improvement for ISO-27001 and Cyber Essentials compliance. Ensure adherence to security standards, policies, and procedures, including external audits. Key Technologies: Strong knowledge of M365 security tools (Defender, Azure) VulnerabilityManagement, Web Filtering, DLP, Cloudflare, Firewalls, VPN, PKI, DNS, Email Gateways, Security Audits, ISO27001, Azure DevOps, Mitre Attack Framework, ITIL, Microsoft OS, Exchange Online To succeed, you should More ❯
major incidents to determine the affected/vulnerable systems, affected/vulnerable users Identify any business areas impacted and coordinate communications with all relevant stakeholders as per Major Incident Management process. Coordinate the remediation and containment activities as advised by either the NTT DATA SOC or Incident Response Team. Oversee, support, and manage through to completion the investigative and … Manager in review of any service delivery processes and workflows, identifying areas for optimization and implementing best practices. Co-ordinate the running and reporting of a risk-based vulnerabilities management including: Scanning systems, networks, and applications to detect potential security weaknesses. Prioritize vulnerabilities based on their risk level, potential impact, and the criticality of the affected assets, ensuring that … challenging projects and a work environment that supports the creation of tangible solutions that make an impact. You will need to have a broad experience of security service delivery management and have evidence of experience in a number of the following fields of expertise: At least 10 years of experience in providing technical support and advice for a Security More ❯
ensuring the highest standards of performance, scalability and security are maintained. A research infrastructure technical expert with deep understanding of high-performance compute (HPC) and research data storage and management, the postholder will be responsible for specifying, deploying and maintaining related services. These services are research-driven and the postholder will establish close collaborative relationships with PIs to understand … Information Services/IT Services to ensure the security and resilience of RCaaS research computing infrastructure services underpinned by the development of a suitable quality assurance approach including sufficient management processes and audit controls. 5. Establish and maintain metrics and produce concise reporting that demonstrates performance and utilisation of RCaaS research computing infrastructure services, working with relevant University finance … PIs, research managers and College and University IT professionals to identify complex research computing infrastructure requirements and ensure needs are reflected in plans and implemented services. 11. Provide line management for RCaaS research computing infrastructure staff including responsibility for performance and development, managing workload and recruiting staff where necessary. 12. Perform such other duties, appropriate to the grade, as More ❯
a Cyber Security Engineer role, preferably at an architect level. Strong knowledge of M365 security technologies (e.g., Defender, Azure). Hands-on experience with various security tools such as VulnerabilityManagement, Email Gateways, and Firewalls. Experience managing a small team and driving complex IT security projects. Excellent communication skills, capable of translating technical concepts for non-technical stakeholders. More ❯
a small IT team , providing leadership while also staying hands-on • ️ Continuously evaluating and improving processes and systems to support growth About You • Proven experience in a similar IT management or senior IT support role • Strong knowledge of Microsoft technologies : Active Directory, M365, Azure • Solid understanding of IT security practices and vulnerabilitymanagement • A natural problem solver More ❯
a small IT team , providing leadership while also staying hands-on • ️ Continuously evaluating and improving processes and systems to support growth About You • Proven experience in a similar IT management or senior IT support role • Strong knowledge of Microsoft technologies : Active Directory, M365, Azure • Solid understanding of IT security practices and vulnerabilitymanagement • A natural problem solver More ❯