Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Hamilton Barnes
Engineer to join a prestigious global bank, based in Manchester, you will play a pivotal role in the implementation and support of our Nessus VulnerabilityManagement tooling. This is an exciting opportunity to work onsite 2 to 3 days per week, collaborating with a team of experts to … data. Join on an initial 6-month contract, with a strong possibility of extension for over 12 months. Key Responsibilities: Deploy and configure Nessus VulnerabilityManagement tools to meet the clients security requirements. Experience in the implementation of enterprise-wide security controls to secure systems, applications, network, or … infrastructure services. Ensure compliance with industry standards and regulatory requirements through diligent vulnerabilitymanagement Provide technical support and guidance to team members and other departments as needed. Responsible for adding scan policies, audit policies, and credentials to Security Center, and Nessus Manager. What you Will Ideally Bring: Extensive more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerabilitymanagement reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerabilitymanagement reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Raytheon
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerabilitymanagement and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
comprehensive in-house delivered training plan covering: Cisco VPN Azure Active Directory/Entra Meraki Wi-Fi Intune/Autopilot (in development) Mobile Device Management and deployment Windows 10 Office 365 and Power BI Microsoft Always On VPN (in development) Microsoft Defender for Endpoint Strong understanding of cyber and … demonstrate that you have actively been developing a journey in reducing on-premise hardware to drive cloud-based benefits. Experience with Microsoft Azure, SaaS, vulnerabilitymanagement, and the ability to work effectively alone or as part of a small busy team are essential for our operational development. The … with other places to enhance Network, WAN, VPN, Telephony, Mobile devices, cyber approach and modern workspace environments. Person Specification Additional Requirements Essential Mobile Device Management and deployment Qualifications Essential Degree in a computing science or equivalent experience delivering IT infrastructure Desirable A certification which confirms ongoing self development Experience more »
different data sources and tools for analysis. Previous experience of mentoring or leading SOC analysts is desirable but not essential. Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme Pension more »
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
Manchester Area, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
Excellent understanding of cybersecurity trends Ability to interpret customer landscape and challenges Strong presentation and client-facing skills Desired Skills: Knowledge across EDR, SIEM, VulnerabilityManagement Operational experience with security technologies Existing relationships in Manchester area Self-motivation and ability to work autonomously Job Specifics: This is a more »
Manchester Area, United Kingdom Hybrid / WFH Options
GS Solutions
have worked within a Networking/Security setting recently. Experience solutioning Cisco, Fortinet, Juniper, Palo Alto, Netskope, Zscaler, CrowdStrike (At-least two or more) VulnerabilityManagement/EDR/DDoS/WAF/PAM – Beneficial MUST have an excellent understanding of current cyber security trends. more »
York, England, United Kingdom Hybrid / WFH Options
Candour Solutions
skills: · Demonstrable experience in an IT infrastructure support or similar role. · Microsoft products (Windows, SCCM, O365, Intune, Azure, SQL) · VMWare (vCenter, ESX, Horizon) · Storage management and administration · Experience of configuring and troubleshooting TCP/IP networking, including switches, routers, firewalls, VLANs and VPNs · Understanding of ITIL And how you … externally provided IT services, including potential involvement with our customer-facing environments. · Maintain and manage the company’s IT security systems, including patching and vulnerability management. · Identify weaknesses in line with IT industry developments and implement improvements. · Monitor and manage backups, resolving any issues may that occur. · Implement IT more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »
and escalations, manage 3rd-party technical support. Provide security metrics, maintain documentation, and collaborate on technology design. Oversee security platform support, incident response, and vulnerability management. Track cyber threats, support vulnerability analysis, and lead system patching and updates. Integrate security into BAU processes, maintain technical design documentation. Act more »