available Ensure that all areas have adequate pest control mechanisms in place to limit the threat to food safety Carry out, review and communicate trendanalysis of quality issues e.g. customer complaints and TVC counts Manage and coordinate internal audits by; Implementing audits ensuring scope is applicable, Planning more »
all times Implement and amend QMS for product standards. Ensure effective QA and Hygiene team management. Implement pest control mechanisms for food safety. Conduct trendanalysis of quality issues. Manage internal audits and implement corrective actions. Advise on compliance with statutory requirements and legislation. Liaise with regulatory agencies more »
all times Implement and amend QMS for product standards. Ensure effective QA and Hygiene team management. Implement pest control mechanisms for food safety. Conduct trendanalysis of quality issues. Manage internal audits and implement corrective actions. Advise on compliance with statutory requirements and legislation. Liaise with regulatory agencies more »
all times Implement and amend QMS for product standards. Ensure effective QA and Hygiene team management. Implement pest control mechanisms for food safety. Conduct trendanalysis of quality issues. Manage internal audits and implement corrective actions. Advise on compliance with statutory requirements and legislation. Liaise with regulatory agencies more »
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
First Point Group Limited
and customer EHS meetings, information gathering, scheduling of random audits/inspections of suppliers/services, EHS, performance and produce written reports detailing findings, trendanalysis and recommendations. Reviewing and addressing issues raised by the customer Review and update legacy EHS documentation EHS inductions Carry out desktop reviews more »
Barrow-In-Furness, Cumbria, North West, United Kingdom Hybrid / WFH Options
JAM Recruitment Ltd
of the Joint Integrator Master Schedule using P6, taking inputs from the Submarine Delivery Agency and all Industrial Parties. In addition, you will provide trendanalysis of schedule performance and Earned Value Management data. The Person To be successful in this role, you'll need to have experience more »
technical advice to all departments and customers to maintain long-lasting relationships. Technical Manager Roles and Responsibilities: ·Provide reports and summaries to allow easy trendanalysis and monitoring of important quality and food safety KPI's (customer complaints, micro results, quality control information), allowing generation of robust improvement more »
change and service requests - Ensure the NOC Manager is kept informed of all service affecting incidents and appropriate - Monitor usage patterns and conduct ongoing trendanalysis to track system load, usage, and responses, enabling proactive issue identification - Conduct diagnostic analyses of applications, networks, and related systems as needed more »
Meeting Room equipment including but not limited to; troubleshooting hardware, physical validation on power and device connectivity, settings as per standards, network connectivity. * Incident trendanalysis for Meeting Room tickets. * basic Meeting Room equipment setup and support when required. * firmware upgrades of Meeting Room components where required. * level more »
to be responsible for handing security incidents received/escalated from the SOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident. You will leverage a deep understanding of information security technologies, you will aid in triaging threat intelligence from multiple sources … and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend the response actions and escalation path. You will be guided by Threat Intelligence which is actionable information (e.g. IOCs/TTPs), conduct threat hunting activities; leveraging and analyzing sources of … some devops tasks. What You'll Be Doing: '€¢Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up. '€¢Perform advanced event and incident analysis, including baseline establishment and trend analysis. '€¢Manage a number of analysts as more »
to be responsible for handing security incidents received/escalated from the SOC Analyst (Tier 1 or Tier 2) and perform a business impact analysis on the security incident. You will leverage a deep understanding of information security technologies, you will aid in triaging threat intelligence from multiple sources … and add contextual information to the security incident, perform additional analysis and based on the business impact will recommend the response actions and escalation path. You will be guided by Threat Intelligence which is actionable information (e.g. IOCs/TTPs), conduct threat hunting activities; leveraging and analyzing sources of … some devops tasks. What You’ll Be Doing: Oversee completion of day-to-day checklist(s), including log review, management report scheduling & running, alert analysis, and escalation follow up. Perform advanced event and incident analysis, including baseline establishment and trend analysis. Manage a number of analysts as more »
Lead daily and long-term operational and strategic management of hardware and software assets, ensuring efficient utilisation and alignment with organisational objectives. Reporting and Analysis: Provide timely KPI/metric information and standardised reporting as scheduled, along with ad hoc reporting as requested by management. Conduct trend analyses more »
Wirral, Metropolitan Borough of Wirral, Merseyside, United Kingdom
DATS Recruitment Ltd
including ISO 27001. • Support the Information Security Education and Awareness strategy to include delivery of training using various methods, simulation exercises, communication, reporting and trend analysis. • Directly support annual testing and support the Information Technology Team with delivery of resolutions. • Support threat hunting analysis to ensure Information Security more »