identified vulnerabilities and weaknesses. Develop & establish supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. Ensure timely and robust incident management resolution, including major incident response coordination and management. Stay informed about emerging cybersecurity threats and trends, providing recommendations for proactive risk mitigation and threat … CISA, CISM, etc.) are a plus. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, EDR platforms, SIEMs (Splunk/Azure Sentinel), Powershell etc. Strong analytical and problem-solving skills, with the ability to effectively prioritise more »
Security Review (CSR) Compliant Using expert knowledge of Cybersecurity Frameworks and Standards Using legal and regulatory understanding to provide guidance to wider teams Personnel Management & in-house training Stakeholder engagement Management Analysis of vulnerabilitymanagement tools reverse engineering rule engineering & Crisis Management (Alert Triage) Required … Purple Teaming Understanding of computer forensics History with use of Firewalls and IDS/IPS devices Proven ability with SIEM (Security Information and Event Management) technologies Experience in networking, routing, and switching Use of frameworks such as NIST, ISO 27001,MITRE ATT&CK and CIS. Familiarity with cybersecurity laws more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threat management, and vulnerabilitymanagement, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Avanti Recruitment
considered Kubernetes – proven production experience, autoscaling, overprovisioning etc. Serverless - Lambda Scripting for automation Good knowledge of Cloud Security – Security hub, guard rails, RBAC, IAM, vulnerabilitymanagement, Patch Management. A Security first mentality to ensure Security is built into all elements of their platforms. Linux Server Administration – Command Line more »