Leamington Spa, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
for any PAM & EPM alerts or issues which has been raised by other departments, or potentially from monitoring systems. Keep abreast of trends in informationsecurity and be able to propose proactive mitigation as appropriate Provide consultancy on PAM & EPM Best Practices to different stakeholders/teams Required … operating systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Privileged Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity Significant knowledge of Endpoint Privilege Management governance principles and best practices and experience in managing informationsecuritymore »
Warwick, Warwickshire, United Kingdom Hybrid / WFH Options
Adecco
work on cutting-edge projects and collaborate with a team of experts in a dynamic and collaborative environment. If you are passionate about cyber security and eager to make a significant impact, this is the perfect opportunity for you. Responsibilities : Spearhead cyber security risk analysis initiatives within our … secure operation of critical systems. Engage in interdisciplinary cooperation to conduct comprehensive risk assessments for our Energy Transmission network and its vital Network and Information Systems (NIS). Methodically evaluate and validate control process effectiveness based on recognised frameworks such as NIST CSF, identifying areas for enhancement to bolster … our cyber security posture. Forge strong partnerships with stakeholders across Energy Transmission and global risk management teams to craft bespoke risk mitigation strategies tailored to our specific challenges. Facilitate compliance with regulatory mandates such as OFGEM reporting and NIS Regulations while actively participating in the development of cyber securitymore »
Warwick, Warwickshire, West Midlands, United Kingdom Hybrid / WFH Options
Maclean Moore Ltd
systems (desktop & server), Core infrastructure (network, databases). Significant knowledge of Identity and Access Management governance principles and best practices and experience in managing informationsecurity risk relating to identity. Knowledge of SAML/OAUTH protocols. Experience of working and influencing cross-functionally and managing external agencies. Good more »