to be onsite in Berkshire 3 days a week. Key experience for these roles are: LLD & HLD Infrastructure & Data Centre MS Suite Private Cloud PAM (PrivilegedAccessManagement) Directory Services DNS, DHCP, NTP Cyber Security Awareness - Vulnerability, Malware, Compliance You must have A ctive DV Clearance & be more »
change. · Responsible for detailed project reporting and governance adherence · Responsible for delivery of a suite of primarily IT infrastructure projects with a security focus. Management of Infrastructure & Corporate Technology projects is required Essential Function/major duties and responsibilities of the job Strategic · Defines plans through a rigorous and … or co-ordinates required business analysis where necessary. Presents plans and business cases and gains their sign off from sponsors and other stakeholders. · Relationship management; develop and maintain strong relationships with stakeholders, both internal and external. · Create project business case for all projects and ensure the benefits are measurable … from a benefit realisation, time, cost and quality perspective. o Providing status reports. • Liaison with, and updates progress to, project steering board/senior management • From time to time, provide cover for peers and assist in the creation and issuance of departmental reports • Understand basic revenue models, P/ more »
change initiatives in the company. Candidates should have additional experience of: Extensive experience in delivery of Security projects like Data loss prevention, SIEM, Identity accessmanagement and PrivilegedAccess management. Significant practical experience of leading and managing Corporate/Infrastructure change programmes across an end-to … project documentation with excellent skills in the use of the MS Office suite of tools and MS Project Formal training or certification in Project Management Certification (MSP/PRINCE2/PMI/APM/SIX SIGMA) Professional PM accreditation (Prince 2, PMI, APM etc…) Significant project management experience more »
to building, deploying, and operating our Cyber capabilities to fortify our defenses, employing innovative and cutting-edge cyber technologies. Our duties span cyber threat management, real-time attack detection and prevention, and swift remediation, integrated with advanced artificial intelligence and machine learning. Additionally, we leverage Cyber DevOps automations to … and setting the Cyber framework and Security compliance policies across the company, including the development of robust Business continuity plans, disaster recovery, and critical management plans to ensure the resilience of our operations in the face of cyber threats and other emergencies. Key Competencies Technical Significant experience in Cyber … protecting IT, OT, and IP networks, including IPSec VPNs, Firewalls, SIEM, IPS/IDS, AV/EDR solutions, LDAP/AD, etc. Expertise in PrivilegedAccessManagement and related tools High level of expertise in Vulnerability and Compliance Management; DDOS protection Hands-on experience in Cyber more »
for a security engineer to ensure new system solution meets security requirements. Your role will be * Alongside an SME, learn and develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop Identity and AccessManagement solution; including feeding into Service more »
for a security engineer to ensure new system solution meets security requirements. Your role will be: * Alongside an SME, learn and develop the Privilege AccessManagement solution; including feeding into Service * Alongside and SME learn and develop Identity and AccessManagement solution; including feeding into Service more »
including both Consulting/Professional and Managed Services, across Enterprise Computing, Cloud, Data Centres, DevOps, End User Computing, Service Desk, Network Services and Environment Management Services. Job roles and responsibilities: Providing a clear view of the level of risk to ensure appropriate mitigation plans are put in place and … experience in building Zero Trust Architecture Hands-on experience on tools related to one or many of the tools in Endpoint security, IAM, Privilege Access Management. Tools exposure: Zscaler, Microsoft Defender, Sentinel, BeyondTrust, Azure native security etc. Preferred Skill: OT security is preferred. At Cognizant you will experience an more »