programme to reduce the bank’s cyber threat landscape and ensure robust "Business As Usual" cyber assurance processes. Key Responsibilities: Cyber Test and Validation Management: Oversee the Cyber Test and Validation process, support Cyber Risk Assessment, and drive the Cyber Assurance programme across the bank. Security Engineering Advice: Advise … regulations not directly supported by our global framework. Security Control Implementation: Work with technology infrastructure teams to implement security controls across various platforms. Incident Management: Investigate, coordinate, and address Information and Cybersecurity incidents, including forensic evidence collection and security event investigation. Incident Analysis and Communication: Analyze infrastructure security incidents … convey technical analysis to management, and act as a liaison during security investigations. Regulatory Response: Respond to regulatory requests, manage engagements with regulators, and coordinate compliance-related investigations. Preferred Qualifications and Experience: Experience: A strong background in Cybersecurity, Systems, Infrastructure, Network, and Cloud. Technical Skills: Proficient in applications deployments more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Analyst, the ideal candidate will be mid-level with 3+ years experience in a similar role. Required: 3+ years' experience Experience with stakeholder management. Vulnerabilitymanagement including incident priority. Incident management Penetration testing experience Knowledge of multiple technologies encompassing cloud Experience with Microsoft tech stack This client more »
security posture. Playing a pivotal role in minimising risks & protecting assets. Here’s a taste of what the role will involve: Collaborating with senior management to develop and refine the organisation’s information security strategy, aligning it with business objectives and regulatory requirements. Developing, implementing, and maintaining information & data … as the company subject-matter expert for all security-related matters and develop campaigns/strategies to improve security posture. Manage technical risks via vulnerabilitymanagement oversight & gap analysis, whilst also overseeing DLP alerts and creating reports. Develop and generate metrics & dashboards for senior management review. What more »
and conduct root cause analysis. Collaboration: Work collaboratively with development, operations, and security teams to design, implement, and maintain secure CI/CD pipelines. VulnerabilityManagement: Identify, assess, and remediate vulnerabilities in applications, containers, and infrastructure. Compliance: Ensure compliance with industry standards and regulations (e.g., GDPR, HIPAA, PCI … experience in a DevSecOps, DevOps, or Security Engineer role. Technical Skills: Proficiency with DevOps tools (e.g., Jenkins, GitLab CI, CircleCI). Experience with configuration management tools (e.g., Ansible, Puppet, Chef). Strong scripting skills (e.g., Python, Bash, PowerShell). Knowledge of containerization and orchestration (e.g., Docker, Kubernetes). Familiarity more »
Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) Qualifications: Knowledge and experience in the following: SIEM Tools VulnerabilityManagement EDR Software Intrusion Detection/Prevention Systems Web Proxies Network Security & Firewalls Programming – Nice to have! More details: Permanent role 2 days more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Didcot, Oxfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
technologies. Proficiency in programming and scripting languages, especially Terraform and YAML (PowerShell is a plus). Knowledge of Anti-virus, Endpoint Detection and Response, VulnerabilityManagement, and Patching. Familiarity with Security Information and Event Management (SIEM). Experience with CI tools, such as Azure DevOps or GitHub more »
Title: Security Engineer Salary: £80,000 to £100,000 We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure … development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerabilitymanagement, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and … Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (e.g., Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. In addition to your technical prowess, we more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
Peterhead, Aberdeenshire, Scotland, United Kingdom
PIVT Group Ltd
on Operational Technology. This will range from complex gas terminals to simpler Above Ground Installations. Cyber data checks and updates to the Cyber Asset Management system. Ensure we have the correct asset management data is key to cyber risk management. This shall include network drawing assurance. Support the … across the Operational Technology. This reduces the risk from unauthorised access to our assets. Upgrade configurable devices as directed by security in line with vulnerabilitymanagement requirements. An example could be upgrading an operating system on an industrial PC to an approved version. Where assets have been approved more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerabilitymanagement, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
managing MDE on Linux platforms (and preferably macOS/Windows) Experience of MDE AV, EDR, and TVM Experience of Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with chef management Excellent analytical and troubleshooting skills across complex systems Able to articulate complicated … that will help you in the role Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and VulnerabilityManagement) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - MacOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Experis
and managing MDE on Linux platforms (preferably macOS/Windows) Experience with MDE AV, EDR, and TVM Experience with Linux system administration, including package management (rpm/yum), systemd, and troubleshooting Desirable experience with Chef management Excellent analytical and troubleshooting skills across complex systems Ability to articulate complicated … that will help you in the role: Experience with specific tooling such as Microsoft Defender for Endpoint, including AV, EDR, and TVM (Threat and VulnerabilityManagement) Linux Systems Administration & Troubleshooting experience Experience with various other OS types - macOS & Windows Experience with Chef, including Cookbooks & package creation, deployment, and more »
Purpose The Senior Cyber Security Engineering SME (Endpoint/Engineering Security SME) to provide strong subject matter expertise within the component area of Endpoint Management (Antivirus/DLP, endpoint security and Forensics), including, Disk Encryption, Anti-Malware, Device and Application Control, event collection & monitoring and SIEM platform guidance methodologies. … Security products within the scope of the MM contract, i.e., Encryption techniques, Event monitoring, Anti-Malware & Endpoint Protection tooling. A working knowledge of the management/fault rectification of recent product versions in relation to the subject matter field. Experience communicating across multiple stakeholder levels including End users, Suppliers … security engineering prospective. Should have knowledge & experience of implementing Security Controls & Configuration of Network appliances. (Routers, Switches, Firewall) Working knowledge & experience of Tenable SC. (VulnerabilityManagement, Scanning, Remediation more »
Rugby, Warwickshire, West Midlands, United Kingdom
Upbeat Ideas UK Ltd
Purpose The Senior Cyber Security Engineering SME (Endpoint/Engineering Security SME) to provide strong subject matter expertise within the component area of Endpoint Management (Antivirus/DLP, endpoint security and Forensics), including, Disk Encryption, Anti-Malware, Device and Application Control, event collection & monitoring and SIEM platform guidance methodologies. … Security products within the scope of the MM contract, i.e., Encryption techniques, Event monitoring, Anti-Malware & Endpoint Protection tooling. A working knowledge of the management/fault rectification of recent product versions in relation to the subject matter field. Experience communicating across multiple stakeholder levels including End users, Suppliers … security engineering prospective. Should have knowledge & experience of implementing Security Controls & Configuration of Network appliances. (Routers, Switches, Firewall) Working knowledge & experience of Tenable SC. (VulnerabilityManagement, Scanning, Remediation more »
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerabilitymanagement A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
and implement complex security solutions in line with company policies and standards. • Familiarity with various security techniques and methodologies, such as threat modeling and vulnerability management. • Proficiency in automation and scripting using Python, Shell, Ansible, Jenkins, etc. • Industry certifications in information security or information technology preferred, such as CISSP more »
comprehensive in-house delivered training plan covering: Cisco VPN Azure Active Directory/Entra Meraki Wi-Fi Intune/Autopilot (in development) Mobile Device Management and deployment Windows 10 Office 365 and Power BI Microsoft Always On VPN (in development) Microsoft Defender for Endpoint Strong understanding of cyber and … demonstrate that you have actively been developing a journey in reducing on-premise hardware to drive cloud-based benefits. Experience with Microsoft Azure, SaaS, vulnerabilitymanagement, and the ability to work effectively alone or as part of a small busy team are essential for our operational development. The … with other places to enhance Network, WAN, VPN, Telephony, Mobile devices, cyber approach and modern workspace environments. Person Specification Additional Requirements Essential Mobile Device Management and deployment Qualifications Essential Degree in a computing science or equivalent experience delivering IT infrastructure Desirable A certification which confirms ongoing self development Experience more »
IT strategy from an operational security perspective and support the framework of the IT Security Manager where applicable. Responsibilities Mentor colleagues and perform line management duties to ensure the team operate with a security-first mindset. Oversee a service queue ensuring the team are managing and resolving incidents and … changes in a timely manner. Advise the Management team of significant emerging threats and recommend tactical steps to counteract these threats. Respond to threats across multi-cloud environments and protect the integrity of our information assets. Conduct peer reviews of documentation supporting security workstreams both current and past. Lead … the monthly vulnerabilitymanagement forum from an Operational perspective. Skills and Experience Required Excellent analytical and problem-solving skills. Strong Security first mindset. 5 years+ of front-line experience working in a cyber role supporting multi-cloud environments. Strong understanding of cyber security principles, best practices, attack vectors more »
application security reviews and support the wider team with security best practice, testing and troubleshooting. Own the security posture of the solution, overseeing application vulnerabilitymanagement, incident response and recovery process, and ensuring mitigation and escalation approaches are in place. Skill & Experience Minimum of 3 years’ experience in more »