requested. German or French as a first or second language preferable but not essential. Qualifications CISSP or similar preferred. Familiarity with encryption fundamentals and networkdesign required. 1+ years of Third-Party Risk Management consulting (including vendor cybersecurity risk) at a Big 4 consulting firm or vendor risk … for results. Clear communication and writing skills. Ability to conduct deep client discovery to uncover root cause problems and build trusted relationships. Ability to design programs and solutions with minimal guidance and oversight. About BlueVoyant At BlueVoyant, we recognize that effective cyber security requires active prevention and defense across More ❯
Portsmouth, yorkshire and the humber, United Kingdom
Paradigm Tech
DBS clearable Nice to have Industrial Protocol Knowledge (IEC 61850, DNP3, Modbus etc) IOT and Edge Computing (NodeRed, MQTT etc) IT/OT Convergence Networkdesign and configuration Cyber Security If you think this is a good match please do not hesitate to apply and I will be More ❯
portsmouth, hampshire, south east england, United Kingdom
Paradigm Tech
DBS clearable Nice to have Industrial Protocol Knowledge (IEC 61850, DNP3, Modbus etc) IOT and Edge Computing (NodeRed, MQTT etc) IT/OT Convergence Networkdesign and configuration Cyber Security If you think this is a good match please do not hesitate to apply and I will be More ❯
warrington, cheshire, north west england, United Kingdom
Paradigm Tech
Instrumentation solutions. Nice to have Industrial Protocol Knowledge (IEC 61850, DNP3, Modbus etc) IOT and Edge Computing (NodeRed, MQTT etc) IT/OT Convergence Networkdesign and configuration Cyber Security If you think this is a good match please do not hesitate to apply and I will be More ❯
H&S awareness - SSSTS or SMSTS preferred CSCS card or equivalent - essential Experience of some or all of the following is desirable: Plant Historians Networkdesign and configuration Cyber Security Functional Safety Industrial Protocol Knowledge (IEC 61850, DNP3, Modbus, OPC etc) If you wish to speak to a More ❯
succeed in their own fields. ROLE OBJECTIVE We are seeking a highly skilled Cyber Security Consultant with a strong background in penetration testing and network security. This role is ideal for a cybersecurity professional with experience in identifying, assessing, and mitigating security risks across various platforms. The consultant will … NIST). Assist in the deployment, configuration, and management of security infrastructure and technologies, including firewalls, intrusion detection/prevention systems, and secure network architectures. Provide guidance and support on Azure security practices, leveraging expertise in Microsoft Azure security frameworks and best practices. Stay updated with the latest cybersecurity … ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp Suite, Nessus, and Wireshark. Strong understanding of network protocols, firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on More ❯
be successful in this role, you will need: Level 2 Engineers : A minimum of 1 year of IT support experience, a good understanding of network systems, and a strong problem-solving mindset. Level 3 Engineers : At least 3 years of experience, including server migrations, Microsoft 365 implementations, and network … and knowledge of: Windows Server () Microsoft Exchange VPN Technologies, Microsoft 365 Administration, Active Directory VoIP systems, Networking (DHCP, DNS, TCPIP), Wireless Networking Firewall and Network Security Technologies Virtualisation (Hyper-V, VMWare), SAN, NAS PowerShell scripting for automation and tasks Interested? Apply for position by filling out the contact form … involve? Level 2 Tasks: Day-to-day desktop support and troubleshooting, both remote and on-site. Installing, configuring, and repairing hardware and software. Supporting network performance and security by monitoring systems, investigating issues, and enforcing policies. Setting up backup solutions and VoIP systems. Level 3 Tasks Handling escalations from More ❯