IT Security Analyst Stevenage (Hybrid - 3 to 4 days on-site per week) £38,000 - £42,000 + Benefits Osiris Recruitment is working with a leading, member-focused organisation to find an IT Security Analyst to join their growing IT function. This is an excellent opportunity for a technically capable security professional to work in a collaborative … environment where security is taken seriously and investment is ongoing. The Role As IT Security Analyst, you'll play a key role in protecting systems, data, and users from cyber threats. You'll work closely with infrastructure and support teams to monitor vulnerabilities, respond to incidents, and continuously improve the organisation's security posture. This is a … hands-on role with scope to influence tools, processes, and training across the business. Key Responsibilities Monitor, triage, and remediate security vulnerabilities across infrastructure and applications. Manage and optimise security tools including endpoint protection, email security, and SOC services. Respond to security alerts and incidents, ensuring timely resolution and clear documentation. Develop and maintain securityMore ❯
About the Role We are seeking a skilled SOC Analyst to join our growing in-house security operations team on a permanent basis in Manchester . This is a fantastic opportunity to be at the heart of cyber defence operations, working hands-on with SIEM tools and ensuring compliance with Cyber Essentials standards. You’ll play a key role … in monitoring, detecting, and responding to threats, while continuously improving our securityposture and supporting the wider IT security strategy. Key Responsibilities Monitor, triage, and investigate alerts generated by SIEM and security monitoring platforms. Conduct log analysis and threat hunting to proactively identify suspicious activity. Support incident response efforts including containment, investigation, and remediation. Ensure security … with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. Produce clear reporting and recommendations for senior stakeholders. Collaborate with IT and security colleagues to strengthen organisational defences. Skills & Experience Required Previous experience as a SOC Analyst or in a security operations role. Strong hands-on knowledge of SIEM platforms (e.g. More ❯
warrington, cheshire, north west england, united kingdom
Explore Group
About the Role We are seeking a skilled SOC Analyst to join our growing in-house security operations team on a permanent basis in Manchester . This is a fantastic opportunity to be at the heart of cyber defence operations, working hands-on with SIEM tools and ensuring compliance with Cyber Essentials standards. You’ll play a key role … in monitoring, detecting, and responding to threats, while continuously improving our securityposture and supporting the wider IT security strategy. Key Responsibilities Monitor, triage, and investigate alerts generated by SIEM and security monitoring platforms. Conduct log analysis and threat hunting to proactively identify suspicious activity. Support incident response efforts including containment, investigation, and remediation. Ensure security … with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. Produce clear reporting and recommendations for senior stakeholders. Collaborate with IT and security colleagues to strengthen organisational defences. Skills & Experience Required Previous experience as a SOC Analyst or in a security operations role. Strong hands-on knowledge of SIEM platforms (e.g. More ❯
bolton, greater manchester, north west england, united kingdom
Explore Group
About the Role We are seeking a skilled SOC Analyst to join our growing in-house security operations team on a permanent basis in Manchester . This is a fantastic opportunity to be at the heart of cyber defence operations, working hands-on with SIEM tools and ensuring compliance with Cyber Essentials standards. You’ll play a key role … in monitoring, detecting, and responding to threats, while continuously improving our securityposture and supporting the wider IT security strategy. Key Responsibilities Monitor, triage, and investigate alerts generated by SIEM and security monitoring platforms. Conduct log analysis and threat hunting to proactively identify suspicious activity. Support incident response efforts including containment, investigation, and remediation. Ensure security … with Cyber Essentials and other best practice frameworks. Optimise SIEM tooling for enhanced visibility and detection capability. Produce clear reporting and recommendations for senior stakeholders. Collaborate with IT and security colleagues to strengthen organisational defences. Skills & Experience Required Previous experience as a SOC Analyst or in a security operations role. Strong hands-on knowledge of SIEM platforms (e.g. More ❯
Portsmouth, Hampshire, South East, United Kingdom Hybrid / WFH Options
University of Portsmouth Estates Department
key. We want people to make their mark in a professional community that truly values people, innovation, and achievement. The Role: Under the direction of the Head of Cyber Security within Library & Information Services, the role is responsible for the development, delivery, and enforcement of comprehensive cyber security operations. Provide leadership and direction for cyber security operations … ensuring the University remains resilient to cyber attack and maintains a robust and rigorous security posture. Cyber Security runs through every aspect of the University, and it is essential that all IT services are delivered in a manner that protects the confidentiality, integrity and availability of University systems and services at all times. This role will manage the … Cyber Security Operations team and Managed Security Services Providers (MSSP) who are responsible for carrying out day to day cyber security operational duties, including responding to security incidents, reporting threats and identifying vulnerabilities and attacks on University systems. They will liaise with technical specialists within IS, other departments, and with trusted advisors to agree appropriate operational More ❯
Job title: Cyber Security Architect Location: Warton- We offer a range of hybrid and flexible working arrangements - please speak to your recruiter about the options for this particular role Salary: £63,900+ Dependent of skills and experience (and car allowance) What you’ll be doing: Serve as the primary point of contact for senior stakeholders and partners on all … cyber security architecture activities within the engineering domain Collaborate with teams to manage security risk in line with the organisation’s risk appetite, providing guidance and recommendations on designs and architectural changes to support effective risk mitigation. Ensure systems are fully compliant with internal security standards, drawing on industry frameworks and best practices to strengthen resilience Take … ownership of security specification and design, working with colleagues to deliver secure and scalable solutions Your skills and experiences: Essential Possess a broad and comprehensive technical knowledge of IT infrastructure and technologies, with proven specialism in Operational Technology (OT) and engineering systems Demonstrate an excellent understanding of government and industry-standard security policies, standards, and best practice guidance More ❯
tester Location: London, UK (Hybrid) Inside IR35 Contract (6months +) The Role Performs manual and automated penetration tests on networks, systems, web applications, and endpoints. Identifies, exploits, and documents security vulnerabilities to assess an organization's risk exposure. Develops detailed reports with findings, impact analysis, and actionable remediation re commendations. Simulates real-world attacks to test the effectiveness of … existing security controls and incident response. Keeps up to date with the latest vulnerabilities, exploit techniques and penetration testing tools in general and more specific to an airline industry, transportation sector. Your responsibilities: Performing IaC Automation and ServiceNow integrations to automate AWS Service catalogues. Planning and conducting the full-scope penetration tests of applications, APIs, internal infrastructure, networks, cloud … authentication, authorization bypass, input validation issues, cloud misconfigurations, AD misuses, etc. Create detailed reports, providing actionable advice to clients on how to address the identified vulnerabilities and improve their securityposture; outlining identified vulnerabilities, their potential impact, and recommended remediation steps: including executive summaries and technical findings Collaborate with development, cloud, and infrastructure teams on remediation Test and More ❯
Are you a Cyber Security Engineer looking for a role that offers the opportunity to lead on critical projects in a period of large scale digital transformation project? If so Found Talent may have the role for you Working for a leader within their field you will be tasked with managing and maintaining the organisations IT security, as … part of a wider multifunctional technical team. What youll be doing: Managing and enhancing the organisations security stance across on-premises and cloud environments. Arranging and running annual penetration tests to identify and address vulnerabilities. Running campaigns across the business to raise awareness about cybersecurity best practices. Developing and executing a comprehensive security plan. Identifying all security initiatives necessary for safeguarding the organisation's assets. Building business cases and a roadmap to deliver the security plan effectively. Managing and executing the roadmap in alignment with organisational goals. Continually assessing the organisation against relevant security frameworks to ensure compliance and adherence to industry standards. Developing and continually testing Disaster Recovery (DR) and Service Continuity plans More ❯
office. Purpose of the Role Primark Technology is on a transformation journey supporting the business strategy which includes modernising our operating model as well as technology architecture and Cyber Security and Risk posture. This role is key in building and improving Primark's Cyber Security posture. Duties & Responsibilities Actively progress and improve Primark's cyber securityposture … Agile delivery methodology and development methods Certified with appropriate qualifications is desirable, 1. Structured Project Management : Prince/PMP 2. Agile certification, such as Scrum, SaFe, AgilePM 3. Information Security/Data Protection certification An appropriate degree, equivalent qualification or experience Desirable Be a passionate and visionary technologist able to inspire others to challenge and disrupt the current reality … ways to translate that into business opportunities. Be able to take people along with you, empowering new ways of working and successfully executing on those opportunities. Have extensive cyber security delivery and programme/project management experience, Retail experience would be beneficial. Be technically strong across a range of IT disciplines and systems, including cloud and network security. Have More ❯
Clearance Work Type: Full-time, with 24/7 on-call rotation A high-performing innovation and transformation consultancy is seeking a Senior SOC Solutions Engineer to elevate its security operations capability. This is a hands-on engineering role focused on SIEM development, playbook automation, and threat modelling-delivering proactive defence across cloud and on-prem environments. You'll … and data exfiltration Integrate playbooks with SOAR platforms (e.g., Microsoft Logic Apps, XSOAR) Continuously refine automation based on threat intelligence and incident feedback Threat Detection & Response Monitor and investigate security alerts and anomalies Lead incident response activities and collaborate with threat intelligence teams Enrich detection logic with contextual threat data Threat Modelling & Use Case Development Conduct threat modelling using … Kill Chain frameworks Translate models into actionable SIEM use cases and detection rules Prioritize engineering efforts based on risk and business impact Reporting & Collaboration Produce dashboards and reports on securityposture and incident trends Collaborate with IT, DevOps, and compliance teams to ensure secure configurations Mentor junior analysts and engineers Maintain documentation including runbooks, playbooks, and incident response More ❯
Overview At Vanta, our mission is to help businesses earn and prove trust. We believe that security should be monitored and verified continuously, and we empower companies to practice better security and prove it with ease. Vanta has a kind and talented team, and while some have prior security experience, many have been successful at Vanta without … it. As a Vanta Customer Success Manager, you will play a pivotal role in guiding customers through their security and compliance journeys with Vanta's specialized solutions. By combining your customer-centric approach with expertise in Vanta's products and security best practices, you will contribute to the overall success and satisfaction of Vanta's customers in achieving … robust security and compliance outcomes through retention of customers and health of the book of business. Vanta's success over the last year was exponential and we are now working to solve the problem of how to provide world-class customer experience to as many security-minded software companies as possible. As a Vanta Customer Success Manager, you More ❯
At Vanta, our mission is to help businesses earn and prove trust.We believe that security should be monitored and verified continuously, and we empower companies to practice better security and prove it with ease. Vanta has a kind and talented team, and while some have prior security experience, many have been successful at Vanta without it. As … Vanta's Customer Success Manager, in the Upmarket space (Enterprise/Mid-Market), you will play a pivotal role in guiding customers through their security and compliance journeys with Vanta's specialised solutions. By combining your customer-centric approach with expertise in Vanta's products and security best practices, you will contribute to the overall success and satisfaction … of Vanta's customers in achieving robust security and compliance outcomes through retention of customers and health of the book of business. Vanta's success over the last year was exponential and we are now working to solve the problem of how to provide world-class customer experience to as many security-minded software companies as possible. As More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
Join Us as a Security Architect! Location : Sindlesham, Wokingham - remote working Contract Type : Temporary (6 months) Daily Rate : Via umbrella Are you a dynamic and innovative Security Architect ready to take on an exciting challenge? We're looking for a tech-savvy professional to join our team in Sindlesham, Wokingham! If you have a passion for engineering and … security, this is your chance to make an impact in a fast-paced environment. What You'll Do: As a Security Architect, you will be at the forefront of protecting our systems and data. Your expertise will guide our security framework and ensure robust defences against emerging threats. Key Responsibilities : Design, implement, and maintain security architectures … that align with business objectives. Conduct risk assessments and identify vulnerabilities in existing systems. Collaborate with cross-functional teams to integrate security measures into development processes. Stay updated on the latest security trends and technologies to enhance our security posture. Provide guidance and mentorship to junior security team members. Engage in incident response activities, ensuring swift More ❯
Wokingham, Berkshire, United Kingdom Hybrid / WFH Options
Pontoon
Join Us as a Security Architect! Location : Sindlesham, Wokingham - remote working Contract Type : Temporary (6 months) Daily Rate : Via umbrella Are you a dynamic and innovative Security Architect ready to take on an exciting challenge? We're looking for a tech-savvy professional to join our team in Sindlesham, Wokingham! If you have a passion for engineering and … security, this is your chance to make an impact in a fast-paced environment. What You'll Do: As a Security Architect, you will be at the forefront of protecting our systems and data. Your expertise will guide our security framework and ensure robust defences against emerging threats. Key Responsibilities : Design, implement, and maintain security architectures … that align with business objectives. Conduct risk assessments and identify vulnerabilities in existing systems. Collaborate with cross-functional teams to integrate security measures into development processes. Stay updated on the latest security trends and technologies to enhance our security posture. Provide guidance and mentorship to junior security team members. Engage in incident response activities, ensuring swift More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
Asset Security Manager ?? South Wales (Hybrid Working) ?? Up to £70,000 + Excellent Benefits What You'll Do: You'll lead the strategy and delivery for identifying and managing vulnerabilities across the organisation's IT and OT asset estate. From building and maintaining a complete asset register to defining how vulnerabilities are prioritised and addressed, you'll be the … key figure ensuring the organisation's cyber securityposture is understood and controlled. Collaborating with penetration testers, risk assessors and internal teams, you'll provide accurate insights into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerability … in utilities or critical national infrastructure environments is a strong advantage Why You Should Apply: This is a high-impact role where you'll help shape a critical cyber security function. You'll work in a collaborative environment, receive full support for personal development, and gain exposure to both IT and OT security within a key UK industry. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
Because that’s what drives you to be better, be more and ultimately, be more fulfilled. SOC Consultant Hybrid-3 days onsite Requirement: 10+ years of experience in Cyber security Designing & implementation on Network Security, SIEM, SOAR & Threat Intelligence. Key Responsibilities: Lead Sentinel Deployment for OT SOC Architect and implement Microsoft Sentinel across global OT environments to centralize … security monitoring and incident response. Log Source Integration Configure and onboard diverse log sources including Nozomi Networks, firewalls, Cribl, EDR (e.g., Defender for Endpoint), VMDR (e.g., Qualys), and other OT/IT systems into Sentinel. Custom Analytics & Detection Rules Develop, and fine-tune KQL-based analytics rules tailored to OT threat scenarios, ensuring high-fidelity alerts and minimal false … to enhance detection capabilities and contextualize alerts within the OT landscape. Incident Response Automation Design and implement playbooks using Logic Apps to automate incident response workflows for common OT security events. Execution of the use cases on SIEM, SOAR & Threat Intelligence Build custom workbooks and dashboards to visualize OT securityposture, threat trends, and SOC performance metrics. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
VIQU IT Recruitment
Outside of IR35 – Remote/London My Customer is seeking a highly skilled DevSecOps Engineer with deep expertise in Cloud Security. This role is critical in strengthening their cloud securityposture, ensuring compliance, and embedding security across our development pipelines. The ideal candidate will be hands-on, business-minded, and capable of bridging the gap between cyber … Engineer Previous experience working in a DevSecOps role – Outside IR35 Strong experience with Wiz – must be able to make recommendations on improvements Proven track record in DevSecOps pipeline design, security integration, and automation. Dev Experience but strong experience in Cloud Security. Prior experience leading or contributing to audit and certification readiness projects (ISO, Cyber Essentials, SOC2). Experience with … AWS GuardDuty, AWS Config, and broader AWS security services. Solid development background with the ability to understand engineering challenges and build secure solutions. Expertise in Cloud Security best practices (identity, monitoring, compliance, and remediation). Ability to create clear architecture and security maps. Strong communication skills to translate technical issues into business context. The DevSecOps Engineer is More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
QBE Management Services (UK) Limited
Employee Senior Threat Detection Specialist Location: London Happy to talk flexible working The Opportunity As we focus on transformation across the organisation, we’re also investing in our cyber security capabilities to keep our people, data, and customers safe. That’s why we’re building a new Detection Engineering function—and we’re looking for a talented and driven … and accuracy. Build and tune custom detection logic for complex environments and emerging threats. Monitor evolving attacker tactics (TTPs), integrating insights into detection and prevention strategies. Collaborate across Cyber Security, Engineering, and Global IT teams to enhance securityposture and incident response. About you Strong experience across both offensive and defensive cyber security disciplines. Deep understanding … of attacker tactics, techniques, and procedures (TTPs), with expertise in the MITRE ATT&CK Framework. Hands-on technical knowledge in cyber detection engineering, security tools, and infrastructure. Skilled in Detection-as-Code and experienced with SIEM query languages. Confident communicator with experience working alongside global technical teams and senior stakeholders. Proactive, collaborative, and driven by curiosity and continuous improvement. More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Aberdeen
in design and administration of Intune, Entra, Windows Desktop and core infrastructure services. Key Responsibilities Implement and administer changes across Aberdeen's EUC/Desktop estate. Ensure stability and security of the EUC Global Desktop environment through effective assurance and assessment of our Windows desktop, Microsoft M365 tenant and other 3rd party software Collaborate with operational teams to proactively … initiatives. Implementing and maturing core controls/activities that enable Windows OS & M365 evergreen changes, aligning to Aberdeen's EUS risk control framework and regulatory requirements. Focus on desktop security measures, reducing the attack surface, improving securityposture and implementing desktop hardening techniques (ie CIS). About the Candidate The ideal candidate will possess the following: The … are required. Intune, SCCM, Entra ID, Active Directory, Group Policy for endpoint management. Experience deploying evergreen change for OS and M365. Experience deploying Autopilot at scale. Endpoint management and Security tooling with a focus on Microsoft Defender (including AV, EDR, ASR). Application provisioning/management via Intune, SCCM & Azure - experience with App Attach also preferable. Experience implementing and More ❯