technologies such as SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, riskanalysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including more »
and climate change business, with a particular focus on decarbonization and clean energy. ERM delivers a wide range of climate change services including climate riskanalysis and reporting, strategy development, policy and regulatory analysis, target setting, and benchmarking. We help clients, including global companies, electric and natural … commercial energy and climate-related challenges including evaluation of alternative fuel and advanced technologies; management of in-use demonstration programs; technical, operational, and economic analysis to evaluate new business cases; and address policy requirements to integrate climate-solutions.Works with leading electric utilities and industries collaborating to address key market … experts supports clients across the breadth of their organizations to operationalize sustainability, underpinned by our deep technical expertise in addressing their environmental, health, safety, risk and social issues. We call this capability our “boots to boardroom” approach for its comprehensive service model that allows ERM to develop strategic and more »
abreast of legislative changes which may impact the organisation, and amending information management practices. This will be done through following the right processes, information riskanalysis, compliance awareness, training requirements, information management advice and any others as appropriate. The post holder is responsible for deriving maximum value for more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
security technologies such as SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including riskanalysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career more »