Employment Benefits + Bonuses Lead cross-functional post-incident process reviews to identify and implement continuous improvement initiatives. Partner with Legal, 2LoD, Major Incident Management, ThreatManagement, Vulnerability Management, Attack Surface Reduction, Software Engineering, Security Architecture, Platform Support both locally and globally. You will have experience … in: Leading the response to complex incidents in a large-scale environments. Years of relevant experience in cyber security operations, incident management or risk management within an enterprise environment. Self-motivated interest in the latest cyber security threats and vulnerabilities and is able to integrate threat intelligence more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerability management reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber incident response … are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threatmanagement reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify any … use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerability management reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools such as more »
Liverpool, Merseyside, United Kingdom Hybrid / WFH Options
Digital Gurus Recruitment Limited
and infrastructure for signs of failure or errors, raising IT incidents as needed. Ensure timely resolution in line with SLAs and KPIs. Vulnerability and ThreatManagement: Take ownership of vulnerability and threatmanagement across IT systems. Monitor changes in threats and respond appropriately, implementing remediation activities … team initiatives and projects, providing hands-on assistance and technical expertise. Skills Technical Proficiency: Hands-on experience with Azure cloud security tools and infrastructure management, including M365, IAM, RBAC, Sentinel, Defender for Cloud, Secure Score and Log Monitoring. Incident Management: Ability to identify, respond to and manage security … incidents efficiently. Vulnerability Management: Experience in monitoring, prioritising and implementing remediation activities for security vulnerabilities. Collaboration: Ability to work effectively with cross-functional teams, particularly bridging IT operations and InfoSec. Scripting: Beneficial Scripting experience for automation and incident response tasks. Tech Stack Azure M365 IAM RBAC Sentinel Defender for more »
Reigate, Surrey, South East, United Kingdom Hybrid / WFH Options
Opus Business Systems Ltd/T.A.Opus Telecom
relating to the division. The role is to develop sales opportunities for new clients through selling Mobile Networks O2, VF and EE, UEM, Mobile Threat Management. In addition, you will have a strong cross sell strategy in creating referral opportunities to either partner with or hand over to the more »
london (city of london), south east england, United Kingdom
OpticoreIT
to extend. You’ll also be expected to come into the office three days a week. What you’ll be doing: System improvements Vulnerability managementThreatmanagementThreat analysis Reporting Process/Documentation writing, aligning to Azure benchmarking, aligning to CIS benchmarking Improvements to AppSec (including … improvements Incident/investigation and resolution. What you’ll bring: Experience in Microsoft Azure and Defender Engineering. Application security experience including DAST & SAST. Microsoft threat analysis experience and EASM tools. Strong security testing experience including penetration testing. Strong security baseline knowledge In-depth vulnerability management, resolution, and patching more »
london, south east england, United Kingdom Hybrid / WFH Options
Hunter Bond
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … personnel Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threatmanagement frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerability management You will advise on Security best … 7pm on a shift basis to ensure that full coverage is achieved. The ideal candidate will have: Incident response and security monitoring Understanding of threat modelling Investigation experience into Information and Cyber security incidents Broad technical understanding covering Windows, Linux, Unix, Networking, Cisco, SIEM, IAM, DLP, LAN/WAN more »
transition with more than 30,000 of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the … relationships. As the local Cyber management presence, provide guidance and support for the area. Key Tasks and Responsibilities: Review, analyze, design, and advise on security controls, configurations, and implementations for IT projects Continuously improve the integration and effectiveness of implemented technologies Maintain awareness of cybersecurity threats, events, tactics, techniques … ISO 27001 requirements Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber management presence, provide guidance and support for the area. Build and establish a strong relationship with Local IT in the area offices to ensure both more »
/2012/2016,2019) • Experience of Microsoft Office Support and Development, Microsoft 365 and Microsoft SQL • In depth knowledge of Anti-virus and ThreatManagement Systems This comoany offer a 35 hour working week along with great benefits. more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Crimson
objectives and security needs to identify issues and establish priorities for both internal and external delivery teams. Key skills and responsibilities, * Strong IT Security Management experience * Direct the Security Operations pillar, devising and implementing requirements, techniques, and resources to enhance value and mitigate risks across proactive monitoring, incident response … threatmanagement, and vulnerability management, among other areas. * Spearhead the development and upkeep of Security Operations policies, standards, procedures, and documentation, including playbooks and guidelines. * Oversee the implementation and adherence to security operations procedures, assessing real and potential security breaches, and ensuring thorough investigation and resolution. * Familiarity more »