CyberSecurity Engineer! Hybrid, 2 days PW in Reading - to £50k Are you passionate about safeguarding digital landscapes and eager to work in a dynamic environment? Our team is seeking a skilled CyberSecurity Engineer to help shape the future of digital security initiatives. This … role would suit someone with some HANDS ON inf skillm with some brushes and cyber resopnsiblity to move into a full time cyber role. Why You'll Love This Role: Drive innovation in cybersecurity solutions. Work collaboratively with cross-functional teams. Develop strategies that align … standards. Key Responsibilities: System Hardening & Compliance: Create and maintain secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cybersecurity strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cybersecurity engineering documentation, policies, and procedures. Integration & Assessment more »
Cyber Threat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cybersecurity and protect critical digital landscapes? We are looking for a passionate and skilled Cyber Threat & Vulnerability Analyst to join a great team and help us … and data. Why You'll Love This Role: Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and … maintain threat assessment and vulnerability management (TVM) documentation, policies, and procedures. Integrate advanced cybersecurity solutions with existing systems and infrastructure. Investigate and mitigate newly identified cybersecurity vulnerabilities. Coordinate with stakeholders on cybersecurity patching and vulnerability management. Participate in major incident response more »
Positions: 1 Role Description: We are looking for an experienced ZTA Architect with 8 to 10 years of technical experience in two or three security domains (Network Security, IT Security, Cloud Security, Identity and Access Management, Application Security, Data Security, PKI & Encryption) at the … enterprise level. This role will have a significant impact by ensuring the implementation of key security projects using cutting-edge technologies. Key Responsibilities: Review and validate the architecture and design of new and existing projects (IT Infrastructure Projects, Applications) against industry standards, organization s architecture principles, and design … patterns. Highlight risks and areas for improvement. Ensure adherence to applicable compliances, security policies, and regulatory requirements. Understand and document business requirements for cybersecurity projects, map them to functional/non-functional requirements, identify appropriate technologies, and evaluate market tools to meet business needs. Utilize knowledge of Secure Design more »
Placement Programme *Please note this is a training course and fees apply* Are you looking to benefit from a new career in IT and Cybersecurity? Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers. We help place graduates from this … programme into top UK companies and organisations needing to employ entry-level IT and Cybersecurity staff that can hit the ground running with up-to-date skills gained from this programme. The best part is you will not need any previous experience as fully accredited training, which includes tutor support … step is completing a selection of professional, accredited and industry recognised courses from CompTIA which is the global leader in IT Technician, Networking and Cybersecurity training. The training is delivered via multimedia rich video tutorials, practice labs, presentations and quizzes through a portal that you study from home. You will more »
discipline service delivery function and will be responsible for providing expertise in disciplines such as software configuration, SMART instruments and disaster recovery, whilst considering cybersecurity aspects. Within this position you will: Act as the intelligent customer for AWE with regards to OT as part of the Operational … A good knowledge of software engineering techniques and design for maintenance principles Experience of configuration control of software on operational plant & equipment Awareness of Cybersecurity practices for OT systems and why relevant Candidates must be willing and able to obtain and maintain the necessary security clearance more »
EDUCATION DEVELOPMENT TRUST, HIGHBRIDGE HOUSE, 16-18 DUKE STREET, READING, England
EDUCATION DEVELOPMENT TRUST
areas including solution engineering and development, data architecture and integration, technology operations and information security. The main focus for the apprenticeship will be in cyber security. Role The apprenticeship involves working and learning alongside experienced practitioners. It combines spending periods of time at where you will undertake formal studies … projects, enhancing the skills necessary to develop a successful career. Duties include: Solution engineering and development Data architecture and integration Technology operations and information security With a main focus in cybersecurity Training Digital and Technology Solutions Degree Apprenticeship The course will run virtually with days assigned more »
Head of Information Security Operations - Contract - URGENT - Reading/Thames Valley/Oxford We are recruiting for a Head of Information Security Operations to ensure that the confidentiality, integrity, and availability of information systems are maintained to protect customer, corporate, and third-party data. You will have responsibility … the SEIM and SOC partners. This is a hybrid position with 2 days required on site each week. Responsibilities Creation and maintenance of Information Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective … defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be the lead in Cybersecurity incident response and ensure processes and procedures and playbooks are efficient, effective, and are tested regularly in line with policy. Develop and maintain a schedule more »
Information Services and Security have a vital role to play in a crucial national mission. We're here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. IS Modernisation's role is to provide an integrated Information Services and Security, project and programme delivery team to deliver the … environment, delivering a variety of projects within the technical space. With the vision to increase the tempo of delivery without impacting on safety and security here at AWE. AWE has successfully deployed the Foundry digital twin technology to enhance its strategic decision-making and operational forecasting. This role supports more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
AWE Plc
Information Services and Security have a vital role to play in a crucial national mission. We are here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. The scale might be daunting to some, but you'll find it stimulating. We've got a long journey that we've … will look quite different, and you can help make that happen. This is a role where you'll contribute to a legacy of national security for decades to come. So come and join us. We are currently seeking a Senior Asset Change Manager to deliver Asset Change projects to more »
Employment Type: Permanent, Part Time, Work From Home
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
AWE Plc
Information Services and Security have a vital role to play in a crucial national mission. We are here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. The scale might be daunting to some, but you'll find it stimulating. We've got a long journey that we've … will look quite different, and you can help make that happen. This is a role where you'll contribute to a legacy of national security for decades to come. So come and join us. We are currently seeking a Configuration Engineer to support the business to deliver a configuration more »
Employment Type: Permanent, Part Time, Work From Home
to join a leading company revolutionizing Microsoft 365 solutions for global businesses. Specialising in software asset management and SaaS solutions, they enhance efficiency and cybersecurity while reducing costs. Their innovative environment and expert team foster growth and collaboration, making it an exciting place to advance your career in business software more »
Information Services and Security have a vital role to play in a crucial national mission. We're here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. The scale might be daunting to some, but you'll find it stimulating. We've got a long journey that we've … will look very different, and you can help make that happen. This is a role where you'll contribute to a legacy of national security for decades to come. So come and join us. AWE are embarking upon a business-wide transformation and our applications are central to our more »
Information Services and Security have a vital role to play in a crucial national mission. We're here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a multi-billion Pound building programme, and many more. The scale might be daunting to some, but you'll find it stimulating. We've got a long journey that we've … will look very different, and you can help make that happen. This is a role where you'll contribute to a legacy of national security for decades to come. So come and join us. AWE are embarking upon a business-wide transformation and our applications are central to our more »
to join a leading company revolutionizing Microsoft 365 solutions for global businesses. Specialising in software asset management and SaaS solutions, they enhance efficiency and cybersecurity while reducing costs. Their innovative environment and expert team foster growth and co... more »
Information Services and Security have a vital role to play in a crucial national mission. We are here to enable the organisation to deliver through the use of technology. As AWE transforms itself to meet the needs of the UK's next-generation nuclear deterrent, we need to adapt … to deliver data-driven decision making, flexible and future-proofed IT services, adaptable cybersecurity, support to a m... more »
should have a minimum of 18 months experience in a similar position, having worked for an MSP/VAR/Reseller. Strong knowledge of cybersecurity and cloud technology. Strong communication skills. Proven track record of winning new business. Duties : Unlock new opportunities with new customers. Establish a more »
to clients. Required profile: You will bring Engineering degree or equivalent experience, Telecommunications background, experience working with 4G and 5G technologies, Security/Cybersecurity knowledge, Client Management: Build and maintain strong client relationships, delivering exceptional service and addressing their unique needs Proposal Development: Craft compelling, tailored proposals that effectively more »
and interesting work that can include evaluating risks around emerging technologies such as Blockchain, Artificial Intelligence (AI), Robotics Process Automation (RPA) as well as cyber related risks. As part of our TRA team, you'll receive all the support you need to reach your potential and build your technical … long term value. You'll be someone with: Identify and evaluate the design and operating effectiveness of client controls for managing risks around information security, change management, computer operations, and system design and development CISA qualified (Essential), and a professional qualification in finance such as ACA, ACCA or CIMA more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Profectus
Profectus are seeking a number of CHECK Team Leaders for a leading Cyber Consultancy on a fully remote basis. The consultancy are going through a phase of continued growth and are looking to bolster their team with some high quality additions. With a number of great benefits on offer … of Pen Tests and leading teams this could be the role for you. Essential Requirements: - CHECK Team Lead Status - Eligible and willing to undergo Security Clearance - Previous experience leading a range of Pen Tests - Willingness to travel to client site on occasion - Must be UK Based Interviews have already more »