with a leading Cybersecurity services provider to recruit a Technical Delivery Engineer . This company delivers advanced Cyber services across critical sectors supporting clients through offerings such as 24 / 7 SOC operations, Security Assurance, Threat Intelligence, Third-Party Risk, and Crisis Simulations . About the Role As a Technical Delivery Engineer , youll play a key role in delivering … and optimising cybersecurity solutions across a diverse client base. Youll focus on areas such as medical device / OT security, anti-ransomware solutions, third-party risk management, security assurance , and AI security . Working closely with clients, project teams, and partners, youll ensure smooth onboarding, configuration, and operational excellence of security services across hybrid and cloud environments. Whats in … sectors such as healthcare, manufacturing, or critical infrastructure Excellent documentation and reporting skills able to communicate clearly to both technical and non-technical audiences Experience with cloud security (AWS / Azure / GCP) and IoT or medical device environments Familiarity with Microsoft Intune, Sentinel , or similar endpoint management / security tools Awareness of ISO27001More ❯
with a leading Cybersecurity services provider to recruit a Technical Delivery Engineer . This company delivers advanced Cyber services across critical sectors — supporting clients through offerings such as 24 / 7 SOC operations, Security Assurance, Threat Intelligence, Third-Party Risk, and Crisis Simulations . About the Role As a Technical Delivery Engineer , you’ll play a key role in … delivering and optimising cybersecurity solutions across a diverse client base. You’ll focus on areas such as medical device / OT security, anti-ransomware solutions, third-party risk management, security assurance , and AI security . Working closely with clients, project teams, and partners, you’ll ensure smooth onboarding, configuration, and operational excellence of security services across hybrid and cloud … sectors such as healthcare, manufacturing, or critical infrastructure Excellent documentation and reporting skills — able to communicate clearly to both technical and non-technical audiences Experience with cloud security (AWS / Azure / GCP) and IoT or medical device environments Familiarity with Microsoft Intune, Sentinel , or similar endpoint management / security tools Awareness of ISO27001More ❯
for vulnerability scanning, threat detection, and incident response, with a focus on continuous process improvement. Risk Management & Threat Intelligence Strong familiarity with security frameworks and standards (e.g. NIST, ISO27001), and deep understanding of security concepts including vulnerability management, threat intelligence, incident response, and offensive security techniques. Experience in gathering and analysing threat intelligence to understand … collaborate across cross-functional Technology and non-Technology teams. Ability to translate technical risks into business-relevant language for both technical and non-technical stakeholders, including executive leadership. Education / Qualifications / Technical Competencies Essential Recognised cybersecurity certification: CISSP and / or CISM Strong knowledge of: Ivanti LANDesk, Qualys, Splunk Windows Server / Desktop, RHEL / … PowerShell and Python scripting Proven experience leading strategic security initiatives and process automation in large-scale environments Desirable Additional certifications: CCSP Familiarity with: CyberArk PAM, ServiceNow SecOps Vulnerability Response / Application Vulnerability Response. VMWare, Nutanix, Java VM MSSQL, Oracle, MongoDB Red Hat Satellite, Active Directory, LDAP, Kerberos Confluence, JIRA GDPR and SOX compliance frameworks Personal Requirements Excellent communication skills More ❯
Hereford, Herefordshire, United Kingdom Hybrid / WFH Options
TXP
security awareness training, security compliance, security accreditation and collaborate with various stakeholders to foster a security-conscious culture. Key Deliverables: Align the business' security stance to comply with ISO 27001and Cyber Essentials Plus, or in accordance with the Cyber Assessment Framework Improve the Cyber Awareness within the company via communications, Cyber Awareness training and monitoring of Staff compliance … business on matters relating to cyber security Skills & Experience: Solid experience working within a similar role within information security management, ideally within an ICT Infrastructure, Managed Service Provider and / or Systems Integrator In-depth knowledge of ISO27001 standards and best practices, as well as other relevant security frameworks (e.g., NIST, CAF) Strong technical … investigations Excellent communication and interpersonal skills, with the ability to effectively collaborate with stakeholders at all levels of the organisation Desirable: Experience of working within Defence, UK government and / or a commercial security supplier Professional certifications in information security, such as CISSP or CISM, ISO27001 related If your profile demonstrates strong and recent More ❯
Employment Type: Permanent
Salary: £65000 - £75000/annum Benefits, Hybrid Working
handling of goods-in, order picking, returns processing, and inventory control. This role manages staff performance, drives continuous improvement of warehouse processes, and ensures compliance with Hamilton Rentals ISO standards. The Warehouse Manager supports the wider business through collaboration with other department heads and plays a key role in maintaining operational effectiveness, safety, and customer service quality Responsibilities … warehouse plant. Develop and implement process improvements to maximise warehouse efficiency. Ensure daily checks are completed for all warehouse equipment (e.g., forklifts, lifting aids). Support compliance with ISO 9001, ISO 14001, ISO 45001, and ISO27001 standards. Coordinate with the Stock Auditor to ensure timely completion of audit tasks … collaboratively with other department leads to align procedures and resolve operational issues. Requirements: Strong Leadership Skills Experience managing warehouse operations within a technical or rental environment. Familiarity with IT / AV products and their logistical handling. Experience with rental systems or warehouse management systems (e.g. RMS). Strong understanding of ISO standards, especially 9001, 14001, 45001, and More ❯
collaboration, inclusion, and continuous growth, with networks supporting diversity, equity, and belonging. What You'll do: Lead and manage threat intelligence-led penetration tests across applications, infrastructure, cloud (AWS / Azure / O365), APIs, and OT Develop advanced test plans, identify critical assets, and deliver detailed, actionable reports for technical and business audiences Collaborate with client teams to … adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation, vulnerability management, cloud security reviews (AWS / Azure / GCP), or frameworks like ISO27001 Certifications such as CISM, CISSP, ECSA, CREST CCT Eligible for UK SC Clearance is mandatory Robert More ❯
control objectives Enterprise risk management Maintain risk taxonomy, registers, and assessment cadence across business, product, data, third party, and operational risks Facilitate risk identification with domain owners, evaluate inherent / residual risk, and drive treatment plans Compliance framework (SaaS appropriate) Identify applicable obligations and industry standards for a SaaS provider and maintain a single control framework mapped to them … role. Delegate analysis, evidence collation, routine testing, and first draft policy updates while retaining ownership of strategy, framework design, risk appetite, and executive reporting. Work closely with Engineering, Platform / SRE, Product, Legal, Procurement, Sales / CS, and Data. Skills, Knowledge & Expertise Proven ownership of an ERMF or equivalent risk programme in a SaaS or technology business Designing … Strong stakeholder management across technical and non technical teams Experience with ISO27001, SOC 2, or similar certifications, and familiarity with ISO 9001 / 22301 / 14001 as contributing inputs Exposure to model risk governance or validation practices Experience with evidence automation or compliance tooling Job Benefits Hybrid working and the option More ❯
supporting mission-critical naval programmes. You will also be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working within regulated environments such as defence, energy, or critical … of infrastructure solutions for PMS, ensuring high availability, security, and performance across both surface ships and submarines.. Networking & Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet / IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS … traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection / prevention systems (IDS / IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits More ❯
london (new malden), south east england, united kingdom
Northrop Grumman UK
supporting mission-critical naval programmes. You will also be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working within regulated environments such as defence, energy, or critical … of infrastructure solutions for PMS, ensuring high availability, security, and performance across both surface ships and submarines.. Networking & Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet / IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS … traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection / prevention systems (IDS / IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits More ❯
supporting mission-critical naval programmes. You will also be responsible for the management of IT assets within the development environment, ensuring compliance with company and regulatory standards such as ISO27001 and IEC62443. This role is ideal for engineers familiar with Windows Server domains, Red Hat Linux, virtualisation, industrial networking, and working within regulated environments such as defence, energy, or critical … of infrastructure solutions for PMS, ensuring high availability, security, and performance across both surface ships and submarines.. Networking & Security: Design and manage robust industrial networking architectures (e.g., Profinet, Ethernet / IP, fibre optics, wireless) for mission-critical applications, while ensuring compliance with defence-level security standards. Platform Management Systems: Work closely with multidisciplinary teams to design and integrate ICS … traffic, and system vulnerabilities. Generate regular reports on system performance, security posture, and compliance status. Cybersecurity & Compliance: Cyber Protection Techniques: Implement advanced cyber protection measures, including firewalls, intrusion detection / prevention systems (IDS / IPS), and secure authentication protocols, to safeguard both the development environment and the final ICS product. Vulnerability Management: Support regularly vulnerability scans, security audits More ❯
Conduct threat modelling, risk assessments, and recommend effective security controls following "Secure by Design" principles Develop security documentation, reference architectures, and governance frameworks aligned with NIST, NCSC, and ISO standards Collaborate with stakeholders across all defence lines to ensure regulatory, privacy, and risk compliance Mentor junior consultants and support the growth of the Security Practice through knowledge sharing … controls, KPIs, and compliance measures What you'll bring: Knowledge of frameworks such as NIST CSF, NIST 800-53, and NCSC CAF Strong understanding of networking, cloud security (AWS / Azure), IAM, and vulnerability management Familiarity with ISO27001/ 27002 and related standards Awareness of modern threats, malware, and security analytics Experience (5+ More ❯
Oversight Review and update security policies, procedures, standards, and guidance regularly (e.g., acceptable use, remote access, incident response, etc.). Ensure alignment with frameworks such as NCSC guidance, ISO27001, NIST, Cyber Essentials, and GDPR. Develop and communicate clear roles and responsibilities for information security across departments. Support Information Governance and Data Protection with policy harmonisation … New and existing systems, applications, and infrastructure. Cloud service configurations (IaaS, SaaS, PaaS). Network architecture, including firewalls, VPNs, and segmentation. Identity and Access Management (IAM) implementations, including PIM / PAM. Security configurations in Microsoft 365, Azure, Active Directory, etc. Conduct or oversee vulnerability assessments, penetration tests, and threat modelling. Review and approve technical designs and solution architectures from … a security standpoint. Assurance, Compliance, and Audit Develop and maintain the IT Security Assurance Framework. Lead or coordinate internal / external audits and security assessments. Track and report on compliance with standards and regulatory requirements. Work with internal and external partners to deliver accreditation or certification activities (e.g., PSN, Cyber Essentials Plus, ISO27001). More ❯
in accordance with the organisations ISO27001 certification. EXPERIENCE A minimum of 3 years experience working within as a Microsoft Sentinel Engineer Hands on skills / experience identifying, investigating, containing and remediating sophisticated security attacks Analytical rule automation and playbook development Design, implementation, and integration of a SIEM solutions into a customer environment Security management … and documentation skills Bachelor's degree or equivalent experience Microsoft Sentinel SIEM Strong scripting skills in PowerShell, Kusto Query Language, Python (highly advantageous) Strong understanding of encryption technologies (TLS / SSL, PKI, IPSec, AES) Microsoft 365 Security & Compliance Microsoft Defender for Endpoints Microsoft Defender for Office 365 Microsoft Defender for Cloud Apps Microsoft Secure Score Microsoft 365 related certifications … desirable) CISSP, CompTIA Security+ or equivalent certification (desirable) Ethical Hacker certification (desirable) GDPR and ISO27001 framework PERSONAL ATTRIBUTES Motivated self-starter Customer-facing skills Problem solving skills Attention to detail Personable and professional manner Process orientated Humble We actively encourage applications from individuals with disabilities and try to provide access, adjustments, equipment, or other practical More ❯
accordance with the organisation’s ISO27001 certification. EXPERIENCE · A minimum of 3 years’ experience working within as a Microsoft Sentinel Engineer · Hands on skills / experience identifying, investigating, containing and remediating sophisticated security attacks · Analytical rule automation and playbook development · Design, implementation, and integration of a SIEM solutions into a customer environment · Security management … and documentation skills · Bachelor's degree or equivalent experience · Microsoft Sentinel SIEM · Strong scripting skills in PowerShell, Kusto Query Language, Python (highly advantageous) · Strong understanding of encryption technologies (TLS / SSL, PKI, IPSec, AES) · Microsoft 365 Security & Compliance Microsoft Defender for Endpoints Microsoft Defender for Office 365 Microsoft Defender for Cloud Apps Microsoft Secure Score · Microsoft 365 related certifications … desirable) · CISSP, CompTIA Security+ or equivalent certification (desirable) · Ethical Hacker certification (desirable) · GDPR and ISO27001 framework PERSONAL ATTRIBUTES · Motivated self-starter · Customer-facing skills · Problem solving skills · Attention to detail · Personable and professional manner · Process orientated · Humble We actively encourage applications from individuals with disabilities and try to provide access, adjustments, equipment, or other practical More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Robert Walters UK
for a step up in their procurement career, applicants from a Buyer role will be considered depending on background. Ideally, your experience should include: Ideally, experience in IT hardware / software / electronic components procurement. Understanding of supplier risk management frameworks alongside proven ability to run effective tendering processes such as RFQs / RFIs / RFPs. … 27001 information security standards; awareness of SOC II requirements; knowledge of ISO 14001 sustainability principles. Exceptional negotiation skills supported by experience in contract drafting / review (with legal support) for both domestic and international suppliers. The Company Employees benefit from 3 days in the office and 2 from home, with an accessible office just … Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates. About the job Contract Type: Permanent Specialism: Procurement & Supply Chain Focus: Purchasing / Procurement Industry: Purchasing and Procurement Salary: £45,000 - £55,000 per annum + Benefits + Flexible Working Workplace Type: Hybrid Experience Level: Mid Management Location: Greater Manchester More ❯
Hereford, Herefordshire, England, United Kingdom Hybrid / WFH Options
QA
to asset management systems. Assist in developing, documenting, and managing processes for supporting the IT environment holistically, including but not limited to: workstation deployment, system access management, software patching / upgrades, and management of cloud services. Help manage service accounts and vendor contracts (e.g. internet, phone, printer). Contribute to maintaining documentation of the company’s technology architecture. Research … and suggest service enhancements to improve efficiency and user experience. Support the implementation and maintenance of the company’s ISO27001 Information Security Management System and ISO 27701 Privacy Information Management System. Assist with cyber security initiatives such as endpoint management, access control, and awareness activities. Assist with privacy and cyber client engagements as … projects, or work experience. Awareness of macOS, Windows, or Google Workspace environments. Familiarity with basic networking concepts (IP, DNS, VPN). Interest in cyber security and privacy frameworks (ISO27001, GDPR). Entry requirements: 3 GCSEs (or equivalent) at grades 4+ (A-C) in any subject GCSE Maths and English (or equivalents) at grades 3+ (D More ❯
Poole, Dorset, England, United Kingdom Hybrid / WFH Options
Mexa Solutions LTD
Security Engineer £40,000 - £50,000 | Poole, Dorset (Hybrid – 3 days / week in the office) You don’t just spot vulnerabilities, you close them before they become a problem. Whether it’s penetration testing, access controls, or a misconfigured firewall, you’ve got the mindset and the method to lock things down. You understand the bigger picture of … reduction not just ticking audit boxes. Protect the platform. Strengthen the business. What’s in it for you? Salary : £40,000 - £50,000 Location : Poole, Dorset (hybrid - 3 days / week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and … with secure software development practices and working alongside dev teams Understanding of key frameworks like ISO27001, PCI-DSS, and GDPR Bonus points for scripting / automation experience (PowerShell, Python, etc.) or exposure to tools like Keeper, Keycloak, or IAM A proactive mindset and excellent communication skills, being able to simplify security for non-technical More ❯
the first point of contact for security incidents, your expertise will be essential in keeping our systems secure. We regret that this position is only available for UK citizens / Residents with indefinite leave to remain in the UK, with current full time work rights for the United Kingdom, currently residing in the UK. The position is located in … premises environments. Strong understanding of security principles, technologies, and industry best practices , including vulnerability and incident management. Practical experience with security monitoring and protection tools such as Firewalls, IDS / IPS, XDR, SIEM, CNAPP, and log collection platforms (e.g., CrowdStrike, Lacework). Experience in designing and implementing Identity and Access Management (IAM) solutions and maintaining secure authentication practices. Proficiency … Add your resume and anything else to showcase why you would be a great addition to our team. We regret that this position is only available for UK citizens / Residents with indefinite leave to remain in the UK. No recruitment agencies, please! We won't accept any introductions. Vix Technology is an Equal Opportunity Employer and prohibits discrimination More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson McCade
someone capable of shaping the future of secure, ethical, and compliant AI adoption across critical environments. What you’ll do This is a senior, strategic consulting role — driving AI / ML security architecture, influencing C-suite direction, and ensuring security-by-design across complex AI systems and data pipelines. You’ll define and deliver AI security strategies, develop reference … end of the band (£90–115K), you’ll need strong consulting experience and commercial awareness alongside deep technical expertise. Key areas of focus Define and implement enterprise-level AI / ML security strategies, policies, and architectures. Lead on AI risk assessment, threat modelling, and mitigation planning. Ensure compliance with GDPR, the EU AI Act, and international security frameworks (ISO … best practice. Communicate complex risks clearly to senior stakeholders and boards. What you’ll bring 7+ years’ strategic cybersecurity experience, ideally in consulting or advisory. Deep understanding of AI / ML security architecture, adversarial ML mitigation, and model governance. Current security certifications such as CISSP or CISM. Proven experience across cloud security, data privacy, and DevSecOps. Familiarity with frameworks More ❯
someone capable of shaping the future of secure, ethical, and compliant AI adoption across critical environments. What you’ll do This is a senior, strategic consulting role — driving AI / ML security architecture, influencing C-suite direction, and ensuring security-by-design across complex AI systems and data pipelines. You’ll define and deliver AI security strategies, develop reference … end of the band (£90–115K), you’ll need strong consulting experience and commercial awareness alongside deep technical expertise. Key areas of focus Define and implement enterprise-level AI / ML security strategies, policies, and architectures. Lead on AI risk assessment, threat modelling, and mitigation planning. Ensure compliance with GDPR, the EU AI Act, and international security frameworks (ISO … best practice. Communicate complex risks clearly to senior stakeholders and boards. What you’ll bring 7+ years’ strategic cybersecurity experience, ideally in consulting or advisory. Deep understanding of AI / ML security architecture, adversarial ML mitigation, and model governance. Current security certifications such as CISSP or CISM. Proven experience across cloud security, data privacy, and DevSecOps. Familiarity with frameworks More ❯
london, south east england, united kingdom Hybrid / WFH Options
Anson McCade
someone capable of shaping the future of secure, ethical, and compliant AI adoption across critical environments. What you’ll do This is a senior, strategic consulting role — driving AI / ML security architecture, influencing C-suite direction, and ensuring security-by-design across complex AI systems and data pipelines. You’ll define and deliver AI security strategies, develop reference … end of the band (£90–115K), you’ll need strong consulting experience and commercial awareness alongside deep technical expertise. Key areas of focus Define and implement enterprise-level AI / ML security strategies, policies, and architectures. Lead on AI risk assessment, threat modelling, and mitigation planning. Ensure compliance with GDPR, the EU AI Act, and international security frameworks (ISO … best practice. Communicate complex risks clearly to senior stakeholders and boards. What you’ll bring 7+ years’ strategic cybersecurity experience, ideally in consulting or advisory. Deep understanding of AI / ML security architecture, adversarial ML mitigation, and model governance. Current security certifications such as CISSP or CISM. Proven experience across cloud security, data privacy, and DevSecOps. Familiarity with frameworks More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Anson McCade
someone capable of shaping the future of secure, ethical, and compliant AI adoption across critical environments. What you’ll do This is a senior, strategic consulting role — driving AI / ML security architecture, influencing C-suite direction, and ensuring security-by-design across complex AI systems and data pipelines. You’ll define and deliver AI security strategies, develop reference … end of the band (£90–115K), you’ll need strong consulting experience and commercial awareness alongside deep technical expertise. Key areas of focus Define and implement enterprise-level AI / ML security strategies, policies, and architectures. Lead on AI risk assessment, threat modelling, and mitigation planning. Ensure compliance with GDPR, the EU AI Act, and international security frameworks (ISO … best practice. Communicate complex risks clearly to senior stakeholders and boards. What you’ll bring 7+ years’ strategic cybersecurity experience, ideally in consulting or advisory. Deep understanding of AI / ML security architecture, adversarial ML mitigation, and model governance. Current security certifications such as CISSP or CISM. Proven experience across cloud security, data privacy, and DevSecOps. Familiarity with frameworks More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Anson McCade
someone capable of shaping the future of secure, ethical, and compliant AI adoption across critical environments. What you’ll do This is a senior, strategic consulting role — driving AI / ML security architecture, influencing C-suite direction, and ensuring security-by-design across complex AI systems and data pipelines. You’ll define and deliver AI security strategies, develop reference … end of the band (£90–115K), you’ll need strong consulting experience and commercial awareness alongside deep technical expertise. Key areas of focus Define and implement enterprise-level AI / ML security strategies, policies, and architectures. Lead on AI risk assessment, threat modelling, and mitigation planning. Ensure compliance with GDPR, the EU AI Act, and international security frameworks (ISO … best practice. Communicate complex risks clearly to senior stakeholders and boards. What you’ll bring 7+ years’ strategic cybersecurity experience, ideally in consulting or advisory. Deep understanding of AI / ML security architecture, adversarial ML mitigation, and model governance. Current security certifications such as CISSP or CISM. Proven experience across cloud security, data privacy, and DevSecOps. Familiarity with frameworks More ❯
Weedon Bec, England, United Kingdom Hybrid / WFH Options
HybrIT Services
practical network environments. Security Knowledge - Familiarity with basic network security principles, including firewalls, VPNs, and intrusion prevention systems (IPS). Networking Protocols - Working knowledge of network protocols like TCP / IP, DNS, DHCP and NAT. Network Security Strong experience with Fortinet FortiGate firewalls (policy config, VPNs, SD-WAN, SASE, ZTNA, HA, DPI). Knowledge of FortiManager and FortiAnalyzer for … Operating Systems - Emphasis on Microsoft Windows Server (all Versions) and respective client connectivity Hypervisors - Virtualisation principles and management including Hyper-V & VMware Microsoft 365 Suite - Administration of Entra (Identity) / Security / SharePoint / Exchange Online) Active Directory - Management, Group Policy, Sites and Services, ADconnect Public Cloud - Azure Administration & Management Endpoint Security - Antivirus / Firewalls Desirable … or Azure workload configuration such as Azure hosted Servers. Windows Server & PowerShell - Exposure to Windows Server environments and use of PowerShell and Bicep for administrative or automation tasks. VOIP / SIP Experience – Understanding of voice systems such as Microsoft Teams Voice and SIP-based platforms. Our SIP trunks are currently delivered via Gamma, GTT, and Epsilon. Endpoint Management – Microsoft More ❯
weedon bec, midlands, united kingdom Hybrid / WFH Options
HybrIT Services
practical network environments. Security Knowledge - Familiarity with basic network security principles, including firewalls, VPNs, and intrusion prevention systems (IPS). Networking Protocols - Working knowledge of network protocols like TCP / IP, DNS, DHCP and NAT. Network Security Strong experience with Fortinet FortiGate firewalls (policy config, VPNs, SD-WAN, SASE, ZTNA, HA, DPI). Knowledge of FortiManager and FortiAnalyzer for … Operating Systems - Emphasis on Microsoft Windows Server (all Versions) and respective client connectivity Hypervisors - Virtualisation principles and management including Hyper-V & VMware Microsoft 365 Suite - Administration of Entra (Identity) / Security / SharePoint / Exchange Online) Active Directory - Management, Group Policy, Sites and Services, ADconnect Public Cloud - Azure Administration & Management Endpoint Security - Antivirus / Firewalls Desirable … or Azure workload configuration such as Azure hosted Servers. Windows Server & PowerShell - Exposure to Windows Server environments and use of PowerShell and Bicep for administrative or automation tasks. VOIP / SIP Experience – Understanding of voice systems such as Microsoft Teams Voice and SIP-based platforms. Our SIP trunks are currently delivered via Gamma, GTT, and Epsilon. Endpoint Management – Microsoft More ❯