Permanent Security Hardening Jobs in Yorkshire

8 of 8 Permanent Security Hardening Jobs in Yorkshire

Senior Technical Engineer (Sheffield)

Sheffield, UK
Genpact
a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is More ❯
Posted:

Senior Technical Engineer

Sheffield, England, United Kingdom
Genpact
a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is More ❯
Posted:

Senior Technical Engineer (Sheffield)

Sheffield, UK
Genpact
and services that enable the Enterprise Server Systems to operate on a daily basis for all Business Lines within. Distributed Compute consists of Engineering, ‘Security Risk and Compliance’, and Build and Deploy functions. Distributed Compute acts as the face of Unix/Linux/Windows platforms within IT Infrastructure … a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber Security More ❯
Posted:

Senior Technical Engineer

Sheffield, England, United Kingdom
Genpact
and services that enable the Enterprise Server Systems to operate on a daily basis for all Business Lines within. Distributed Compute consists of Engineering, ‘Security Risk and Compliance’, and Build and Deploy functions. Distributed Compute acts as the face of Unix/Linux/Windows platforms within IT Infrastructure … a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber Security More ❯
Posted:

Senior Linux System Administrator

sheffield, south yorkshire, yorkshire and the humber, united kingdom
Impact Team
and automated process to support the migration of infrastructure included in the sale of Business Units. The banks Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration, if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber Security More ❯
Posted:

Senior Linux System Administrator

handsworth, yorkshire and the humber, united kingdom
Impact Team
and automated process to support the migration of infrastructure included in the sale of Business Units. The banks Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration, if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber Security More ❯
Posted:

Senior Windows System Administrator

handsworth, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Impact Team
and automated process to support the migration of infrastructure included in the sale of Business Units. The banks Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber Security More ❯
Posted:

Senior Windows System Administrator

sheffield, south yorkshire, yorkshire and the humber, united kingdom
Hybrid / WFH Options
Impact Team
and automated process to support the migration of infrastructure included in the sale of Business Units. The banks Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber Security More ❯
Posted: