Merton, London, United Kingdom Hybrid / WFH Options
Abel & Cole
and infrastructure as code techniques like Azure Bicep and Terraform. You have knowledge of security concepts including zero trust and techniques for addressing modern cybersecurity challenges. You are knowledgeable about CDNs, Web Application Firewalls, and other edge performance and security tools. You have experience developing software using Microsoft .Net and More ❯
Windows Server, macOS). Knowledge of Microsoft software (Office 365, InTune). Manage and maintain Windows Active Directory (Hybrid). Experience with Asset Management. Cybersecurity and Risk Management Understanding cybersecurity frameworks (ISO 27001, NIST). Knowledge of firewalls, IDS/IPS, and antivirus systems. Incident response and disaster recovery planning. More ❯
operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate security risks, ensuring the environment is protected against potential cyber threats. Cybersecurity & Compliance: Implement and enforce cybersecurity best practices for … both IT and OT systems in the development environment. Ensure compliance with defence cybersecurity standards, including securing Windows Server domains, Linux systems, and all network infrastructure from internal and external threats. Automated Monitoring & Reporting: Develop automated solutions for continuous monitoring of IT assets, network traffic, and system vulnerabilities. Generate regular … reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯
london (new malden), south east england, united kingdom
Northrop Grumman
operations. Vulnerability Assessments: Support vulnerability assessments of the development environment, including all networked systems, operating systems (Windows and Linux), and virtualisation platforms. Work with cybersecurity teams to identify and remediate security risks, ensuring the environment is protected against potential cyber threats. Cybersecurity & Compliance: Implement and enforce cybersecurity best practices for … both IT and OT systems in the development environment. Ensure compliance with defence cybersecurity standards, including securing Windows Server domains, Linux systems, and all network infrastructure from internal and external threats. Automated Monitoring & Reporting: Develop automated solutions for continuous monitoring of IT assets, network traffic, and system vulnerabilities. Generate regular … reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection/prevention systems (IDS/IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans More ❯