reading, south east england, united kingdom Hybrid/Remote Options
Axiom Software Solutions Limited
proportionate to the risk. Maintain cyber security solutions with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Perform proactive threat hunting for new and emerging cyber threats. Specialist in Operational Technology systems, defining monitoring alerts and ensuring the operation of effective security controls. Collect data that drives … effectiveness of security controls and relate them to appropriate (and proportionate) security controls. Responsible for helping the business to deliver new security controls and for performing proactive activities (e.g. threat hunting) to continuously evaluate and uncover vulnerabilities throughout the technology stack. Act as an ambassador within the Cyber Security team for the application of a risk-based … Responses to incidents are run in a structured, measured and auditable manner with continuous improvement integrated into incident management processes to ensure processes are always adapting to the changing threat landscape. Reduction over time in business impacts experienced as a result of cyber security incidents. Time between incident identification and remediation/closure reduces over time. The More ❯
Banbury, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
. Key purposes of this role include: Safeguarding Operations: Actively manage and enhance our security platforms (primarily SIEM, XDR and IDAM polices) to detect, prevent, and respond to cyberthreats across our IT and operational networks. Implementing and reviewing Security Controls: Serve as the subject matter expert for implementing technical security controls on applications, networks, and infrastructure to … with a wide range of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability … infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security More ❯
Hook Norton, Oxfordshire, United Kingdom Hybrid/Remote Options
Chiltern Railways
. Key purposes of this role include: Safeguarding Operations: Actively manage and enhance our security platforms (primarily SIEM, XDR and IDAM polices) to detect, prevent, and respond to cyberthreats across our IT and operational networks. Implementing and reviewing Security Controls: Serve as the subject matter expert for implementing technical security controls on applications, networks, and infrastructure to … with a wide range of internal teams, from IT colleagues to Train Engineers, to ensure security best practices are understood and integrated into their processes and systems. Key Accountabilities Threat and Vulnerability Management Develop incidence response and security measures for protection. Complete risk and exploitability assessments against vulnerabilities and live threats. Serve as a subject matter expert in vulnerability … infrastructure, cloud services, and cyber security. Proven continuous development in both technical and soft domains. Proficiency with security tools and technologies such as SIEM, DLP, network protection, threat detection, and endpoint protection. An understanding of network infrastructure such as VPNs, firewalls, switches, routers, LANs, Intrusion Detection, and vulnerability scanning. Understanding of IT and cyber security More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Kingdom People
experience of using AWS cloud in particular. You will also need to show that you have detailed knowledge in dealing with and mitigating against the wide range of Cyberthreats that are emerging at an ever increasing rate. More ❯