Normanton, West Yorkshire, UK Hybrid / WFH Options
Stott & May Professional Search Limited
to Microsoft Defender. Proven AV migration experience in complex environments. Strong knowledge of Microsoft security tools (Defender for Endpoint, O365, Identity, Cloud App Security). Expertise in EDR, Threat & VulnerabilityManagement, Attack Surface Reduction, and Auto Remediation. Experience with Symantec Endpoint Protection and McAfee. Strong Windows (7/8/10, Server 2008-2016) and RHEL Linux knowledge. More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
is embedded throughout the development lifecycle of Technology Assets by using Deloitte's Secure System Development Lifecyle (SSDLC) to assure paths to production. Oversee that security testing activities like vulnerability scanning, penetration testing, and code reviews are completed to identify weaknesses and potential exploits on the identified security requirements. Identify potential information security risks within a project, analyse their … information security principles, including confidentiality, integrity, and availability. Demonstrable understanding of Cybersecurity risk and controls inherent in various technologies, and related best practices. This includes OWASP Top 10 and vulnerability management. Have strong knowledge in cybersecurity frameworks and standards like ISO 27001, NIST, COBIT, and Cyber Essentials+ or equivalent. Experience with risk management methodologies, techniques, and being able … to clearly understand and articulate risk. Demonstrable ability to identify risks associated with business processes, operations, and the roll out of technology projects. An understanding of project management to manage security aspects within a project timeline and budget. Knowledge and understanding of cybersecurity technologies - mobile threat defense, endpoint protection, data loss prevention, insider threat protection, device hardening, classification, key More ❯
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Corecom Consulting
engineers through implementation, balancing workloads, addressing hotspots, and providing coaching. Oversee deployments, ensuring quality, traceability, and compliance with security standards . Take accountability for technical debt, service levels, and vulnerability management. Collaborate with architects, DevOps engineers, product owners, and Scrum Masters to deliver seamless solutions. Join the out-of-hours support rota for critical digital products. What We're More ❯