We have an exciting new opportunity for aCyber Defence and Security Operations Managerto join the A&O Shearman Belfast office. Apply today via the link below or contact for more information. About the team The firm's ability to keep our clients' data secure is a bedrock for our reputation as a trustworthy professional services partner to many of … the world's large and prestigious organisations. Information security is not an afterthought; it is core to all that we do, to protect not only our data but that of our clients, and has the unwavering support of the Board. Led by our new CISO, the in-house Information Security team is a core part of our technology … services structure with mature or evolving capability across all areas of digital security and cyber defence. We align our efforts to the NIST framework and other recognised certifications including ISO27001 and SOC2 and strive to keep pace with the continually evolving threat landscape, in support of A&O Shearman's strategy to lead where global complexity creates opportunity. In More ❯
your career, then that is what you will get, and more. Job Summary: The Vulnerability & Compliance Lead is responsible for tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization's infrastructure and endpoints and monitoring and reporting on vulnerability and other security compliance status. This role requires collaboration with various departments to … ensure that all security patches and updates are applied promptly and effectively. Additionally, the Lead ensures that the organization's security posture remains strong and compliant with industry standards. Key Responsibilities: Knowledge: Subject Matter Expert in vulnerability remediation, offering guidance and support to ensure effective remediation processes Prioritization: determine remediation priorities based on vulnerability severity, exploitability, and potential … business impact Planning: Develop strategies to address identified vulnerabilities, including applying patches, updating configurations, and implementing software updates Coordination: Work closely with vendor support, security, application teams and others to prioritize and remediate identified vulnerabilities Monitoring and Reporting: track and report on vulnerability and compliance status Continuous Improvement: regularly review and analyze data and processes and implement agreed More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
McLaughlin & Harvey
IT Security Analyst Location : Mallusk, Belfast Salary : Competitive plus benefits Contract Type : Full Time, Permanent Build your Future with Us! Are you an experienced IT Security Analyst with a true passion for excellence looking to take your career to the next level? At McLaughlin & Harvey we position our people for success and have built a culture on collaboration. … We are seeking an experienced IT Security Analyst to enhance our team and drive success across our high value projects. This is an exciting time to join McLaughlin & Harvey due to a planned departmental expansion we have opportunities for growth and progression within the team. Why join us? Exciting Projects - Work on varied sector projects and leave a lasting … will be doing Developing a thorough understanding of McLaughlin & Harvey's IT environment and enterprise applications, you will be responsible for the operational management of the Company's Information Security Management System and ensuring that our IT governance, risk management, and compliance measures are effective and implemented. The role will support the implementation and maintenance of security controls More ❯
Telegraph Top 100 Companies List for 2024. Our staff are at the heart of everything we do and achieve. We have an exciting new career opportunity for an Information Security Manager within our IT team. Please note, given the nature of this role, the successful candidate will require to undertake an AccessNI background check. Location: Randox Science Park … Contract Offered: Full-time, Permanent, Onsite working. Working Hours/Shifts: 40 hours per week, Monday to Friday. What does this role involve? This role is responsible for network security analysis, monitoring and incident response, as well as maintenance and configuration of network security tools. Security Analysts will work with the latest technologies to detect, analyse … and limit intrusions and security events. Performing network securitymonitoring and incident response using industry leading software and techniques to identify indicators of compromise (IoCs) and anomalous activity. Play the lead role of Identity and Access Management. Support the delivery of systems to protect the Confidentiality, Integrity, and Availability of Randox networks. Perform vulnerability scans and advise More ❯
network devices Support Microsoft 365 administration (Teams, Exchange Online, SharePoint, OneDrive) Configure and manage site-to-site and remote access VPN connections Oversee routine systems maintenance, patching cycles, and securitymonitoring Maintain and update technical documentation, support logs, and change controls Participate in client infrastructure projects including server upgrades, migrations, and network improvements Collaborate with team members and More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
PA Consulting
achieve enduring results. We are over 4,000 strategists, innovators, designers, consultants, digital experts, scientists, engineers, and technologists. And we have deep expertise in consumer and manufacturing, defence and security, energy and utilities, financial services, government and public services, health and life sciences, and transport. Our teams operate globally from offices across the UK, Ireland, US, Nordics, and Netherlands. … if you don’t meet every requirement below, feel free to still apply as we are often hiring for similar roles which your background might be better suited to. Security management of industrial control and operational technology systems and applications such as: Process control SCADA Distributed control PLCs and RTUs Industrial cyber security and data communications Electricity transmission … and distribution network control. IoT and Industrial IoT Industrial cyber security risk management, architecture and securitymonitoring Key industries such as: Electricity generation, transmission, distribution and distributed energy Smart energy and metering Oil and gas Water Civil Nuclear Transport (including aviation, rail, maritime, road and autonomous vehicles) Wider critical infrastructure Security standards relating to the sector More ❯