best solution to ensure adherence to budget constraints. Act in accordance with Computacenter InformationSecurity Policies and report any potential or actual Security events or other Security risks to the organisation. Ensure Department meets SLA performance targets Maintain & improve more »
Senior Security and IAM Analyst Rate: £(Apply online only) per day IR35: In scope Duration: 6 months Location: Leeds 2 days/Remote 3 days Reporting into the IT Risk & Security Lead. Taking into account the further heightened cyber-security environment, work with a focused IT Risk … and Security team and other stakeholders, in the provision of security dependencies across multiple Bank requirements, focussing primarily on leading on the continued design, development and implementation of the Identity and Access Management (JML/RBAC) in a Microsoft Azure cloud environment, and assisting where necessary across other … ITSec requirements such as mitigating Cyber Risks, responding to security incidents, and processing BAU security functions as required. Core role accountabilities Primary responsibility to lead and deliver the continued design, development and implementation of the Identity and Access Management in a Microsoft Azure cloud environment. Responsible for role more »
resolved within KPI. As part of troubleshooting, you will be required to escalate identified bugs and issues to engineering using JIRA. Manage the monthly security and application patching to 'Front End Devices' through Patch Management tooling and processes for Windows and Unix environments whilst looking at continuous improvements to … the creation/update of ad-hoc scripting (Shell, PowerShell) on Windows Server/Desktop platforms. Assist with vulnerability scanning of devices utilizing standard security scanning tools. Manage customer expectations and resolve queries by working closely with InformationSecurity through effective communication and reporting. Troubleshoot networking related … V, Repository Servers) Have a minimum of 3 Years' experience in scripting (Linux, Bash, T-SQL, Shell, PowerShell) At least 3 Years' experience of security and patch management (Preferably Ivanti EPM) At least 3 years Infrastructure experience in a Windows/Unix platform. Have sound knowledge of Networking topology more »
Exeter, Devon, United Kingdom Hybrid / WFH Options
Logix Resourcing
observation and digital twins. The key aim of the Front End is to expose (show) insights extracted from combining geospatial environmental and non-environmental information in and around urban areas, in the form of interactive maps and graphs, in a robust and secure way. Working in the project team … a cloud-based system (most likely AWS), thereby turning a scientific research question into a technical solution. This requires experience in working with geospatial information systems, physical models and gridded geospatial data. Ability to work effectively within a scientific research environment (with its inherent uncertainty) and to create technical … a Python scientific codebase. Ability to understand the technological constraints of the systems and to find flexible solutions to the challenges these present (including informationsecurity, data sharing, data characteristics such as big volume of data, gridded 4D information, particular spatial projections). Evidence of good software more »
current and meet the needs of the role. Comply with the Council's legal requirements under the General Data Protection Regulation (GDPR), Freedom of Information Act, the Privacy and Electronics Regulations and InformationSecurity Standards. PLEASE NOTE THIS ROLE IS OINSIDE SCOPE OF IR35 more »
About us Information Services Division (ISD) is the primary provider of IT services to UCL. We support and enhance learning, teaching, research and administrative processes by providing information- and technology-related services to over 50,000 staff and students of UCL and associated institutions. Our goal is to … be the leading IT services group in the HE sector and we are growing our team's capability in experience/UX, agile development, security, cloud, service management and partnering. We are modernising our technology foundations, digitising the processes of the university to transform experience for students and staff … candidate will have the ability to lead the team to develop network solutions through all stages of the product lifecycle alongside colleagues from Architecture, InformationSecurity, and other relevant areas. Coming from a strong technical background, the candidate will have good knowledge and management experience across a breadth more »
of cloud infrastructure principles and Terraform for infrastructure as code - Familiar with postman for API testing, docker and podman for running applications - Knowledge of informationsecurity controls to eliminate threats within solutions and services Skills - Experience in Data migration, profiling and data quality enhancement - Experience in Agile (Scrum … code reviews, source control management, build processes etc If you think you would be a good fit for the role, please apply. For more information about Senitor and the opportunities we have to offer follow Senitor Associates on Linkedin. Senitor Associates Ltd is acting as an Employment Business in more »
on experience in designing and implementing key management solutions for enterprises. Hands-on experience in HSM, Cryptography related fields Knowledge of Networking and Network Security concepts. Programming knowledge in C/C++ (preferred),Java,.NET Experience integrating cryptographic libraries and HSMs with applications. Understanding of InformationSecuritymore »
the requirements Provide expert advice on the standards, training staff on the importance of compliance with ISO standards Help to review and update existing InfoSec policies and proceedures Requirements: Proven experience with similar industries to achieve ISO certifications Comprehensive understanding of relevant standards, frameworks and best practices Relevant certs - ISO more »
Cheshire, Marston, Cheshire West and Chester, United Kingdom
Tilt Recruitment
CISO Office Administrator (12 month contract) We’re looking for an organised, proactive, adaptable and infosec savvy administrator to support the office of the CISO in an ambitious and growing business. This will be a diverse and integral role to the CISO – supporting them in driving cyber security within … experienced administrator with excellent communication and stakeholder engagement skills with exposure to security. What you'll be doing Organising meetings Following up on cyber security topics Reporting on crisis accident findings Checking for risk analysis requirements Supporting with cyber security training programmes Following up on legislation changes to … needs doing (industry-related) Tracking of cyber events inside the company and externally to see if the business is at risk Engaging with other security office team members globally Dealing with daily admin for the CISO office Engaging with business-wide stakeholders at all levels What you'll need more »
actions in the access space. You will be key to ensuring that Tesco Bank operate an effective control environment for their Identity & Access Cyber Security Controls. The work will include specialist support for Access Management implementations within Technology to identify operationally where proportionate controls should be applied to reduce … risk, improve security, and comply with Policy & Standards. This activity will span On-Premises, Cloud hosted/SaaS applications & infrastructure including the extension of existing Role Based Access models, entitlement certification processes and Privileged Credential Storage where gaps are identified. Additionally, the role may include ensuring effective Access Management … Access Models. Knowledge of wider Cyber Security Controls (Structure, Assessment etc.) Good communication and influencing skills. Previous of experience of working on Technology Infosec Access Management programmes within a regulated authority (financial services, healthcare, etc.). Why Tesco Bank? At Tesco Bank everyone is welcome, we value our people more »
form, and media pertaining to the request on any RBH used system, as well as, off-site storage and Library locations. Copy all required information; present in a continuous format for relevant requestor (patient or otherwise). Prepare and ensure right information is timeously sent to the correct …/area to gain necessary signed authorisation to allow the despatch of copied patient records. Use the Trust Medical Transcription System to maintain patient Information security. Invoice and monitor payment if/where applicable. About us Reading sits on the River Thames and is served by great road and more »
Location : Remote Contract : Inside IR35 We are looking for someone who has had previous experience of working with Infosec teams implementing Application level encryption for on-prem hosted apps. As part of this change they will be analysing database and schema to determine what datasets need to be encrypted based more »