the cyber security industry Have a good understanding of modern IT technologies and services, such as Cloud Computing, Mobile Computing, IT Security, Infrastructure technologies, ZeroTrust and demonstrate an understanding of security architecture As a team were always looking?to?raise the bar, learn new things?and incorporate more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Microlise
tools and technologies to improve the efficiency and delivery of an integrated set of Mobile applications systems, whilst considering the principles and requirements of ZeroTrust Architecture, Information Security, Identity and Access Management, both locally and internationally Develop, maintain, and oversee Mobile Architecture principles, standards, policies, and procedures more »
them to functional/non-functional requirements, identify appropriate technologies, and evaluate market tools to meet business needs. Utilize knowledge of Secure Design Principles, ZeroTrust Principles, Secure SDLC, and Telecom Security (4G, 5G, IoT). Produce technical documents and artifacts in line with customer expectations as per … to align security requirements with business requirements. Familiarity with Control Frameworks like ISO 27001 and CoBIT for determining technical controls. Understanding of NIST-based ZeroTrust Standards. Proven experience in establishing ZeroTrust-based architecture for key use cases (Identity-Driven ZTA, Micro-segmentation based ZTA more »
risk-related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists.Proven experience of Least Privileged/ZeroTrust adoption, Data Leakage Protection strategies in enterprise businesses.Strong experience having developed and managed business continuity and disaster recovery plans for large-scale more »
depth knowledge of cloud security (AWS, Azure, GCP). Relevant certifications such as CSPM, CISSP, CISM, CEH, or AWS Certified Security – Specialty. Familiarity with zero-trust architecture and principles. more »
two years experience working within Secuirty Engineering · Understanding of Security Operations · Experience with security toolsets such as (but not limited to) SIEM, cloud security (zerotrust, CASB ect), SOAR, CVM tools. Desirable skills: · Experience with using Zscaler · Experience with using CrowdStrike. · Experience with using Qualys CVM. If you more »
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Purview Consultancy Services Ltd
related concepts to technical and nontechnical audiences at various hierarchical levels, ranging from board members to technical specialists. Proven experience of Least Privileged/ZeroTrust adoption, Data Leakage Protection strategies in enterprise businesses. Strong experience having developed and managed business continuity and disaster recovery plans for large more »
or Azure technology stack, including Web apps, traffic manager, serverless functions, CDN, application insights, CloudWatch, pipelines, storage and security. Experience with implementing and maintaining Zero-Trust concepts and policy enforcement. Understanding of software development methodologies and programming languages. Deep knowledge of continuous integration and delivery tooling such as … Github, ArgoCD, Docker, Kubernetes and Terraform. Understanding and experience using or deploying device-based trust applications (Okta Verify, Google Beyondcorp, Cloudflare ZeroTrust, etc). Extensive knowledge of RBAC/ABAC concepts and operating policies. Excellent technical documentation and KB writing skills with the ability to contribute more »
Employment Type: Permanent
Salary: £60000 - £85000/annum Excellent bonus and benefits
be able to communicate effectively and be comfortable with managing expectations. Role Requirements CCIE Certification Cisco routers and switches, firewalls, load balancers, and VPNs, ZeroTrust & SD-WAN End-to-End Network Design & Implementation Experience Demonstrated Experience within Finance is excellent What's in it for you? Full more »