Engineer to join the IT team. As the first line of defence in the IT department, the principal purpose of this job mainly focusses on information security, cybersecurity and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application … security both development and testing phrase, terminal security, backup security, third party and supply chain security of IT service provider.Liaison with the Head Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline … of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and dataencryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information More ❯
Your new role - Permanent - ON SITE 5 Days per week. - UK Only The principal purpose of this job focusses on information security, cybersecurity and data security, including a wide scope, such as physical security of computer rooms, operating system level security of Windows and Linux, network security of firewall and other security devices, application security both development and testing … phrase, terminal security, backup security, third party and supply chain security of IT service provider.Liaison with the Head Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in place and … of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and dataencryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information More ❯
Your new company - Financial Services Your new role - Permanent - ON SITE 5 Days per week. - UK OnlyLiaison with the Head Office, Security Operation Centre of Data Centre for implementing security policies, projects and security controls. Work with Internal Audit and other departments to execute penetration tests, cybersecurity risk self-assessment, ensure best practice and international baseline standards are in … of network infrastructure and data.- Manage risk assessments and vulnerability assessments to identify potential security threats.- Oversee the implementation of security measures such as firewalls, intrusion detection systems, and dataencryption technologies.- Provide training and guidance to staff on information security best practices.- Stay updated on the latest cybersecurity trends and technologies.**Qualifications:**- Bachelor's degree in Information More ❯
london, south east england, united kingdom Hybrid / WFH Options
RSSB
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
RSSB
or redeployment of IT assets. Support asset lifecycle management, including maintenance and compliance with device policies and regulations. Promote and implement best practices for device security, ensuring endpoint protection, dataencryption, and policy compliance. Identify trends and recurring issues in incidents and service requests to inform problem management processes and propose permanent solutions. Maintain accurate records of IT More ❯