reviews and assessments of product security architectures and designs across a diverse range of complex infrastructure, data and application systems. * Ensure timely and robust incident management resolution, including major incidentresponse coordination and management. * Deputise for the Senior IT Security Manager as and when required. Education, Qualifications … of overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. * Experience in incidentresponse and overseeing improvement actions such as development and tuning of security monitoring, alerting, and reporting. * Technical knowledge and broad hands-on experience … Ability to work supportively and collaboratively with colleagues across Technology & transformation as well as the wider business. * Ability to effectively coordinate and manage major incident responses. * Ability to work under pressure and maintain customer service ethic. * Ability to be creative. * Ability to present complex security solutions and situations to more »
Lichfield, Staffordshire, West Midlands, United Kingdom
RECRUIT123 LIMITED
encourages their employees to gain recognition with industry certifications and to build their experience with exposure to new technologies, service delivery and post-breach incident response. A competitive salary and a great working environment is on offer here. What we need from you as a 2 nd Line IT … support issues and some 3 rd line support issues raised through the helpdesk Visits as required to customer sites to provide Technical Support or IncidentResponse Providing Systems, Network & Firewall Support Providing a pro-active response toNOCandSOCdetections in customer systems Visits as required to customer sites to … provide Technical Support or IncidentResponse Salary/package: £28,000 -£35,000 per annum. Monday to Friday9.00amto 5.00pm. Benefits: (Easy Access) Located near to the national road network. 3 miles to JunctionT4of theM6toll road and theA5,mile to theA38 Friendly open-door culture where employees are encouraged more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Indotronix Avani UK Ltd
address potential vulnerabilities and risks. - Implement and maintain security controls and compliance measures based on industry standards and regulatory requirements. - Key member of the incidentresponse efforts, conduct root cause analysis, and recommend corrective actions to prevent future incidents. - Monitor AWS security alerts, events, and incidents, and respond … and infrastructure-as-code (IaC) tools. - Ability to perform security threat modeling and risk assessments to identify and prioritize security risks. - Experience with security incidentresponse and handling, including log analysis and forensics. - Strong communication and interpersonal skills to collaborate effectively with cross-functional teams. - In-depth knowledge … with Company Policies and Security Infrastructure - Familiarity with AWS Security Best Practices and the business Setup - Integration into DevOps Workflow Within 3 months: - Security Incident Handling and Remediation - Security Automation and Tooling - Security Compliance and Auditing - Collaboration with Development Teams Within 6 months: - Threat Modelling and Risk Assessment - Continuous more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
Indotronix Avani UK Ltd
address potential vulnerabilities and risks. Implement and maintain security controls and compliance measures based on industry standards and regulatory requirements. Key member of the incidentresponse efforts, conduct root cause analysis, and recommend corrective actions to prevent future incidents. Monitor AWS security alerts, events, and incidents, and respond … and infrastructure-as-code (IaC) tools. Ability to perform security threat modeling and risk assessments to identify and prioritize security risks. Experience with security incidentresponse and handling, including log analysis and forensics. Strong communication and interpersonal skills to collaborate effectively with cross-functional teams. In-depth knowledge … with Company Policies and Security Infrastructure Familiarity with AWS Security Best Practices and the business Setup Integration into DevOps Workflow Within 3 months: Security Incident Handling and Remediation Security Automation and Tooling Security Compliance and Auditing Collaboration with Development Teams Within 6 months: Threat Modelling and Risk Assessment Continuous more »
address identified vulnerabilities and weaknesses. Develop & establish supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. Ensure timely and robust incident management resolution, including major incidentresponse coordination and management. Stay informed about emerging cybersecurity threats and trends, providing recommendations for proactive risk more »
including findings, recommendations, and remediation actions. with other SOC analysts and stakeholders to develop and implement proactive security measures and threat detection strategies. in incidentresponse activities, including containment, eradication, and recovery efforts. in the development and maintenance of security policies, procedures, and documentation. up to date with … incidents. communication skills, with the ability to articulate technical concepts to both technical and non-technical audiences. certifications such as CompTIA Security+, GIAC Certified Incident Handler (GCIH), or Certified Information Systems Security Professional (CISSP) are desirable but not essential. Benefits: Our client offers a great working environment with various more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
Infrastructure Security Accountabilities * Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incidentresponse, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation … the application and compliance of security operations procedures, reviewing actual and potential security breaches, and ensuring their investigation. * Lead the Security Operations team's response to incidents, recommending actions and appropriate control improvements. * Monitor the external environment to gather intelligence on emerging technologies, documenting impacts, threats, and opportunities to … activities within company IT, providing expert advice where necessary in the review of vulnerability assessment tools and techniques. * Develop, maintain, and test Security Operations' incident management procedures, investigating escalated incidents and facilitating recovery post-incident resolution. * Lead Security Operations risk management activities, leading on the identification of risks more »
Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as … monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incidentresponse, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more »
Support the annual penetration testing schedule by arranging penetration testing, including tracking, and communicating penetration testing results. - Perform supplementary testing of clients detection and response controls by procuring, installing, and running penetration testing tooling. - Participate in process improvement work to automate and improve critical cyber security processes such as … monitoring, patching, and hardening. - Develop and maintain process documentation for security architecture, vulnerability management, cyber incidentresponse, and playbooks. - Provide security representation across multiple geographies, business units and teams to achieve objectives, including engagement with the Information Security Enhancement Office. Skills, Knowledge and Experience - Has obtained one or more »
Kettering, Northamptonshire, United Kingdom Hybrid / WFH Options
Clinch
as other in-house IT teams to support Travel + Leisure e-commerce, corporate call centre, proprietary and COTs systems and applications, including problem, incident and change management. Responsible to provide level 1 & 2 problem and incidentresponse support for the enterprise production and non-production environments … support documentation The ability to learn quickly, work autonomously and make sound decisions Excellent customer service, communication and technical documentation skills ITIL (change management, incident management, configuration management, availability management) DESIRABLE Virtualisation technologies Experience in e-commerce, call centre, support of proprietary and COTS applications TECHNICAL SKILLS MINIMUM Excellent more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
protect the information assets of the organisation. You will gain exposure to various areas of cyber security including network security, threat intelligence, vulnerability management, incidentresponse as well as assisting with the implementation of security policies. Furthermore, you will have the opportunity to participate in team meetings and more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
NQB International
team of highly skilled professionals, including Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. With expertise in system penetration, network intrusion, incidentresponse, user awareness, and information governance, they are at the forefront of developing and delivering cutting-edge solutions, strategies, and services in the more »