Hinckley, England, United Kingdom Hybrid / WFH Options
DP World
resource utilization Implement and manage multi-factor authentication solutions for enhanced security across various systems and applications. Manage and monitor Endpoint security Platforms including detection and respond to advanced threats. Implement and maintain web and reverse proxy solutions, ensuring secure and reliable access to internal and external resources. Implement … services. Implementing security measures and protocols to safeguard the organization's IT infrastructure from potential threats and cyberattacks. This may include setting up firewalls, intrusiondetection systems, and access controls. Investigating and resolving technical issues related to hardware, software, and network components. Troubleshooting may involve diagnosing problems, working … self starter, adaptable who welcomes challenge and problem solving Solid experience in managing and maintaining Windows Server environments, knowledge of Endpoint protection for threat detection and response. Exposure and experience in implementing various IT infrastructure in a fast paced challenging environment Proficiency in backup and replication technologies, such as more »
Stone, Staffordshire, United Kingdom Hybrid / WFH Options
yolk recruitment
resolving hardware, software, and network-related problems to minimise downtime and ensure reliability. Implementing security best practices, such as access controls, encryption, firewalls, and intrusiondetection/prevention systems, to protect against cyber threats. The experience you will bring to the team: Experience in the design, build & maintenance more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
a network, phishing, port scanning, web application attacks, DDoS, lateral movement. Experience with security monitoring, incident response, and vulnerability management. Understanding of malware analysis, intrusiondetection/prevention systems, and endpoint security solutions. Ability to analyze and interpret security logs and data. Role can work hybrid, for a more »