Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Eviden Technology Services Limited
class talents, Eviden expands the possibilities of data and technology, now and for generations to come. The opportunity We are looking for motivated Cyber Security Architects to join our team. If you are a forward-thinking person, who loves working with clients to identify their needs, build relationships … obtain a security clearance to SC level. Location: Home based (Travelling to client sites when needed) Role and responsibilities: Understanding client requirements for cyber security solutions and translating these into technology-based solutions using several suitable portfolio offerings Providing advice to clients on technical and operational security measures … A depth of information technology and information security experience Experience in design and deployment of several of the following technologies: Endpoint, network and infrastructure threat protection Cloud Security within Azure and/or AWS IAM Identity Access Management SIEM and MDR VA Vulnerability Analysis and mitigation DLP Data loss more »
CyberThreat & Vulnerability Analyst - Reading 2 days PW, to £50k Are you ready to dive into the world of cyber security and protect critical digital landscapes? We are looking for a passionate and skilled CyberThreat & Vulnerability Analyst to join a great … Love This Role: Play a pivotal role in our digital transformation journey. Collaborate with a dynamic team to enhance security measures. Engage in proactive threat hunting and vulnerability management. Key Responsibilities: Support enterprise-wide vulnerability management, ensuring effective identification, categorization, and mitigation. Develop and maintain threat assessment and … security vulnerabilities. Coordinate with stakeholders on cyber security patching and vulnerability management. Participate in major incident response when necessary. Perform proactive threat hunting for emerging cyber threats. Maintain and optimize TVM tool performance and dashboards. Ensure compliance with industry standards, such as GDPR, NIS more »
South West London, London, United Kingdom Hybrid / WFH Options
Espire Infolabs Limited
to develop strategies to prevent recurrence. Continuous Monitoring: Keeping a vigilant eye on the organization's security systems to detect any suspicious activities early. Threat Analysis: Evaluating potential threats and vulnerabilities to ensure that the organization is prepared to defend against them. Strategic Defense Implementation: Putting in place robust … strategy. This role demands a proactive mindset, deep technical expertise, and strong leadership skills to navigate the complex and ever-evolving cyberthreat landscape. It's about being always prepared, constantly learning, and effectively communicating to maintain and enhance the organization's security posture. Tasks & Responsibilities Evaluate … the containment and resolution process in line with established protocols to reduce risks. Enhance security procedures to improve the organization's monitoring, detection, and threat mitigation capabilities. Support the development and deployment of systems for threat detection and response, ensuring optimal performance. Synthesize and prioritize data from logs more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
NHS 24
activities. It is required to attend Hillington Regional Centre once a week for mandatory meeting. This Role: The post holder will manage alloperationalInformation & Cyber Securitytechnical and advisoryservices for NHS 24 and collaborate with partner organisations on a range ofhighlycomplex and sensitive security issues. You willprovideexpert specialist advice on … Information & Cyber Security to ICT Professionals, Clinicians, and all staff in NHS 24. The post holder will manage a small team to build capabilities to detect, investigate and remediate information and cyber threats. You will be responsible for managing all legislative Information and Cyber … within the Information Governance and Security Team acting as the deputy for the Head of Information Governance & Security & DPO for all information and cyber security matters. The post holder will contribute to the design, development and implementation of the NHS 24 Information and Cyber Security Strategy more »
Employment Type: Permanent, Part Time, Work From Home
Potters Bar, Hertfordshire, South East, United Kingdom
JSM Construction Limited
Ensure high availability and optimal performance of network systems, minimising downtime and ensuring rapid recovery from outages. - Security Management : Protect network infrastructure against cyberthreats and vulnerabilities, ensuring adherence to security policies. - Compliance and Standards : Maintain compliance with relevant industry standards and regulations, keeping detailed documentation and evidence. more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Experian Ltd
Reliability Engineering Manager, you will lead a global team of talented SREs in the development, deployment, and continuous improvement of our CyberThreat Detection Pipeline. Your leadership will ensure the delivery of a scalable, efficient, and highly reliable Threat Detection Engineering platform. Key Responsibilities: Leverage cutting … of SRE technical and managerial skills in a large enterprise environment, such as: A great background in theSRE field supporting a CyberThreat Detection function, with demonstrable experience in a leadership or managerial role overseeing a team. Scripting and Automation Proficiency: Demonstrated expertise in scripting and automation … event management, with a focus on identifying, analyzing, and mitigating network-based threats. Strong understanding of the MITRE ATT&CK framework, cyberthreat landscapes, attack vectors, and threat actors, enabling informed decision-making and strategy development. Relevant Security Certifications: Possession of relevant security certifications, such as more »
Cambridge, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
GMSL
assets. Conductingregular reviews and risk assessments of information security controls and processes. Implementing lessons learned to ensure continued improvement and staying abreast of emerging threat, vulnerabilities and best practices in information security. Preparing security and risk reports for GMSLs leadership and key stakeholders. Implementing ongoing security awareness training programs … to educate employees about the latest cyberthreats and best practices. Supporting, where appropriate, information security incidents and IT transformation projects. Monitoring regulatory changes and ensuring compliance with laws, regulation and industry standards, specifically ISO/IEC 27001 standards. Your experience We are looking for someone who can … information security or a related field. Demonstrable understanding of information security principles, frameworks, specifically ISO27001, and best practices including knowledge of various security technologies, threat landscape, vulnerabilities and mitigation strategies. Understanding of the terms and definitions used in the ISO 27001 Standard, including risk and options for risk assessments. more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Overview: This position supports Information Security and CyberThreat management programs within the Bank at a complex level of ability. Analyzes vulnerability and threat data that provides actionable intelligence for cyber defense efforts. Evaluates the Bank's networks and systems to identify technical security … management, and business units. Supports the design and implementation of new security products, services, procedures, and technologies in response to changes in the security threat landscape. Enables the defense of the organization's information security and technological architecture through a number of operational and technical tasks. Ensures all cyber … Reporting - Produces reports that document investigation and security incidents as well as the results of analysis. Provides analytics and reporting that facilitates actionable cyber-intelligence within daily operations. Conveys information to the appropriate parties, which includes both internal and external partners. Qualifications: Bachelor's Degree and 6 years more »
Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), CyberThreat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the use of industry leading SIEM, IDS … and threat Intelligence Technologies. Provide advice and guidance to client targets of cyber-attacks and malicious activity to a high standard. Provide incident reporting capabilities ensuring that all information is provided in a timely, accurate and effective manner. Provide analytical support to other SOC team members during … security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and Vulnerability Management tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable in a client facing role. A keen interest in cybermore »
expertise to map the attack chain across complex environments, encompassing cloud, identity, email, network, and endpoint. In-depth understanding of the cyberthreat landscape, particularly in the aviation sector. Demonstrated ability to translate threat knowledge into proactive threat detection. Proficient in analyzing and researching new … or trending attacks, threat actors, malware samples, and tactics, techniques, and procedures (TTPs) Excellent English language skills in reading, writing, and speaking, with the capability to articulate security insights effectively, both in creating and interpreting security metrics, and in presenting them clearly to all levels of hierarchy, including senior … leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail, and VPC Flow. Proven experience with Akamai security tools such more »
in Operational Technology (OT) security risk management. Your expertise in integrated information systems and OT, coupled with your ability to identify and address cyberthreats, will be invaluable in propelling our clients' businesses forward through digitalization. What we're looking for: Experience in security management of industrial control more »
Connectivity: Ensure reliable WiFi across venues for attendees and exhibitors • Data Security: Implement robust data security measures for GDPR compliance and protection against cyberthreats and website hacks • Data Management: Establish protocols for data collection, storage, and analysis while respecting privacy regulations. • Vendor Management: Collaborate with vendors to more »