Birmingham, Staffordshire, United Kingdom Hybrid / WFH Options
CET Structures Limited
with the outsourced SOC service provider and respond to alerts, incidents and other support requests Implement and enforce security best practices across infrastructure, systems and access control. Conduct regular vulnerability assessments and assist in remediation planning. Monitor and respond to threats via the Darktrace Dynamic Threat dashboard. Support compliance with ISO27001, GDPR, and other regulatory or audit requirements, working … SharePoint, Teams, Intune and OneDrive for Business. Strong hands-on knowledge of Information Protection and DLP, eDiscovery and Purview, Insider Risk Management, Defender for Cloud, Defender for Endpoint, Defender Vulnerability Management, Microsoft Sentinel, Azure Log Analytics, Azure Backup and Recovery, Azure VMs Knowledge of DNS, DHCP, VPNs, firewalls, and IP routing in cloud environments. Hands-on knowledge with secure … data exchange using SFTP and other technologies Understanding of ISO27001 and GDPR; familiar with enforcing security policies and performing vulnerability assessments. Skilled in maintaining and creating accurate technical documentation and working within a change-managed environment. Excellent communicator, both verbally and written Desirable Skills Hands-on experience with administering Cisco Meraki and Sophos firewalls Working knowledge of managing SQL More ❯
availability by aligning security strategies with business objectives and complying with laws and industry standards. We act as the incident response team, and focus on threat intelligence, incident management, vulnerability assessments, access control, and security awareness training. We use advanced technologies like firewalls and System Information Event Monitoring systems to counter security threats and work closely with other departments … support. Contribute to the ongoing information security program, addressing all aspects of security from on-premises to cloud (Azure) and web application security. Participate in the system hardening and vulnerability management programs, providing direction to key business areas on their focus points. Participate in evidence gathering for the SOC audit process when required. Stay abreast of industry trends and More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
encryption. * Ensure the security and integrity of the organisation's network infrastructure. * Collaborate with various departments to develop and enforce network security policies and procedures. * Conduct security assessments and vulnerability assessments to identify and mitigate potential risks. * Development of OT security solutions * Stay up to date with the latest industry trends and emerging technologies in network security. * Provide support More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom
Crimson
policies, and procedures to ensure clear understanding across the organisation. * Stay up-to-date with the latest security trends, technologies, and regulations to continuously improve our security practices. * Conduct vulnerability assessments and risk analysis. * Conduct Security Audits and Assessments: Perform regular security assessments to ensure compliance with industry standards. * Create and maintain security policies to ensure data confidentiality, integrity More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
Birmingham, West Midlands, England, United Kingdom
James Andrew Recruitment Solutions (JAR Solutions)
organisation Analyse future AI possibilities to drive operational efficiencies Identify and mitigate emerging technology challenges Security & Compliance: Ensure robust GDPR practices and data protection protocols Manage cybersecurity frameworks and vulnerability assessments Develop and test business continuity and disaster recovery plans Maintain IT policies and procedures for new technologies Operational Excellence: Coordinate with third-party IT providers for seamless service More ❯