the Information Security Risk management and understand the monitoring of Cloud and Web platforms Ensure business is aligned with industry Frameworks such ISO27001 / 2, NIST and ITIL ERM Framework, Risk Reporting and Monitoring Support embedding of the ERM Framework, with a focus on Technology and Change Risks. … incident management issues and request full root cause reviews Supporting operational resilience testing plans and reporting Assurance Lead and provide ‘2nd Line’ support / challenge / assurance to the relevant areas of business or functional areas of responsibility where required These may take the form of more »
design, installation, maintenance, upgrades, and troubleshooting of applications and tools directly impacting the InfoSec Identity service deliverables. Active Directory (AD), Azure Active Directory / Entra ID : Analyze, design, implement, and support the hybrid on-premises and cloud Active Directory environment. Collaborate with business and technical partners to integrate … maintain integrations between Entra ID and Linux-based systems. Ensure seamless authentication and authorization for Linux users. Automation of User and Device Onboarding / Offboarding : Develop and maintain scripts or workflows to automate user and device provisioning and deprovisioning. Streamline the onboarding and offboarding processes to enhance efficiency … response efforts as Incident Commander. Other duties as assigned or directed. Education, Experience, and Skills required Proven experience as a Senior Active Directory / Entra ID Engineer or similar role with a 5 to 8 years of experience. Advanced knowledge of Active Directory, Azure Active Directory /more »
investigation and resolution of security related events from various security appliances and toolsets Develop security incident response plans & procedures including Security Incident Crisis / Emergency Management Ensure integration of new security services within the monitoring and detection capability Ensure information and security data is continuously collected, correlated and … and emerging technology compliance trends Possess strong organization and time management skills Demonstrated flexibility in a fast paced and agile environment. EDUCATION AND / OR EXPERIENCE: Bachelor's degree in Business / Computer Science / Technology with IT audit or compliance experience In depth … knowledge of information security, Technology Compliance management industry frameworks and standards: NIST, OWASP, SANS, ISO-27001 / 2, SANS, and Cobit 3+ years working experience with enterprise technology compliance management programs, or Auditing experience, controls testing, conducting ITGC and PCI assessments and leading related more »
Cyber Security Consultant - Security Assurance - 2 / 3 days a week on Site (Tadley) - £65k to £80k + benefits Due to the nature of the work - holding current, high level valid UK government security clearance is highly advantageous. We are looking for experienced Cyber Security Consultant - Security / … to ensure that the client-based security teams uphold the highest standards. Whilst also acting as a group wide SME for direct queries / questions relating to Cyber Security Assurance. Typical day to day responsibilities: Management of the client's security documentation, including the creation and review of … standards for application across the organisation and within the supply chain. Alignment to industry standards and regulation, e.g. ISO/IEC 27001 /27002/ 27005. Define as-is and to-be security standards. more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
people, process, electronic, data, physical) in Spring Fibre. • You will be a subject matter expert and provide security guidance and recommendations to technology / business teams and contribute to Spring’s security policies, standards, and guidelines related to information and Network security. • This is a technical role and … understand the architecture, data flow and security controls in their systems. • Conduct periodic security compliance assessments and ISO 27001 / 2 reviews of BAU IT applications, infrastructures & ISMS. • Review the security posture of potential M&A acquisition targets. Requirement • Mapping long term business requirements … outsourcing, managed services, cloud computing, asset management, cryptographic keys & certificate management, PCI DSS and DPA compliance and ISO 27001 / 2. • Analysing network security controls, including firewall and router security configuration. Preferred • Delivering the security review processes and frameworks, with full audit trail. • Managing more »
disaster recovery plans and capabilities, addressing any identified gaps for continuous improvement. Technical Experience: Demonstrated two years of practical experience in security and / or infrastructure within a corporate setting Familiarity with enterprise information security standards like Cyber Essentials, ISO 27001, 27002more »
Network +, CompTIA Security +, CISM, CISSP or COBIT 5) Baseline knowledge of resilience frameworks (NIST CSF, ISO 27001 /27002 and COBIT) For more information, please apply more »
Liverpool University Hospitals NHS Foundation Trust
catchment area of more than two million people in the North West region and beyond. To hear more about our achievements click herehttps: // www.liverpoolft.nhs.uk / media / 13089 / 1606-annual-report-booklet_final.pdf Follow us on Social … comprehensive professional development in CS and IG. Desirable PRINCE 2 Foundation Certificate or equivalent Experience Essential Demonstrable extensive experience working in information governance / cyber security Demonstrable experience in engaging successfully with senior and external senior management in a CS and IG context. Experience of managing and progressing … security systems within an NHS IM&T environment. Desirable Proven experience of designing and specifying standards for CS and IG based on ISO2700 / ISF Standard of Good Practice, etc. Knowledge Essential Excellent understanding of communication strategies and approaches in relation to sensitive and contentious issues and incidents. more »
Cyber Security Assurance Manager London / Crawley £80,000+benefits+bonus • Establish and implement a technical assurance plan for cyber security, laying out precise guidelines and technical requirements, illustrating best practices, and gauging progress using predetermined metrics (KPIs). • Oversee the cyber security technical assurance team to guarantee timely and … excellence in programmes related to vulnerability management and cloud security posture management. • A working knowledge of compliance and regulatory frameworks, including GDPR, ISA /IEC 62443, ISO/IEC 27001 /27002more »
managed services, cloud computing, asset management, cryptographic keys and certificate management, PCI DSS and DPA compliance, and ISO 27001 / 2. Analysing network security controls, including firewall and router security configuration; Preferred: Delivering the security review processes and frameworks with a full audit trail. … new technology, including developing any needed processes. Aligning business requirements to complex security architecture frameworks. Skills Required: In-depth knowledge of: Firewall: Juniper / Cisco / Palo Alto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection Endpoint Security. Cyber Security Operations. … Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell / building dashboards / automating common tasks) Preferred : Experience in designing systems against a zero-trust architecture. Experience with designing SOC architectures (i.e. SIEM, SOAR and vulnerability management solutions). Expert more »
clinicians to develop and implement exciting data analysis projects to personalise the treatment of patients. For more information on the programme see https: // bartslifesciences.org / The successful candidate will have: Extensive experience of working with cloud services ideally within the NHS, academia … responsibilities of the role, and the person specification outlines the qualifications, skills, experience, and knowledge required. For both documents, please view the attachment / s below. Person Specification Experience Essential Substantial experience in leading the analysis of different complex technical / architectural solutions (e.g., cost, time … users undertaking difficult data analysis tasks. Experience in adapting or formulating new technical strategies and policies for a service and using their persuasion / negotiation skills to change these through the relevant governance structures and communicating these changes to users. Experience in taking technical leadership around delivering a more »
GRC Analyst (InfoSec ISO 27001) Sunderland / WFH to £40k Are you a tech savvy GRC Analyst looking to progress your career? You could be joining a successful and growing online gaming / gambling site as they expand their European presence. As … of protecting customers and the business alike from cyber security attacks. You'll maintain and continuously improve ISO 27001 / 2 policies, standards and procedures; collaborate across teams to drive adoption and adherence to InfoSec policy and guidelines and contribute to the continuous improvement … could be other industry e.g., finance You have a good understanding of governance standards and frameworks e.g., ISO 27001 / 2, PCI-DSS, NIST, ISF, GDPR You have good commercial awareness and experience of delivery security awareness within a large scale organisation You have more »
years of practical experience in enterprise security and infrastructure. * Familiarity with enterprise information security standards: Cyber Essentials, ISO 27001, 27002, Data Protection Act, GDPR. * Proficiency in Microsoft O365 Security, Networking, Security operations, Vulnerability Management, and Security Auditing. * Strong understanding of security testing principles, including … with a copy of your CV if interested! Key Words: Information Security Analyst, Information Security Engineer, Security Analyst, Information Security, NIST, COBIT, ISO-27001, ISO-27002, Compliance, Governance, Risk, Cyber Security, SOX, Sentinel, Defender, InTune BeTechnology Group Limited is acting as an more »
supporting and maintaining enterprise-wide solutions across a multi-region infrastructure. The ideal candidate will have a strong understanding of IT infrastructure and / or information security within a fast-paced environment and may be involved in SOX control responsibilities. Day to Day of the role: Assist with … Recovery (DR) plans and capabilities, identifying gaps and driving continual development. Required Skills & Qualifications: Two years of hands-on experience in security and / or infrastructure within an enterprise environment. Familiarity with enterprise information security standards such as Cyber Essentials, ISO 27001, 27002more »