Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged accessmanagement tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create … documentation that enables the business to use the cloud securely Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerability management issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & AccessManagement, Privileged AccessManagement (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into the Lead Cyber Security Engineer, you will have plenty of opportunity to learn and test and advance your skills across a range of projects. To be considered you must have a cyber more »
required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership andmanagement of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs … remote access products LAN & WAN networking using routers, switches, and infrastructure products. Good understanding of TCP/IP Identityandaccessmanagement systems Active Directory, GPO Configuration Citrix/VMWare Experience of managing and developing a SIEM system, and feeding events into … Understanding of vulnerability managementand defense against attacks in order to drive the business in improvement Understanding of IdentityandAccessManagement function and technology in order to drive improvement of the function Send me alerts about jobs like this. Please enter more »
asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & Vulnerability Management: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & AccessManagement, Privileged AccessManagement … per year, increasing to 30 with service (plus bank holidays). Contributory pension scheme with up to 12% company contribution. Annual medical assessments. Access to comprehensive benefits Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral bonus if you refer more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
This role is responsible for providing subject matter expertise and guidance to Business teams andand Partners that own the day to day managementand safeguarding of customer information and protection of physical/logical assets of the company. Experience of working with and influencing various levels of … management, building relationships and influence across teams and a wider community of other leaders and managers. A clear communicator. Ability to lead, make decisions, problem solve and work within teams. Can demonstrate flexibility and agility to move between role types within teams. Will have clear subject matter experience … solve problems and input to operational and strategic plans. Can demonstrate the ability to gather, analyse and present information in business terms for managementand leadership consumption. Ability to work in a fast paced changing environment that shows flexibility, resiliency, self-awareness and ability to support other team more »
your technical expertise. Create, review, and approve architecture, design, delivery, and test documentation to ensure effective governance and technical assurance. Ensure effective capacity managementand planning for security services and solutions, integrating these into our technical and budget roadmaps. Support Programme and Project Managers in project planning, risk … management, and budgeting processes. What experience do you need: A mix of security consulting, architecture/design, and professional services experience. Proven ability to lead the design and review of secure system architectures, challenging existing norms to set new directions. Deep knowledge of system architectures and an understanding … Expertise in one or more technical domains: Cloud/Hybrid security, Infrastructure and data centre security, Network security, Application security, Identityandaccessmanagement, Vulnerability Management. Familiarity with common information security management frameworks (NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF SoGP more »
Reading, England, United Kingdom Hybrid / WFH Options
BJSS
best practices and regulatory compliance (e.g., GDPR, HIPAA) and their applications in data platform implementations. This also encompasses experience with identityandaccessmanagement (IAM), encryption, and data masking techniques. These are the types of questions that you’ll be asked by our clients … buy/sell option Electric vehicle scheme Training opportunities and incentives – we support professional certifications across engineering and non-engineering roles, including unlimited access to O’Reilly Giving back – the ability to get involved nationally and regionally with partnerships to get people from diverse backgrounds into tech You more »
ensuring all digital change globally across the group is delivered to reduce risk and maximise cyber resilience. Engaging with stakeholders at technical and senior management level, you’ll oversee Drax projects in the secure architecture of new systems, ensuring all projects are delivered within the business’s agreed … and guidance on the application and operation of all types of security controls.The role has a broad scope covering the identityandaccessmanagement, security monitoring and remediation, secure system and network designs, zero-trust, data centre and cloud deployments, with designs for enhanced … security, resilience and high availability.About you You’ll have a minimum of 5 years’ experience working within cyber security, covering product management, analysis and risk mitigation. You’ll also have a detailed and proven understanding of modern network, system and application architectures and associated security controls within highly more »
with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, IdentityandAccessManagement, Application Security, Data Security, PKI & Encryption) at the enterprise level. This role will have a significant impact by ensuring the … offshore resources to support the project post-implementation from offshore. Key Skills/Knowledge/Experience: Technical expertise in Enterprise Security Technologies such as IDAM, PKI & Data Security, Infrastructure & Network Security Tools, Application Security, Cloud Security. Understanding of Security Architecture Frameworks like SABSA and TOGAF to align security requirements with … for determining technical controls. Understanding of NIST-based Zero Trust Standards. Proven experience in establishing Zero Trust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA). Experience in designing and drafting various security architectural and design principles. Extensive experience in creating enterprise security more »
Reading, England, United Kingdom Hybrid / WFH Options
The Developer Link
The developer link is supporting a global leader in IdentityandAccessManagement (IAM) for the Internet of Things (IoT), they're looking for a Java Engineer to help build upon their proprietary platform that provides trust for their customers IoT devices and ecosystems. … Generation (DDKG) and PKI Signature+, you’ll contribute in delivering unrivalled simplicity and trust to IoT devices through automated device provisioning, authentication, credential managementand policy based end-to-end data security/encryption, partnering with leading IoT providers such as AWS, Dell, Intel, Microsoft, nCipher Security and … Thales. Your expertise in IoT life cycle managementand security applications within the IoT industry, alongside core tech including Java, Spring Boot/Spring Framework (ideally including Spring Security) will help drive their continued success. You’ll collaborate cross-functionally across a small team of 5 to develop more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identityandaccessmanagement , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and … negotiating technical outcomes with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group more »