In collaboration with GT, manage security systems, including firewalls, intrusion detection/prevention systems, and antivirus software. In collaboration with GT, Develop and test incidentresponse plans and coordinate responses to security incidents and breaches Raise awareness of cybersecurity issues among bank London employees; conduct annual training/ more »
carrying out maintenance and updates to roll out new features and keep the platform secure.Participate in a 24/7, on-call rotation for incidentresponse escalation within response and on-site Service Level Agreements (SLA).Provide highly technical implementation support in customer environments, including guidance on more »
across various Identity providers. Actively monitor emerging security technologies, trends, and solutions, assessing their applicability to business initiatives and strategies. Participate in Information Security IncidentResponse activities. Monitor compliance with information security policies and procedures among employees, contractors, and third parties. Collaborate with key stakeholders to create and more »
partners Review and update IT Security procedures to reflect best practice and mitigate current and emerging threats Assigned ownership of IT Security Monitoring and Response related FRB and Internal Audit finding(s) and effective/timely resolution with IT Security Maintain relationships with third-party IT security vendors and … securing systems, networks and infrastructure; operational support, including on-call experience.3+ years’ experience including combination of intrusion detection, malware analysis, forensics and/or incidentresponse, particularly in cloud environments. Working knowledge of cloud environments such as AWS. Monitor, tune and develop technical IT Security controls and frameworks … to ensure appropriate preparation, monitoring and response to threats Ensure a risk-based approach to IT Security is adopted in every part of the business and solutions Work with members of the IT Security team to help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber more »
python or PowerShell - Desired Basic knowledge of designing and deploying information technology and solutions in one or more of the core domains: Endpoint protection; IncidentResponse; Malware Analysis; Application and Data security; Infrastructure and Endpoint; and Security Intelligence/SIEM. Understanding and experience working with structured design methodologies. more »
Lead, you will play a pivotal role in coordinating security operations within their IT environment. Your responsibilities will include managing cyber defence technologies, coordinating incidentresponse, and leading threat hunting efforts. You will collaborate closely with internal teams and external partners to ensure the highest level of security … global team of IT security operations analysts, supporting their development and training. Select, deploy, and maintain cyber defence technologies such as Endpoint Detect and Response, Anti-Virus, SIEM, and SOAR. Monitor and manage the use of cyber defence tools, ensuring efficient performance and driving operational efficiency. Develop Standard Operating … Procedures (SOPs) and other documentation to support cyber operations. Respond to cyber-related incidents, coordinating remediation efforts and post-incident reviews. Enable threat hunting through the fusion of threat intelligence and business risk analysis. Requirements: Strong understanding of network protocols, firewalls, and intrusion detection/prevention systems. Proficiency in more »
capable of implementing secure rebuilds tailored to customer requirements.Conduct assurance assessments of Third-Party suppliers to uphold security standards.Provide expert technical support during incidents response engagements.Reviewing existing technical environment, propose and manage changes to improve IT Security.Take ownership and responsibility for accomplishing objectives across the team and department.Demonstrate steadfast … NIST, CIS Critical Controls.VMWare or Hyper-V and server integration knowledge and experience.Certified Information Systems Security Professional (CISSP) or equivalent.Exposure to ISO 27001, 9001.Any incidentResponse or rebuild after disasters experience is a plus.Knowing we’re right for youEmbracing uniqueness, the culture at Grant Thornton thrives on the more »
engagements across a broad range of information security disciplines, including: Technical domains and cyber transformation Framework assessments and roadmapping Cyber regulations, governance and compliance IncidentResponse, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management S-RM Consultants are organised and dynamic project managers and more »
Ensure compliance with data privacy laws and regulations.Risk Management: Conduct risk assessments and take appropriate actions to mitigate the risks associated with data security.Incident Response: Respond to security incidents, conduct investigations, and implement solutions to prevent similar incidents in the future.Training and Development: Train and educate stakeholders about our more »
solutions that align with industry best practices and regulatory compliance requirements. Collaborate with other teams to integrate security controls seamlessly into the network infrastructure. IncidentResponse and Threat Mitigation: Monitor network traffic for security events and respond to security incidents in a timely manner. Conduct in-depth analysis … IPS, SIEM, and endpoint security solutions. Experience working within an ITIL framework. Hands-on experience with security tools and platforms for monitoring, analysis, and incident response. Excellent analytical skills with the ability to troubleshoot complex network security issues. Experience with cloud security solutions and architectures, particularly AWS or Azure. more »
Develop and maintain strong relationships with key stakeholders. Lead and manage a security pillar, ensuring the delivery of high-quality work. Document and maintain incidentresponse plans for various cybersecurity incidents. Maintain Business Continuity Policies and Plans to ensure uninterrupted operations. Prepare and maintain Disaster Recovery plans to … mitigate potential disruptions. Collaborate with teams for data center operations and backup, ensuring compliance and risk management. Manage crisis response professionals and conduct simulation exercises to test preparedness. Qualifications and Experience: Bachelor’s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH … CEH, or OSCP. Proficiency in SIEM Platforms, vulnerability management tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data and identify threats. Ability to make considered decisions and ensure successful delivery in a fast-paced environment. Why Join more »
DEVOPS environment, with strong knowledge of AWS services and security best practices. Proven experience working as part of a SOC function, with expertise in incidentresponse and threat hunting. Strong understanding of network security principles, protocols, and technologies. Excellent communication and interpersonal skills, with the ability to effectively more »
Employment Type: Permanent
Salary: £50000 - £60000/annum Bonus + Health insurance
incorporated into the business Risk Register. Participate in supplier reviews, serving as the subject matter expert in cybersecurity. Provide support during the Bank's incidentresponse process involving suppliers. Contribute to the continuous monitoring of key third-party relationships. Enhance awareness of third-party cybersecurity risks through local more »
DEVOPS environment, with strong knowledge of AWS services and security best practices. Proven experience working as part of a SOC function, with expertise in incidentresponse and threat hunting. Strong understanding of network security principles, protocols, and technologies. Excellent communication and interpersonal skills, with the ability to effectively more »
policies and audit requirements. Contribute to the development of a Cybersecurity Operations Resource and Capacity planner managed through BDO's Azure DevOps environment. Oversee incidentresponse, threat detection, and mitigation efforts You'll be someone with: A good understanding of monitoring frameworks eg MITRE ATT&CK and SIEM more »
the appropriate SIEM platform and then once it's embedded ensuring BAU and leading security monitoring, carrying out indepth investigations and actively participating in incident response. This is a high profile role where you'll establish Security Operations Centre procedures and processes from the ground up, collaborating with senior more »
conflicting, highly complex, highly contended, and/or highly sensitive information Experience in managing critical incidents, and problem investigation + resolution (including managing security incidentresponse, and information security breaches) Experience of contributing to, and developing enabling strategies (example: information security) Coaching, mentoring and supervision of others Management … party provision contracts) and developing investment cases Desirable Experience in conducting or managing information security audits, penetration testing, table-top/simulation exercises, and incident investigations Experience of management products/services in healthcare (NHS) Skills and knowledge Essential Deal with complex business problems and translate into information security more »
and intelligence services and provides: Subscription and bespoke research services to public and private sector intelligence clients globally; Intelligence support to, and collection from incidentresponse and managed threat hunting teams; Insight to our adversary emulation team on novel tools and techniques used by cyber threat actors; and … defining the threats to Critical National Infrastructure, to defining strategic collection requirements, generating intelligence reporting as part of our subscription intelligence service or in response to RFIs, you will have the opportunity to lead interactions with a wide ranging internal and external consumer base. You’ll also get to more »
access, theft, and other threats. Conduct regular security assessments and audits to identify vulnerabilities and develop plans to address them. Develop and maintain an incidentresponse plan for cybersecurity incidents. Collaborate with other IT professionals, including developers, and system administrators, to integrate cloud/On-premises security measures more »
consultants across a broad range of information security disciplines, including: Technical domains and cyber transformation Framework assessments and roadmapping Cyber regulations, governance and compliance IncidentResponse, Disaster Recovery and Business Continuity Training and Exercising Threat Intelligence Project Management Support the management of projects, including: Managing client engagement, communication more »
cost-effective data, services and infrastructures;- Maintain services once they are live by measuring and monitoring availability, latency and overall system health. Practice sustainable incidentresponse and blameless postmortems;Qualifications- Extensive hands-on experience operating large scale Kubernetes environments- Strong hands-on experience in Linux and TCP/ more »
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
input for architecture plans with consideration of current standards. · Design and implement platform authentication. · Monitor new and emerging technologies that could be adopted · Provide incident response. · Liaison with key stakeholders · Ensure smooth handover form engineering to production. Requirements: · 7 + years experience within Security Engineering and at least 2+ more »
trends and tradecraft of Advanced Persistent Manipulators (APM) to drive action and response. The candidate must be able to craft formal intelligence and use incidentresponse best practices to participate in active investigations and document relevant findings of these activities.- Leverage knowledge of marketing and advertising strategies to … cross-functional teams and leadership as appropriate. Further, the candidate is expected to use communication skills to work closely with cross-functional partners in response to actions over a variety of security disciplines to disseminate information and reporting as appropriate in support of TikTok's critical business and operational more »
Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
threat intelligence sources to inform strategic vulnerability mitigation measures. Threat Management o Take lead on the daily threat management activities o Maintain and update incidentresponse playbooks and automation o Monitor security dashboards and reports for alerts and threats o 2nd line support to IT Service Desk for more »