Employer: DWS Group Title: Cyber Threat Intelligence and VulnerabilityManagement Specialist (VP) Location: London About DWS: Today, markets face a whole new set of pressures – but also a whole lot of opportunity too. Opportunity to innovate differently. Opportunity to invest responsibly. And opportunity to make change. Join us … are in place, and aligned and agreed with relevant stakeholders. Roles within Information Security may cover one or more areas of speciality: Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.) Information Security (“IS”) Operations (which may for example include, cyber threat operations … data leakage etc.) IS Technology (which may include IS architecture, IS engineering, cryptographic services etc.). Role Details: As a Cyber Threat Intelligence and VulnerabilityManagement Specialist you will (be): Lead the DWS Cyber Threat Intelligence and VulnerabilityManagement capability, liaising closely with the central Threat more »
WTW and our customers. The Role: Responsible for configuration and design guidelines of the network security estate Provide technical support to Audit & Compliance, Capacity Management, Lifecycle Management, VulnerabilityManagement and Risk Management Functions. Provide technical leadership during major incidents and drive to quick resolutions. Coach … science, engineering, information technology strongly preferred, or relevant industry experience in related field. Extensive and strong experience in IT or Telecoms industry. Network Security management experience. Firewall, Proxy, Prisma Access, Cisco ISE. Meraki experience would be advantageous. Ability to present and explain technical information in a way that establishes more »
Bromley, London, United Kingdom Hybrid / WFH Options
Adecco
attention to detail, and the ability to work effectively under pressure are also crucial. The ideal candidate will have experience with penetration testing, network vulnerability mitigation, and cloud technologies. Familiarity with Entra, Azure, Tenable.io, Fortinet Firewalls, and Rapid7 is highly desirable. Join our client's team and contribute to … we will be happy to support you. KEYWORDS: Cybersecurity/Cyber Security/Azure/Cloud Security/Network Security/Identity and Access Management/IAM/Firewall/Penetration Testing/PEN Testing/O365/Office 365/Active Directory/AD/Incident Response/… Intrusion Detection/Intrusion Prevention/IDPS/Fortinet/Tenable.io/Entra/Rapid7/Scripting/Group Policy/Cloud Technologies/VulnerabilityManagement/Security Audits/Phishing/Pharming/Security Policies/Security Patching/Infrastructure Security/Network Vulnerabilities/Threat Detection more »
are in place, and aligned and agreed with relevant stakeholders. Roles within Information Security may cover one or more areas of speciality: Identity & Access Management (which may include, for example, authentication; access management & control; recertification etc.) Information Security (“IS”) Operations (which may for example include, cyber threat operations … GCP and Azure) Evaluate and enhance cloud security posture by identifying and mitigating security risks Implement best practices for cloud security, including identity & access management, encryption, and threat protection Ensure adherence to security policies, industry standards, and regulatory requirements Implement security measures for cloud-based infrastructure Oversee network security … firewalls, VPNs, IDS/IPS, and other perimeter defence systems Collaborate with infrastructure teams to implement system hardening and secure network architecture Work with VulnerabilityManagement team to assess and remediate across hybrid environments Implement and maintain security monitoring systems Monitor and respond to security alerts, and coordinate more »
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
Security Framework Development : Create, implement, and enhance security frameworks for both AWS cloud and on-premise systems to safeguard infrastructure, applications, and sensitive data. Vulnerability Oversight : Direct the vulnerabilitymanagement process, encompassing scanning, analysis, and the development of remediation strategies. Incident Management : Lead the response to more »
be 12-15 working days per month. Key skills:- Review, update and advise on the current security policies Work alongside the external security provider Vulnerability and Risk management Security Frameworks and Maturity, Control Validation and Risk Review Threat and VulnerabilityManagement Work with the business and more »
e.g., NIST, ISO, CIS, etc.). Excellent knowledge of penetration testing tools, and practices for ethical hacking. Excellent knowledge of Security Information and Event Management technologies and processes. Excellent knowledge of Threat and VulnerabilityManagement technologies and processes. Strong knowledge of Threat Intelligence systems and processes. Strong more »
roles, ideally at a Senior level Experience in a range of security domains like Infrastructure, Cloud, Applications and Networks Technical skills in EDR & SIEM, VulnerabilityManagement, Network Security, Attack Surface Management and various other areas. This role will be based remotely but you will need to make more »
Job title: Cyber Security Engineer Salary: £100,000 + Bonus/Benefits Location : London (Hybrid) Skills: Incident Response, VulnerabilityManagement, Monitoring, Security Frameworks My client is a top ranked, technology-driven trading firm run by Computer Scientists and Olympiad winning mathematicians from some of the top global tech … Desktop, Storage, Network, Database, F/Walls, SaaS, Virtual Machines. · Understanding of enterprise security . Demonstrate Understanding of DLP, IPS, Endpoint, anti-malware, Sandbox, Vulnerability scanners · Good communication skills If you think that this could be a good fit for you, then please apply by submitting a copy of more »
Bromley, London, United Kingdom Hybrid / WFH Options
Adecco
updates. Knowledge of FortiNet firewalls. Experience with Dell servers, including iDrac management. Understanding of Veeam and Zerto data resiliency platforms. Familiarity with Rapid7 for vulnerability management. Analyse, troubleshoot, and resolve incidents escalated from 1st and 2nd line support. Interact with vendors for support escalations. Knowledge of ITIL practises. Ability more »
of compliance audits and ensure adherence to existing and emerging regulations and standards, including NIS, NIS2, NIST, CSF, ISO27001, IEC62443, etc. Main Responsibilities Risk Management: Manage risks and vulnerabilities, including assessments, compliance reviews, audits, and tracking using the GRC tool (OneTrust) in accordance with NIST standards. Compliance: Ensure the … Security Committee. Security Standards: Manage security standards, policies, and practices annually to ensure they meet the company's assurance plan. Incident Assessment: Assess incidents, vulnerabilitymanagement, patching status, penetration test results, phishing, and social engineering tests and attacks. Framework Adoption: Lead the adoption, continual improvement, and certification on … experience in managing third-party audits, compiling evidence, and organizing audit responses. Education: Bachelor’s degree in information cybersecurity or certifications in cybersecurity, risk management, governance, or a related field. Skills and Competencies: Highly effective written and verbal communication skills; excellent presentation skills. Attention to detail and a strong more »
Greater London, England, United Kingdom Hybrid / WFH Options
Infinite Computer Solutions
team and local AV vendor Regional Technical Lead Escalation point for the other desktop members Adoption of Tanium & ControlUp Opening tickets with Microsoft Windows Vulnerabilitymanagement via RiskSense and powershell scripting Asset life-cycle replacement, reporting and recycling EMEA Meeting room monthly reporting Process automation – power automate, MS more »
measures reporting as required, and confidently using Google analytics and associated tools regularly. Developing self and others Number of Direct reports 0 Overall people management responsibility 0 Responsible for maintaining an up-to-date knowledge of coding practices and innovation within web development through continuous professional development. Working as … visual hierarchy, layout, typography and colour in web applications. Understanding of web-based security and best practice including data encryption, secure coding practices and vulnerability management. Desirable Experience with the Shopify E-commerce platform, including integrations with email service providers Understanding of unit testing and test automation processes Experience more »