ITC Infotech is looking for a Cyber Security Analyst to join our team in Edinburgh, UK. Your X-Factor Work ethic - You are a consummate professional. Aptitude - You have an innate capacity to transition from project to project without skipping a beat. Communication - You have excellent written and verbal communication skills for coordination across projects and teams. Impact - You … have the drive to succeed paired with a continuous hunger to learn. Leadership - You are trusted, empathetic, accountable, and empower others around you. Working as a member of Information Security team, the Cyber Cloud Monitoring Analyst is part of the global team that is responsible for providing 24/7 real-time monitoring of the firm's cloudsecurityposture within Azure, AWS, and CGP. This team is also responsible for incident identification, documentation, remediation and tracking for all cloud services. More specifically, the Supplier Personnel will support the global Cyber Cloud Monitoring function and have following key responsibilities: Perform investigation and escalation for complex or high severity security threats or incidents More ❯
ITC Infotech is looking for a Cyber Security Analyst to join our team in Edinburgh, UK. Your X-Factor Work ethic - You are a consummate professional. Aptitude - You have an innate capacity to transition from project to project without skipping a beat. Communication - You have excellent written and verbal communication skills for coordination across projects and teams. Impact - You … have the drive to succeed paired with a continuous hunger to learn. Leadership - You are trusted, empathetic, accountable, and empower others around you. Working as a member of Information Security team, the Cyber Cloud Monitoring Analyst is part of the global team that is responsible for providing 24/7 real-time monitoring of the firm's cloudsecurityposture within Azure, AWS, and CGP. This team is also responsible for incident identification, documentation, remediation and tracking for all cloud services. More specifically, the Supplier Personnel will support the global Cyber Cloud Monitoring function and have following key responsibilities: Perform investigation and escalation for complex or high severity security threats or incidents More ❯
space. Together we bring the diversity of our peoples skills and backgrounds to make the right choices with our clients, for our company and for our own futures. Microsoft cloud business line is a high-growth, R&D-intensive business and focuses on Digital Security and Advanced Computing products and services. Our HW & SW offers Cyber Security … Manufacturing, Media and Government, helping them to understand the true organisational value of utilising Microsoft integrated solutions. We are looking for Azure SecOps Engineer with a strong background in Security Operations to join our remote UK-based team. The ideal candidate will have hands-on experience in Microsoft Azure, with familiarity in DevOps practices, Microsoft Defender for Cloud, and the broader Microsoft Defender toolset. Knowledge of AWS is a plus. Youll play a key role in maintaining and enhancing our cloudsecurityposture, proactively managing daily operations within the Security Operations team with minimal supervision. What You Will Do Develop and deploy applications in Azure using modern cloud-native architecture Work with More ❯
skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall … VPN Gateway, etc.). Integrate M365 security features (Defender for Office 365, Conditional Access, Secure Score) into enterprise environments. Conduct network segmentation and zero-trust architecture planning. Cloud & Hybrid Environments: Configure and manage hybrid cloud environments using Azure and on-premises infrastructure. Optimize connectivity between M365 services and enterprise networks. Implement secure identity and access management using … Microsoft Entra. Consulting & Advisory: Provide expert guidance to clients on cybersecurity best practices, compliance (e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloudsecurity postures. Deliver workshops and training sessions on M365 and Azure security capabilities. Incident Response & Monitoring: Collaborate with SOC teams to monitor and respond to network-based More ❯
South West London, London, England, United Kingdom
Tenth Revolution Group
skilled Networking Consultant with expertise in cybersecurity, Microsoft 365, and Azure to join our dynamic team. The ideal candidate will design, implement, and optimize secure network architectures, leveraging Microsoft cloud technologies to protect enterprise environments against evolving cyber threats. Key Responsibilities: Network Architecture & Security: Design and implement secure network infrastructures using Azure networking components (VNETs, NSGs, Azure Firewall … VPN Gateway, etc.). Integrate M365 security features (Defender for Office 365, Conditional Access, Secure Score) into enterprise environments. Conduct network segmentation and zero-trust architecture planning. Cloud & Hybrid Environments: Configure and manage hybrid cloud environments using Azure and on-premises infrastructure. Optimize connectivity between M365 services and enterprise networks. Implement secure identity and access management using … Microsoft Entra. Consulting & Advisory: Provide expert guidance to clients on cybersecurity best practices, compliance (e.g., ISO 27001, NIST), and risk mitigation. Conduct assessments and audits of existing network and cloudsecurity postures. Deliver workshops and training sessions on M365 and Azure security capabilities. Incident Response & Monitoring: Collaborate with SOC teams to monitor and respond to network-based More ❯