levels. Implement and maintain network security measures, including firewalls and VPNs. Ensure compliance with security policies and best practices. Conduct regular security audits and vulnerability assessments. 3rd line support for network issues. Troubleshoot and resolve complex network problems in a timely manner. Proven experience with Cisco Meraki technologies. Experience more »
Employment Type: Contract
Rate: From £300 to £350 per day Hybrid - Outside IR35 - Must have SC
West Midlands, Stafford, Staffordshire, United Kingdom
VIQU Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Remote work, Kidderminster, Worcestershire, United Kingdom Hybrid / WFH Options
Network IT
including containment, eradication, and recovery actions. Conduct initial investigations and document findings. Collaborate with other teams to develop and implement effective security measures. Perform vulnerability assessments and recommend remediation actions. Maintain and update SOC processes and procedures. Participate in the development and tuning of security monitoring and detection strategies. more »
person who wants to develop their Cyber career and work within an environment where they can grow and learn. Responsibilities Include: - Penetration Testing and Vulnerability Assessments - Completing Cyber Esse... more »
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Profectus
person who wants to develop their Cyber career and work within an environment where they can grow and learn. Responsibilities Include: - Penetration Testing and Vulnerability Assessments - Completing Cyber Essentials and Cyber Essentials Plus Accreditations - Liaising with customers and clients daily - Give advice, reports and explanations on Cyber threats to more »