Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
policies and initiatives. Threat Detection & Response : Leverage CrowdStrike and other EDR/XDR solutions to monitor, analyse, and respond to security threats. Identity & Access Management (IAM) : Design and enforce robust IAM policies, integrating with M365, Entra ID, and Active Directory. End User Computing Security : Implement security measures and controls … forensic investigations as needed. Optimize Security Posture: Enhance security configurations to maintain compliance and mitigate risks. Automate Security Controls: Streamline security processes and data management to enhance metrics and operational support. Security Compliance & Governance : Ensure security configurations align with compliance frameworks such as CIS, ISO 27001, NIST, and regulatory … a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. More ❯
technologies (firewalls, IDS/IPS, SIEM, etc.). Experience with security tools such as SIEM/SOAR platforms, endpoint detection and response (EDR) solutions, vulnerabilitymanagement, detection and response/remediation (VMDR) solutions and threat intelligence platforms. Knowledge of security standards and frameworks (e.g., NIST, CIS Controls, ISO More ❯
complex organisation, trading globally within a constantly evolving IT and information security threat environment. Impact of Role Implement governance framework to enable enforcement and management of IT and cyber policies across all JD entities. Help drive good security hygiene and the use of appropriate controls into the business culture … role resides in the Information Security Function and reports to the Global Head of Governance, Risk and Compliance. Direct Reports Individual contributor with possible management of a GRC Analyst and periodic oversight of seconded resources, contingent workers and systems integrators. Key Elements of the Role The job holder will … a company-wide consistent set of policies and standards used across all entities. Implement and maintain a robust policy development lifecycle ensuring effective policy management and review in line with compliance and technological advancements and changes. Analyse incidents and events to identify omissions and opportunities for improvement in accordance More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerabilitymanagement platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerability assessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). An More ❯
be the same. Experience in SIEM, SOAR, or Managed Security Services is essential. Additional hands-on experience with DDoS, WAF, IDAM, EDR, MDM , or VulnerabilityManagement is highly desirable. They are also open to candidates from operational security backgrounds who wish to transition into a client-facing, strategic More ❯