access, and remote gateway protection at the edge. Security Operations & Threat Defence Act as the technical escalation point for complex threat investigations and incident response. Lead red-teaming simulations, vulnerability assessments, and threat hunting activities. Support proactive telemetry monitoring and improvement of detection logic and alert fidelity. Leadership & Mentoring Provide engineering mentorship to junior analysts and engineers; lead by More ❯
IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusion detection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as needed System Monitoring Monitor system performance and identify areas for improvement Implement performance tuning More ❯
Perform system installations, configurations, and upgrades, adhering to best practices. Respond promptly to incidents, resolving issues within defined SLAs. Implement and manage system security measures, including patch management and vulnerability assessments. Collaborate with cross-functional teams to support infrastructure projects and deployments. Develop and maintain scripts to automate routine tasks and improve system efficiency. Document system configurations, procedures, and More ❯
Perform system installations, configurations, and upgrades, adhering to best practices. Respond promptly to incidents, resolving issues within defined SLAs. Implement and manage system security measures, including patch management and vulnerability assessments. Collaborate with cross-functional teams to support infrastructure projects and deployments. Develop and maintain scripts to automate routine tasks and improve system efficiency. Document system configurations, procedures, and More ❯
in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks, and office/branch assets. This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. … Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls, micro-segmentation More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
Dundee, Angus, Scotland, United Kingdom Hybrid / WFH Options
Reed
assets within ATM infrastructure. Stay current with emerging security trends and integrate advanced technologies and strategies to prevent card fraud, system vulnerabilities and operational liabilities. Conduct comprehensive risk and vulnerability assessments of ATM systems and deliver data-driven solutions to senior management. Effectively prioritise the level of risk/vulnerabilities, define strategies and roadmaps to implement reactive and preventive More ❯