Cyber Security Analyst Experience Level: 4 years + Salary: £45,000-£50,000 Location: London/Hybrid Skills: Cyber Security, Incident Response, Threat Intelligence, VulnerabilityManagement The role: My client are seeking a mid-level Cyber Security Analyst to join their team. The role will eventually lead to … Hardware and software compliance Working to maintain the Cyber Essentials and ISO27001 accreditations Providing Cyber related training to staff members Threat Intelligence and hunting VulnerabilityManagement Knowledge of Windows environments including cloud The successful candidate will have experience in as many of these areas as possible. Please apply more »
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, VulnerabilityManagement Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Reading, England, United Kingdom Hybrid / WFH Options
The People Network
with organisational goals Assist with the development and maintenance of cyber security engineering documentation, policies, and procedures Integrate cyber security solutions (e.g. privileged access management tools) with existing systems, applications, and infrastructure Perform assessments on cloud security and create documentation that enables the business to use the cloud securely … Liaise and coordinate with technology and business stakeholders about cyber security patching and vulnerabilitymanagement issues/actions Develop and maintain dashboards with cyber security engineering metrics Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Reporting into … infrastructure, network security and application security Good knowledge of MS Stack including exposure to Active Directory, Entra ID and Sentinel Knowledge of Identity & Access Management, Privileged Access Management (CyberArk) and Network Appliance (Firewalls, VPN, etc.) tooling support and maintenance Linux/Unix is desirable but not essential Ideally more »
objectives. WHAT WILL YOU BE DOING? Mitigating security risks associated with Bring Your Own Device, securing personal devices in a corporate environment. Ownership of vulnerabilitymanagement strategy. Preventing security breaches and ensuring system integrity Responsibility of deploying an Endpoint Detection and Response platform - which will involve configuring the … + years of working in IT, Network, and/or Security Engineering ● Experience in designing/deploying BYOD controls, for example Mobile Application Management solutions on iOS and Android ● Experience with VulnerabilityManagement ● Experience with EDR platforms (SentinelOne, CrowdStrike etc) Desirable ● Experience with Kandji, Jamf, Intune, Landscape more »
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerabilitymanagement, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
skills: Demonstrable experience in an IT infrastructure support or similar role. Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) VMWare (vCenter, ESX, Horizon) Storage management and administration Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. Maintain and manage the company s IT security systems, including patching and vulnerability management. Identify weaknesses in line with IT industry developments and implement improvements. Monitor and manage backups, resolving any issues may that occur. Implement IT more »
Leatherhead, Surrey, United Kingdom Hybrid / WFH Options
Confidential
to processing personal data with the highest level of diligence, and you ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
Portsmouth, Hampshire, United Kingdom Hybrid / WFH Options
Confidential
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & VulnerabilityManagement OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
North London, London, United Kingdom Hybrid / WFH Options
Secure Recruitment LTD
Tuning & Maintaining Security Platforms to Deliver the best capability to other SOC Analysts & Clients in delivery of New SOC Service offerings such as Threat & Vulnerability Management. You will act as Subject Matter Expert & Escalation Point for other SOC Analyst and will work closely with both the Senior Security Operations … Skills & Experience Required for Senior SOC Analyst role will include: Strong Experience in SOC or Security Operations or a related field Ideally leadership or Management Experience Strong Understanding of Security Principles & Technologies. Excellent Analytical & Problem-Solving Skills. Strong Verbal & Written Communication Skills Leadership, coaching, and mentoring skills. Strong Team more »
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Circle Group
the world's largest organisations, the mission is to empower businesses to continuously understand and mitigate their security risks. Our cutting-edge Attack Surface Management and Continuous Automated Red Teaming technology are at the forefront of this mission. This platform is trusted by Fortune 500 companies and other large … leadership roles. Expertise in handling data-heavy products and presenting actionable insights. Background in cybersecurity products, particularly those managing assets and vulnerabilities. Knowledge of vulnerabilitymanagement workflows and data prioritisation strategies. Proficiency with both relational and non-relational database systems. Writing clean, testable code and understanding various testing more »
our local business and communities – supporting technical innovation and adoption of cutting-edge solutions across the UK. Working on complex engagements in Identity & Access Management this team is responsible for the delivery of cutting-edge technical solutions and trusted to get it right first time. KPMG is one of … East. You will also have the opportunity to work with some of our technology partners, and latest technology in the world of Security Operations, VulnerabilityManagement and Threat Intelligence. What will you be doing? You will be working as a consultant in KPMG’s expanding Security Operations practice. … working in a dynamic environment and engage with leading companies around the world. What will you need to do it? Hands on and team management experience in a Security Operations Centre. Alternatively, consulting or advisory experience in Security Operations. Operational level experience in some of these domains (not all more »
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, VulnerabilityManagement, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, VulnerabilityManagement, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic … achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances … analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerabilitymanagement, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely more »
Security Operations Manager Permanent Hybrid working in London (2-3 days per week onsite) EDR and MDR experience is required Taking charge of our vulnerabilitymanagement strategy, you will identify, assess, and prioritise security vulnerabilities. Your proactive approach will be essential in preventing potential breaches and ensuring system … Response (EDR) platform. Developing our cyber incident response plan Organising and running a cyber incident response exercise Establishing security monitoring processes Establishing an effective vulnerabilitymanagement process Experience: Experience of IT, Network, Security Engineering or an equivalent technical discipline. Experience with Managed Detection and Response (MDR) providers Experience … with EDR platforms such as SentinelOne and CrowdStrike. Experience with Vulnerability Management. more »
Manchester Area, United Kingdom Hybrid / WFH Options
bet365
across the Business, specifically Software Development and Infrastructure, to confirm that vulnerabilities and security misconfigurations are understood and mitigated, the role is not a vulnerabilitymanagement role. You will have hands on experience, and a strong knowledge of hacking, ensuring there is no sole reliance on automatic tools. … be used by the business. Excellent documentation skills with a high attention to detail. Main Responsibilities Conducting manual and automated security testing. Completing security vulnerability analysis and assessment. Identifying and managing any security flaws within the business software and infrastructure appropriately, whilst liaising with colleagues in vulnerabilitymanagementmore »
City Of Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
across the Business, specifically Software Development and Infrastructure, to confirm that vulnerabilities and security misconfigurations are understood and mitigated, the role is not a vulnerabilitymanagement role. You will have hands on experience, and a strong knowledge of hacking, ensuring there is no sole reliance on automatic tools. … be used by the business. Excellent documentation skills with a high attention to detail. Main Responsibilities Conducting manual and automated security testing. Completing security vulnerability analysis and assessment. Identifying and managing any security flaws within the business software and infrastructure appropriately, whilst liaising with colleagues in vulnerabilitymanagementmore »
infrastructure environments Demonstrable Azure implementation and optimisation experience Understanding of Azure protocols and how best to manage and configure them to support cloud services. Management and optimisation of Office365 and Active Directory services, ensuring secure, efficient, and reliable network resources and user identity management. Provide ongoing operational support for … based support channels, demonstrating patience, empathy, and technical expertise. Leverage monitoring tools to detect, respond to and troubleshoot infrastructure performance and reliability issues. Use vulnerabilitymanagement tools to scan for and remediate vulnerabilities across client infrastructure, deploying patches, firmware and software updates as part of the remediation process. … SLA. Operate to defined SLA, OLA and KPI models, in alignment with ITIL best practice and client commitments. Develop and maintain documentation and knowledge management of client and internal systems and processes, using designated documentation tools such as IT Glue and Lucid Chart. Maintain accurate and up to date more »
High Wycombe, England, United Kingdom Hybrid / WFH Options
Saepio Information Security
/M365 products and technologies. · Knowledge of Microsoft Active Directory, DNS & DHCP. Technical knowledge & experience in one or more of the following areas: · Patch management tools and processes. · SIEM/XDR/SYSLOG. · Vulnerabilitymanagement tools · Email Security · Endpoint Detection & Response (EDR) · SASE/SSE/Secure more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
record in high level delivery. Required Skills/Experience; - A broad range of technology experience including Cloud Security (Azure, 365 E5 suite), Internet Protection, VulnerabilityManagement, SIEM, Firewalls, CASB, WAF and EDR products. - Experience in managing, supporting, and improving enterprise security solutions with a strong understanding of the more »
Farnborough, England, United Kingdom Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerabilitymanagement systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
East London, London, United Kingdom Hybrid / WFH Options
MECS Communications Ltd
out Splunk software across the platforms & infrastructure managed by the Engineering & Run & Operate teams. The DevSecOps Engineer will also oversee logging & Security Information & Event Management (SIEM) aspects of infrastructure, collaborating with application development teams to resolve issues & enhance security measures within the CI/CD pipeline. If you have … day London office, 4 days remote working, work from home Key Skills: Continuous Integration (CI), Continuous Deployment (CD), Infrastructure as Code (IaC), Security Automation, VulnerabilityManagement, Threat Intelligence, Secure Software Development Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling, Secure Configuration Management, Secure DevOps Practices, Security Scanning & Testing, Security Incident Response, Identity & Access Management (IAM), Secure Cloud Environments, Secure Code Reviews Nature: Permanent, Full Time Hours: Monday - Friday 09.00 -17.30 Gross pay rate: £55,000 - £70,000 basic + 20% bonus, Health Care, Discounts & other benefits Key Activity: * Develop more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerabilitymanagement, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerabilitymanagement and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
West Bromwich, West Midlands, United Kingdom Hybrid / WFH Options
West Bromwich Building Society
across a range of varied functions, such as M365 Migration, application upgrades and device refreshes. IT Security focused work including patch updates and general vulnerabilitymanagement The Key Responsibilities Are: Windows 10/11 build automation and image management. Endpoint device set-up and configuration. Hardware and software … and processes are fully followed and advise on IT security related issues. Liaise with 3rd party service providers to resolve problems within agreed timescales. VulnerabilityManagement to identify and fix Security vulnerabilities. MDM solution administration. Support the Society branch network across 34 locations and our head office functions. … Experience of Windows based administration tools such as Active Directory and Group Policy. Strong troubleshooting, analytical and fault-finding skills Able to automate system management tasks. Excellent communication and interpersonal skills. A strong customer focus. Ability to produce clear and detailed technical documentation. Knowledge of network environments and concepts more »