Toolkit, ISO 27001). Experience in preventing, detecting, containing, and recovering from cyber attacks. Expertise in Vulnerability Management, Microsoft Defender XDR Suite, Microsoft Sentinel, DLP, Red Teaming, Penetration Testing, ITSM/ServiceNow, and Cloud Security. In-depth knowledge of cyber security principles, threat landscape, and vulnerability management. Strong acumen with more »
Sandiacre, England, United Kingdom Hybrid / WFH Options
Air IT
Windows Hyper-V/VMware vSphere and vCentre Microsoft 365 (email migrations, Intune deployment, Azure Information Protection, Azure AD join, AD Connect, SharePoint Online, DLP, MDM) Multi-Factor Authentication and conditional access setup and configuration for Office 365 Microsoft Active Directory, Windows Server, and related server roles (IIS/RDS more »
Cheltenham, England, United Kingdom Hybrid / WFH Options
IOActive, Inc
of the Android platform and its security mechanisms Vulnerability assessment and penetration testing Knowledge of security-related topics, such as authentication, entitlements, identity management, data protection, data leakage prevention, validation checking, encryption, hashing, principle of least privilege, software attack methodologies, secure data transfer, secure datamore »
SOC as required and time permits. The Information Security Analyst will: Review daily security system logs and alerts - Firewall/Intrusion Detection System/Data Leak Prevention – and identify security issues. Conduct monthly scans for unauthorised software Provide insight into the countermeasures PA should adopt and generate key … advantage Strong log analysis and correlation skills Knowledge of ISO27001/2 and Cyber Essentials Plus. Knowledge of Logging/SIEM systems Knowledge of Data Leak Prevention systems Knowledge of Intrusion Detection systems Ability to communicate at all levels We know the skill-gap and ‘ the need to more »
like Microsoft Azure, SharePoint, M365 and InTune Implementing a NIST based cybersecurity framework Planning for a Windows 11 company wide rollout Implementing Microsoft Purview DLP mechanisms We are keen to speak with people who have at least 4 years' experience working within small to midsize IT teams and have experience more »
City Of Bristol, England, United Kingdom Hybrid / WFH Options
Sanderson
Provide advisory and consulting support to help the Company improve its security posture and adhere to security policies, expected controls and regulatory requirements. Maintain data and monitor security access. Perform vulnerability testing, risk analyses and security assessments. Define, implement and maintain corporate security policies. Anticipate security alerts, incidents and … Ecosystem such as Active Directory and MS Entra ID, including GPO, DNS, DHCP. Knowledge of endpoint security solutions (e.g. HIDS, anti-malware, file integrity, DLP). AWS, Azure and other cloud platforms, including hybrid cloud (e.g. SaaS, IaaS, PaaS). System administration, supporting multiple platforms and applications. Skilled in conducting more »
High-Level Designs) for data centers and hub sites. Lead the design and deployment of advanced security solutions such as firewalls, SASE, CASB, DLP, and PKI in network and cloud environments. Cloud Security: Manage and secure cloud infrastructure using AWS and Azure security tools, including WAF, AWS Shield, GuardDuty … security technologies including firewalls, email gateways, web proxies, antivirus solutions, and load balancers. Implement and manage endpoint security solutions, intrusion prevention systems (IPS), DLP, and SIEM tools such as Splunk. Perform vulnerability assessments, penetration testing (including OWASP, network, and privilege escalation testing), and secure SDLC processes. Leadership & Strategy: Provide … Lead Implementer and Auditor, Palo Alto ACE. Extensive experience with firewall technologies (Cisco ASA, CheckPoint, Palo Alto), email security (Cisco Ironport, Sophos), VPNs, DLP, and network monitoring tools. Proficient in cloud security (AWS, Azure), SASE, CASB, IAM, and encryption technologies. Strong knowledge of security compliance, risk management, and incident response. more »
Strong knowledge of Conditional Access and Azure AD Connect Nice to Have: - Global admin experience and working in Azure environments - PowerShell scripting, Microsoft Purview DLP, Teams calling, and SSO/SAML integrations - MSP experience and familiarity with remote management tools like SolarWinds If you're ready to drive innovation and more »
MDM Administration, SharePoint Online, Azure AD, OneDrive for business, Teams, and Outlook. 2+ years' experience working in a Service Desk environment. Office 365 ATP & DLP configuration including security monitoring & logging (e.g. Microsoft Cloud App Security). Experience with Office 365 and Azure AD security, compliance & auditing. Service Desk management within more »
and best practicesExtensive work with Azure Cloud & Azure Services, with an ability to provide secure Cloud Architectures in fast paced technical environmentsKnowledge of SIEM, DLP, IAM & moreBackground in Incident Management and Disaster RecoveryHands-on experience with DevOps technologies, including Kubernetes, Terraform, Azure DevOps, PowerShell etcThis is a hybrid opening (office more »
City of London, London, United Kingdom Hybrid / WFH Options
British Business Bank
have previously delivered solutions around security concepts such as, Zero Trust Architecture, Endpoint Device Management, Threat Modelling and DevSecOps, Identity and Access Management, and DataLoss Prevention. You will have experience in policy and internal standards development as well as monitoring and reporting on compliance with security and … data protection policies, as well as the enforcement of policies. You will have developed and maintained written security controls, compliance monitoring, vulnerability management, and defining treatment strategies along with performing risk assessments, IT audits, security planning and systems accreditation. Previous experience of implementation of Information Security Frameworks, HMG Security more »
/XDR endpoint protection solutions Microsoft 365 cyber security and information governance services such as Defender for Office, Defender for Cloud, Purview and Endpoint DLP Microsoft Azure IaaS and PaaS architecture PowerShell and other scripting languages Citrix Virtual Apps, Remote Desktops Services, Virtual Desktop Infrastructure Veeam and Zerto backup and … data resiliency solutions Veeam Backup and Replication and Zerto VMware virtualisation Hyper-V virtualisation Microsoft Azure IaaS and PaaS architecture Azure migration tools Storage technologies (Pure Storage desirable) A good knowledge of cybersecurity principles, including threat detection, incident response, and vulnerability management ITIL v4 Foundation Desirable or some exposure … hygiene, endpoint detection and response, secure cloud gateways, multi-factor authentication and advanced identity management. Monitoring and managing client firewalls, intrusion detection and intrusion prevention tools. Monitoring and administering backup and data resiliency tools to ensure client workloads are protected and within defined SLA. Operating to defined SLA more »
advanced threat protection tools Excellent understanding of security issues, threat actors, risks and the industry Prior experience running penetration testing initiatives Exposure to IPS, DLP, anti-malware, Sandbox, Vulnerability scanners Cyber qualifications such as CEH, OSCP, CISSP Our client offers an excellent hybrid work culture, high-end base salaries and more »
a SOC environment, with roles such as (T3) Senior Analyst or Team Lead. Technical Expertise: Proficient with security event detection tools including IPS, SIEM, DLP, Anti-virus, etc. Communication Skills: Strong ability to engage effectively with key internal and external stakeholders. Network Knowledge: In-depth understanding of networks and network more »
Leeds, England, United Kingdom Hybrid / WFH Options
Fruition IT
business impact analysis to identify potential vulnerabilities and prioritise mitigation strategies. Infrastructure Security: Implement and manage advanced security tools and technologies, such as MFA, DLP, VPN, and cloud-based solutions, to ensure the confidentiality, integrity, and availability of our systems. Policy Development: Contribute to the creation and implementation of information … attacks before they cause significant damage. Incident Response: Investigate and respond to security breaches, ensuring swift containment and remediation of any compromised systems or data Required qualifications/experience: Proven experience in cybersecurity infrastructure engineering with a strong understanding of network security, firewalls, intrusion detection/prevention systems more »
accustomed to a global SOC environment and an individual who is looking for their next level III SOC role. If you have experience with DLP, Azure and are looking for a firm that values Cybersecurity then this position is ideal for you. They have a flexibility working policy, with only more »
SecurityAdministrator Associate – MS-500 Microsoft Certified : Azure Security Administrator Associate – AZ-500 Microsoft Certified: AdministratorExpert MS-102 Experience Needed: Microsoft Purview Microsoft Sentinel DLP Sensitivity Labels Data Life Cycle Management Data Governance strategy Entra ID – Identity and Access Management (Hybrid Identities). Entra ID – Security (Conditional Access, PIM more »
decades. Who we are looking for? The ideal candidate will have a well-rounded security background in: Security Information and Event Monitoring (SIEM) technologies, DLP, Vulnerability Scanning, experience of engineering and administering end point security applications including full disk encryption HIDS, NAC, cloud-based storage, mobile technologies & IDS/IPS … Area Network technologies; system monitoring and event analysis; virtualization concepts and technologies; Group Policy Competencies: Analysis: Identify and understand issues, problems and opportunities; compare data from different sources to draw conclusions. Communication: Clearly convey information and ideas through a variety of media to individuals or groups in a manner more »
position within a large, complex, and technologically diverse organisation. Proficiency in deploying, maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centres, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners, Proxy like Zscaler is essential. At more »
of the Android platform and its security mechanisms Vulnerability assessment and mobile penetration testing Knowledge of security-related topics, such as authentication, identity management, data leakage prevention, validation checking, encryption, hashing and software attack methodologies Interviews are scheduled to take place this week so if you are interested more »
of the Android platform and its security mechanisms Vulnerability assessment and mobile penetration testing Knowledge of security-related topics, such as authentication, identity management, data leakage prevention, validation checking, encryption, hashing and software attack methodologies Interviews are scheduled to take place this week so if you are interested more »