youll be doing Day to day monitoring and administration of security controls around tooling solutions and Cloud based systems such as Office 365, Azure. Management and configuration of our key security systems, Crowstrike, Rapid7, Mimecast, Azure security suite & Netskope. Monitor the GPHG security services to ensure the patching, security … controls and mechanisms are operating effectively. Investigate issues and escalate. Assist in delivering security reviews and the management of metrics to ensure confidentiality, integrity, standardisation and consolidation for ease of support and maintenance. Take ownership in obtaining information, evidence and data required to diagnose and resolve complex problems. Proactively … security, technology architecture or an infrastructure role. Experience in designing and implementing written and technical information including security policies. Experience in IT security incident management Practical knowledge of information security risks, controls and frameworks (e.g., NIST, COS or ISO27001) Experience of security withing Azure/Cloud environment, Mimecast or more »
skills across the implementation, maintenance, and configuration of security tools and platforms; creating policy changes, completing constant monitoring, identifying/resolving issues. and performing vulnerability testing. The role is very diverse covering all aspects of Cyber Security and would offer an excellent opportunity to further your skills and expand … of different security products and offer the chance to gain additional certifications and experience. You will gain further exposure to End to end threat & vulnerabilitymanagement Operational support of security technologies, products, and services Vulnerability scans and identifying vulnerabilities in systems Monitoring for unusual activities, implement defensive … of contemporary standards, practices, procedures, and methods. Wireless security, network monitoring, network design, windows desktop/server security, database security, routing protocols and incident management Aptitude to use online research tools and internal documentation to find resolutions to problems Be able to conduct cyber essential assessments. Any experience with more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
changing environments Demonstrable experience SIEM & Network technologies using Sentinel. Detailed experience of log analysis including KQL and SQL queries. An understanding of Threat and Vulnerability Management. Experience with Defender XDR, Defender Endpoint Identity, Defender for Cloud and Cloud Apps. Strong understanding of Azure and M365 Security. Experienced with either more »
tech teams to ensure Security best practice is followed and compliance is met Push Security framework maturity Deliver projects to improve Security compliance Conduct vulnerability scans/reviews and schedule pen tests Provide an understanding of Security tools (SIEM, EDR, IAM, Network devices etc) Handle and investigate incidents Conduct … internal & external Security assurance reviews What skills do you need as an Information Security Manager? People management ISO27001 NIST Cloud Security principles, controls and tools experience Vulnerabilitymanagement expertise Experience with Security tooling Managing, implementing and reporting on Security frameworks Security related degree or relevant certifications Experience more »
departments and serving as a strategic advisor, playing a pivotal role in safeguarding our digital infrastructure and navigating complex security challenges. Key Responsibilities: System VulnerabilityManagement Lead the charge in identifying and mitigating system vulnerabilities. This involves continuous monitoring of our IT landscape, implementing effective patches, and configuring … systems to enhance their security posture against evolving threats. Develop, implement, and monitor a strategic, comprehensive enterprise cybersecurity and IT risk management program. Compliance and Standards Adherence Ensure our international IT operations are in strict adherence to SOC2 and GDPR compliance. Work in collaboration with the Compliance, Legal, and … Information Systems, Computer Science, or a related field a plus. About us: Loftware is the world’s largest cloud-based Enterprise Labeling and Artwork Management provider, offering an end-to-end labeling solution platform for companies of all sizes. Maintaining a global presence with offices in US, UK, Germany more »
SW9, Oval, Greater London, United Kingdom Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerabilitymanagement and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
currently looking for a Cyber Security Engineer to join their team and hit the ground running - delivering a suite of technical, operational, and risk management services. Collaborating closely with regional teams, you'll ensure compliance with industry standards, policies, and procedures, while actively mitigating evolving threats, thus driving forward … Engage in 'ethical hacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including monitoring for abuse of permissions by authorised system users Acting as an escalation point to analysts Threat hunting Vulnerabilitymanagement Skills more »
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
awareness to mitigate cyber risks and safeguard critical information. What you will be doing Overseeing day-to-day security operations, including monitoring, incident response, vulnerabilitymanagement, and threat intelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cyber security … policies, standards, and procedures, ensuring compliance with industry regulations and best practices, and creating a framework for security governance Working closely with senior management, IT teams, legal and compliance departments, and other stakeholders to align cyber security initiatives with business objectives Providing strategic guidance to senior management, ensuring … in Information Security across IT and business within areas such as PCI-DSS, GDPR, ISO/IEC 27000+, etc. Experience in an Information Security management function and/or related functions (such as IT audit and IT Risk Management) Experience of IT Architecture including the development (and ensuring more »
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerabilityManagement will be more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
of the ever-evolving threat landscape. Here's what you'll be doing: Develop and implement a comprehensive information security program: Think risk assessments, vulnerabilitymanagement, incident response, access control, the whole enchilada. Lead and empower a team of security professionals: Guide, mentor, and inspire your team to more »
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerabilitymanagement A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
and implementing operational policies and standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cyber security architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams more »
organisation, with a focus on the End-User technologies. This includes, but not limited to; Active Directory, Group Policy, User profiles, VMware Mobile Device Management, SCCM, WDS, Remote Desktop Services, FortiClient EMS, and Jira Service Desk Deliver project work to upgrade and improve upon existing infrastructure Respond to tickets … and manage allocations of project tasks Ensure systems are kept safe and secure by embedding vulnerabilitymanagement best practises Proactively monitor systems, embed policy compliance across the end-user estate, highlight trends and proposing preventative measures Be available outside of business hours on an ad-hoc basis to … OS images using SCCM or Windows Deployment Services (WDS). Windows Server OS implementation experience across multiple platform roles, including Active Directory, Group Policy management, Remote Desktop Services. WSUS update patch management. Strong scripting ability in the likes of PowerShell or similar languages Strong experience with Mobile Device Managementmore »
a completely cloud environment and the continued enhancement of workplace technology. Working directly with Windows 10/11, laptop devices, Intune, PowerShell, Azure, and vulnerability management. Experience required: PowerShell scripting from scratch Microsoft Azure Azure AD Background in infrastructure Hands on experience with Intune Device Management and User … support Windows 10/11 Desirable but not required: SCCM MDM VulnerabilityManagement Please apply directly and we will be in touch to provide further information more »
due diligence, gap analysis and make suggestions accordingly Ensure Security best practice is followed and ISO27001 compliance is met Generate metrics/dashboard for management reviews Assist in overseeing the ISMS from a GRC perspective Provide Information Security awareness training to tech & non-tech teams Plan audits, risk assessments … the SecOps team with incident handling, response and escalations, as well as ensuring processes are documented in line with ISO27001 Manage technical risks via vulnerabilitymanagement oversight & gap analysis, whilst also overseeing DLP alerts and creating reports What skills do you need as an Information Security Analyst? ISO27001 more »
identified vulnerabilities and weaknesses. Develop & establish supplier chain security agreements/contracts/questionnaires and manage completion and disengagement. Ensure timely and robust incident management resolution, including major incident response coordination and management. Stay informed about emerging cybersecurity threats and trends, providing recommendations for proactive risk mitigation and threat … CISA, CISM, etc.) are a plus. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, EDR platforms, SIEMs (Splunk/Azure Sentinel), Powershell etc. Strong analytical and problem-solving skills, with the ability to effectively prioritise more »
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter expertise across a … of DevOps and IaC concepts You have a good understanding of cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi You have automation and scripting (PowerShell or similar) skills You're more »
withtraveltoclientsites Are you a seasoned Infrastructure/Project Engineering Professional looking for an exciting opportunity to work for an award-winning Cyber Security & Risk Management company? Our client is a leader in cyber incident response and security managed services. Rapidly expanding and seeking Mid & Senior level IT Infrastructure Engineers … vectors, and mitigation strategies. Excellent communication skills to convey technical information . Key responsibilities include: Incident Response& Analysis Security Monitoring&Incident Detection Threat Hunting VulnerabilityManagement Security Reporting and Documentation Benefits: Cycle to work scheme Gym membership Private dental insurance Private medical insurance We are IP-People We more »
and other risk frameworks (e.g. ISO27001/ITIL/Sarbanes-Oxley/NIST/PCI). Assisting in the development and optimization of control management processes to ensure IT Operations operates and can evidence effective controls which address risks, local legislative or regulatory requirements, company policies, and best practice. … IT Operations’ audit findings, and mitigation efforts, ensuring gaps are understood and that appropriate action plans are determined and tracked to completion Ensure effective management of IT Operations’ risks, recommending mitigations and track and reporting on remediations required to bring residual risks in line with targets Work with the … the Encore IT Risk and Control team, and colleagues in related functions (e.g. Finance for Sarbanes Oxley work) Support I.T Operations on patch/vulnerabilitymanagement Follow any reasonable instructions as directed by management Things we need from you: Proven track record of delivery in an IT more »
Security Experience of working in environments using ISO27001 or Cyber Essentials Plus would be beneficial Strong knowledge of security tooling and technologies including SIEM, vulnerabilitymanagement, DLP etc Good knowledge and understanding of public Cloud platforms (e.g. AWS and Azure) Good understanding of the current threat landscape Excellent more »
with resolutions. Keeping company up to date and compliant with industry best practice, policies, and guidelines. Managing penetration tests. End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA more »