vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetration testing and managing internal and external cybersecurity analysts to detect, mitigate, and analyze … an international enterprise environment is essential. Responsibilities: Collaborate with IT teams for input and operational requirements to design and implement the company's overall cybersecurity strategy. Identify and address security gaps discovered through ongoing monitoring of all information security controls and implement enhancements to security controls. Manage access to elevated … privileges accounts and audit activities to meet business and regulatory requirements. Evaluate and/or implement cybersecurity solutions and controls to maintain confidentiality, integrity, and availability. Actively participate in proofs-of-concept for new security technologies by developing selection criteria to identify appropriate security solutions to support strategic, operational needs more »
visits to Surrey. Summary : We are seeking a Senior SOC Analyst to join our team responsible for monitoring infrastructure, detecting, triaging, and responding to cybersecurity incidents. The ideal candidate will possess a curious and passionate mindset, with extensive knowledge in Incident Response and problem-solving abilities across Information Security and more »
leading the design and architecture of cloud capabilities, including managing operational risk Hands-on experience throughout portfolio, program, and project lifecycles Familiarity with relevant cybersecurity standards such as NIST CSF and ISO 27001 Benefits: Up to £103,000 per annum Company Pension Cycle to work Private healthcare 25 days annual more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be the lead in Cybersecurity incident response and ensure processes and procedures and playbooks are efficient, effective and are tested regularly in line with policy. Develop and maintain a more »
Farnborough, England, United Kingdom Hybrid / WFH Options
Workday
use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration : having flexibility to more »
Git Strong understanding of software development processes, continuous integration & agile practices Proficiency in a scripting language such as Python, Bash or Powershell Appreciation of cyber-security best practices Experience deploying & managing applications in a containerised, virtualised or cloud environment Desirable skills & experience: Experience of systems administration on Windows or Linux more »
Strong knowledge of Azure services, such as Azure Active Directory, Defender 365, Sentinel and Azure Virtual Desktop and Intune Proven work experience as a Cybersecurity Analyst or similar role Experience with computer network penetration testing and techniques Understanding of firewalls, proxies, SIEM, antivirus and IDPS concepts Ability to identify and more »
impact. Keep abreast of emerging security threats and technologies to ensure the effectiveness of our security defenses. Qualifications: Bachelor's degree in Computer Science, Cybersecurity, or related discipline. Proven experience in information security roles, with expertise in risk management and incident response. Relevant certifications such as CISSP, CISM, or CRISC more »
related field Exceptional candidates with proven experience in security/network operations will also be considered About BlueVoyant At BlueVoyant, we recognize that effective cybersecurity requires active prevention and defense across both your organization and supply chain. Our proprietary data, analytics, and technology, coupled with deep expertise, works as more »
to OneIT colleagues and other employees around security best practice. To work closely with the IT Business Partners team to create, maintain and deliver CyberSecurity Awareness training for all colleagues across Europe Maintain the information security risk register and lead all input required for both internal and external audits more »
threats. Conduct regular security assessments and audits to identify vulnerabilities and develop plans to address them. Develop and maintain an incident response plan for cybersecurity incidents. Collaborate with other IT professionals, including developers, and system administrators, to integrate cloud/On-premises security measures into existing systems and processes. Essential more »
threats. Conduct regular security assessments and audits to identify vulnerabilities and develop plans to address them. Develop and maintain an incident response plan for cybersecurity incidents. Collaborate with other IT professionals, including developers, and system administrators, to integrate cloud/On-premises security measures into existing systems and processes. Essential more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations accordingly. Be the lead in Cybersecurity incident response and ensure processes and procedures and playbooks are efficient, effective and are tested regularly in line with policy. Develop and maintain a more »
Systems Security Professional (CISSP), Certified Information Security Manager (CISM), or Certified Information Systems Auditor (CISA) are highly desirable. ? Bachelors degree in computer science, IT, Cybersecurity or a related field, or equivalent experience. Other considerations The business operates a first responder roster in Infrastructure to provide 24/7/ more »
to define business and systems requirements for new technology implementations. Responsibility for implementation of technology requirements of DfT, CAA, and HomeOffice, such as NIST Cybersecurity framework and CAP1753. Define, develop and communicate the company's technology plans, policies, and standards for the organisation for acquiring, implementing, and operating IT systems more »
Filton, South Gloucestershire, England Hybrid / WFH Options
BAE Systems
and experiences: Essential: Understanding of enterprise networking and computing Knowledge of Python 3 programming language A proven technical background with a detailed knowledge of cybersecurity, computer networks and operating systems Desirable: Knowledge of using SIEM platforms to identify suspected security events and creating content to enhance the platform Demonstrable more »
West End, London, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
/IT Manager to become one of the team. They are a thriving and growing business specialising in IT Management, Device and Identity Management, CyberSecurity, Networks, Cloud platforms, and Connectivity. Relationships and technical excellence are the name of the game with these guys. The Perks Salary more »
West End, London, Oxford Circus, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
/IT Manager to become one of the team. They are a thriving and growing business specialising in IT Management, Device and Identity Management, CyberSecurity, Networks, Cloud platforms, and Connectivity. Relationships and technical excellence are the name of the game with these guys. The Perks Salary more »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
Technology Services Group
licensed for all software applications in use. Work in partnership with Information Security function to maintain TSGs Information Asset Register. Knowledge, Skills & Experience; Understanding CyberSecurity and Security principles. Excellent communication style, able to keep calm under pressure and defuse difficult customer situations. An inquisitive individual, keen to investigate the more »
use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to more »
equivalent, grade 3+ (D or above) (Essential) About the Employer TIVARRI LTD Based in Bath with our head office in Bath, Tivarri is a cybersecurity and cloud computing consultancy, focused on providing cloud services for financial services organisations. more »
CyberSecurity Training Specialist – London hybrid - £55,000 - £65,000 + Bonus + Benefits Locke & McCloud are looking for an experienced CyberSecurity Training Specialist to join our clients growing and established cybersecurity training and awareness function. Due to recent significant growth across our clients CyberSecurity team, our … client is looking for an experienced CyberSecurity Training Specialist to develop and deliver various training programs across the business, both in 1-1’s and at large conferences exceeding up to 500 individuals. The ideal candidate will have extensive experience in developing and delivering cybersecurity training programs, along … with strong advisory skills and a deep understanding of the cybersecurity landscape. Main responsibilities: Develop and implement comprehensive cybersecurity training programs tailored to the needs of our client, addressing various roles and levels of technical proficiency. Deliver engaging and interactive training sessions to our clients employees across departments more »
platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC more »
platforms. * Experience using host and network-based IDS/IPS * Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC more »