procedures for use across multiple information systems or support compliance with them. Apply routine security procedures appropriate to the role, such as patching, managing access rights, malware protection, or vulnerability testing with autonomy. Develop and test rules for detecting violations of security operating procedures with autonomy. Lead small teams managing Cyber Security operations within an organisation. Champion secure design … build tooling to support pre-commit, Continuous Integration, Continuous Deployment through to production. They have experience of operating systems, Networking, PKI and Cloud Security tools. They build Secure Configuration Management using Infrastructure as Code Role Criteria Essential Criteria Demonstrable experience in design, delivery and operation of cloud native vulnerabilitymanagement, security monitoring and cyber incident managementMore ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
positive difference to the lives of our clients, customers, colleagues, shareholders and society. We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent. Aberdeen comprises three businesses, interactive investor (ii), Investments and Adviser … others. Proactive strategic leadership, demonstrable skills in the design, communication and delivery of end user technologies. Ability to engage and communicate at all levels from technical SMEs to Executive Management Experience working in partnership with a Tier 1 Systems Integrator, in a blended model. Ability to quickly learn, implement and utilize new technologies. Technical Skills The candidate is expected … Enterprise Applications Solid understanding of Identity Governance & Administration within the context of a highly regulated environment. Azure Virtual Desktop Administration (inc Azure Networking) Experiencing working with Endpoint Configuration/Management & Application Delivery technologies such as Intune & MEM. Experience implementing IaC/DSC via Terraform to manage M365 & EntraID. Azure Virtual Desktop (inc Networking) Defender for Endpoint experience with vulnerabilityMore ❯
mentor junior staff members. About you To be successful in this role you will have: Qualifications, certification or relevant experience in a cybersecurity-related field Experience in security risk management and applying frameworks under the DSPF, ISM, ISO27001, etc. Experience with Defence Assessment and Authorisation (A&A) processes. Experience in vulnerabilitymanagement tools, Windows and Linux cybersecurity More ❯
Forescout FSCA) plus real-world project work that doubles as hands-on experience. 100+ hours of live training Practical skills in troubleshooting, networking (Cisco), Azure cloud, Splunk SIEM & Tenable vulnerabilitymanagement Job guarantee with our hiring partners Get certified, get experience, get hired. Apply today and start your journey into cyber security. Course cost - £2795, or, £232.91 per More ❯
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
a positive difference to the lives of our clients, customers, colleagues, shareholders, and society.We are focused on growing our direct and advised wealth platforms and repositioning our specialist asset management business to meet client demand. We are committed to providing excellent client service, supported by leading technology and talent.Aberdeen comprises three businesses, interactive investor (ii), Investments, and Adviser, each … scalable growth - all built on a continuously evolving modern data platform. About the Role As a Junior Engineer (Data), you will be responsible for supporting the design, implementation, and management of a decentralized data architecture based on the principles of Data Mesh. This role leverages a Modern Data Stack of technologies such as Snowflake, DBT, Microsoft Azure and Microsoft … Support the Platform Technical lead in design and implementation of a Data Mesh architecture, enabling decentralized data ownership across various domains. Build platform capabilities to support the creation and management of Data Products, allowing domain teams to own and operate their data. Develop and maintain the centralized data cloud infrastructure using Snowflake, DBT, and Microsoft Azure, and automate data More ❯