4 of 4 Mac OS Jobs in South Wales

IT Security Analyst – Incident Response & Vulnerability Management

Hiring Organisation
Operations Resources
Location
Cardiff, South Glamorgan, Wales, United Kingdom
Employment Type
Full-Time
Salary
Salary negotiable
third-party suppliers. Validate remediation and ensure appropriate evidence is captured for assurance and audit. Platforms & Technology Scope End-user devices including Windows, macOS, tablets, and peripherals. Microsoft 365 including Entra ID, Exchange, SharePoint, Defender, and endpoint protection. Identity and Access Management including privileged and service accounts. On-premises ...

Services Engineer

Hiring Organisation
Sysco Ireland
Location
Crumlin, Gwent, United Kingdom
Employment Type
Permanent
Salary
GBP Annual
customer service experience in Computer Technology and be proficient at technical troubleshooting of desktop and laptop computers, mobile technology devices, Microsoft Windows, Office 365, MacOS, VMWare Workspace One and other desktop software. You will be able to use remote support tools to be able to troubleshoot remote computer devices ...

Service Engineering - Materials Handling

Hiring Organisation
17918
Location
Crumlin, Glamorgan, United Kingdom
customer service experience in Computer Technology and be proficient at technical troubleshooting of desktop and laptop computers, mobile technology devices, Microsoft Windows, Office 365, MacOS, VMWare Workspace One and other desktop software. You will be able to use remote support tools to be able to troubleshoot remote computer devices ...

3rd Line Security Analyst

Hiring Organisation
Operations Resources Limited
Location
Cardiff, South Glamorgan, Wales, United Kingdom
Employment Type
Permanent
eradicationstrategy,andrecoveryvalidation. Driveincidentsthroughtofulltechnicalresolution,nottemporarymitigation. KeyAccountabilitiesVulnerabilityManagement Investigatevulnerabilitiesidentifiedviascanningplatforms,endpointandcloudtooling,supplierdisclosures,andauditactivity. Assessriskbasedonexploitability,exposure,andoperationalimpact. Ownremediationactionsend-to-end,coordinatingwithInfrastructure,Network,andthird-partysuppliers. Validateremediationandensureappropriateevidenceiscapturedforassuranceandaudit. Platforms&TechnologyScope End-userdevicesincludingWindows,macOS,tablets,andperipherals. Microsoft365includingEntraID,Exchange,SharePoint,Defender,andendpointprotection. IdentityandAccessManagementincludingprivilegedandserviceaccounts. On-premisesandcloud-hostedservers. Networkinfrastructureincludingfirewalls,switches,wireless,andWANconnectivity. Cloud-hostedandsupplier-managedapplications. Documentation,Audit&ContinuousImprovement Produceclear,technicallyaccuratedocumentationcoveringincidents,rootcauseanalysis ...