Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerabilitymanagement reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerabilitymanagement reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerabilitymanagement You will advise on Security best practices, and act more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Bournemouth, England, United Kingdom Hybrid / WFH Options
Interact Consulting
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based more »
our strategic cloud security operations. This role offers an exceptional opportunity to assume the helm of our Cloud Security department, driving strategy, overseeing threat management and ensuring robust security protocols for our cloud-based resources. As Head of Cloud Security, you will play a fundamental part in guaranteeing the … You'll harness your extensive experience to secure our cloud-based assets across multiple platforms and services. ResponsibilitiesDefine or drive maturity of Information Security Management Systems and Security Roadmaps for large enterprisesConsult VP and C-level stakeholders on security solutions and enterprise security programs and manage those relationshipsDefine Security … Programs in some of the following domains: Cloud SecurityApplication SecurityIdentity & Access Management (and related)Threat & Vulnerability ManagementMDM/MAMData protectionSecurity Operations CenterSecurity TestingConduct Security assessments for enterprises and cloud/hybrid workloadsConduct orchestrate discovery process together with Security ArchitectsLead sales process, prepare RFP/RFI responsesManage a team more »
including IPSA, FSC and IVCO and in line with Raytheon policies, strategy, applicable contractual commitments, legal requirements and industry good practice. Ensuring personnel security management compliance for employees and contractors including correct vetting procedures and the security management of visitors and contractors to meet HMG, UKSV and IPSA … risk and threat assessments including regular practical exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection and vulnerabilitymanagement and driving the required remediation. Creation and maintenance of security culture in line with UK Government Security requirements providing regular reports and … critical metrics that demonstrate the compliance and effectiveness of security operations. Implementation and management of an effective Raytheon UK incident management system, developing strong internal and external relationships to promote the early identification and resolution of incidents and lead on any associated investigations. Implementation and management of more »
Tenable Nessus VulnerabilityManagement Scanning Engineer GlobalLogic have a new role for an VulnerabilityManagement Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … either Cheshire or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus VulnerabilityManagement, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The … ideal candidatehas the following skills and expertise: years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration more »
VulnerabilityManagement (TVM) Installation and configuration Engineer GlobalLogic have a new role for an Installation and configuration Enginee r with Tenable Nessus expertise ideally. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … to someone with either CyberArk or Splunk and we are looking for someone who has the following skills and expertise: years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues in the design and implementation … controls to secure systems, applications, network, or infrastructure services experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. understanding of TCP/IP networking concepts and DNS./Unix/Windows Operating systems experience years of related more »
measures, monitoring for security incidents, and responding promptly to security breaches. As a Cyber Security Analyst you will be gain exposure across: Security Infrastructure VulnerabilityManagement Incident Response Ideally you will have experience across: Security principles, techniques, and protocols Endpoints, servers, infrastructure and networking technologies Experience in supporting … security systems, including vulnerabilitymanagement, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc The client is based in London, however will consider candidates on a remote basis. Sound interesting? Click apply now and I will be in touch to discuss further more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
tools such as Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerabilitymanagement, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security more »
latest security principles, techniques, and protocols Detailed technical knowledge related to endpoints, servers, infrastructure and networking technologies Strong experience in supporting security systems, including vulnerabilitymanagement, SIEM, DLP,SOAR, EDR solution, Network Firewalls etc. Working knowledge of IT processes (i.e., ITIL) including incident, problem, defect, change and release … management The Cyber Security IT Analyst requirements: 3+ years’ experience in Cyber Security IT operations (law firm preferable, professional services advantageous) Bachelor’s degree or higher in Computer Science or Information Security (essential) Advanced ability to organize, prioritize, coordinate, and work as part of a team Excellent written and more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Farnborough, England, United Kingdom Hybrid / WFH Options
Shaw Daniels Solutions
with stakeholders, to uncover emerging risks and opportunities for malicious actors. Produce written reports, status updates, actions, minutes to support decision making within the management systems governance programme. Conduct annual Business Impact Assessments with relevant teams Ensure and track that staff get the infosec training required Annual infosec and … the document review period. Compile a list of actions to address any lapses and track to conclusion. Assist with the monitoring of our platform vulnerabilitymanagement systems and logging of identified vulnerabilities In the event of any security event, be part of the response team, by providing infosec more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and Cyber Security with the day-to-day operational management of the cyber security function. You will work with the Senior Cyber Security Manager to define and evolve the cyber strategy across the organisation. … and analyse security incidents and breaches, and lead incident response efforts to contain and mitigate the impact in a timely manner. Reporting to senior management on Cyber related metrics and improvement needs. Foster a culture of security awareness and compliance amongst team members and stakeholders through training, education, and … initiatives. Leading any major cyber incidents should they arise. Escalating security concerns that are not being adequately addressed through the established risk/issue management framework. You will need: You will need to be able to influence and collaborate with other teams in the organisation, and the ability to more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Design, CSA, ISO 27001/2, ISO 27017, ISO 27018, or NIST Cyber Security Framework Knowledge and Practical Experience, SIEM (Splunk, MS Sentinel), Log Management, VulnerabilityManagement, Incident Response, Security Monitoring, Penetration Testing, Linux Security, Threat Intelligence Analysis, Cloud Security Architecture, Network Security Protocols and Technologies, Secure … DevOps Practices, Cryptography and Key Management, Secure Software Development Lifecycle (SDLC), Identity and Access Management (IAM) Solutions, Data Loss Prevention (DLP) Technologies, Incident Response Plan Development and Execution. We have several fantastic new roles for Cyber Security Software Engineer to join an ambitious Financial Investment company. This is … your chance to work with the sharpest minds in private wealth management and financial software development. Our client's latest product release has changed the way people view private wealth management and allowed them to provide their clients with an individualised, scalable asset management framework that is more »
Leatherhead, England, United Kingdom Hybrid / WFH Options
Zest
to processing personal data with the highest level of diligence, and you’ll play a pivotal role in maintaining and enhancing our robust infosec management system, acquiring and upholding security certifications, fulfilling the role of our Data Protection Officer and ensuring we have appropriate controls to mitigate risk. You … Simultaneously, your comfort with detail will see you managing the day-to-day operations, keeping our platform and business secure. Key responsibilities Information Security Management & Certifications ISMS Oversight: Maintain and enhance Zest’s Information Security Management System. This includes maintaining documentation, conducting and documenting risk assessments, driving improvements … latest cybersecurity threats and trends to inform strategic security planning. Security Infrastructure: Oversee the installation and maintenance of security systems, controls and infrastructure. Incident Management: Take charge of the response to all information security and data protection incidents and collaborate with various business units to understand, document and learn more »
to contain and remediate security incidents. Threat Intelligence Keep up to date with latest trends in cybersecurity threats, vulnerabilities, and best practices. Security Infrastructure Management Assist with the maintenance of existing security tools and technologies, such as SIEM, EDR and firewalls. Contribute to the selection of new security tools. … Documentation and Reporting Create and maintain detailed documentation of security processes and procedures. Generate regular reports on security metrics, incidents, and trends for management review. Collaboration and Communication Work closely with other IT teams to identify and remediate security vulnerabilities. PROFESSIONAL EXPERIENCE/QUALIFICATIONS/SKILLS Hands on experience … with security tools such as SIEM/EDR and vulnerability Management. Proven experience in a security operations role. In-depth knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience working in a large, multinational, complex company. Good knowledge of infrastructure concepts – such as Windows/Linux, DNS, AD more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Bournemouth, Dorset, South West, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by the client to provide recommendations based … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now. more »
City of London, London, Farringdon, United Kingdom Hybrid / WFH Options
Service Care Solutions
update corporate device builds. Manage end user software technology platforms (O/S, Applications, System Tools/Agents, VPN). Operate end user computing management platforms (Defender for Endpoint, Intune, AzureAD, Sophos Central, PMP, Autopilot). Coordinate activities related to changes within the end user computing environments, including patch … and Architecture Teams to ensure effective security controls. Provide feedback to the Architecture and Infrastructure team on platforms and new solutions. Participate in the VulnerabilityManagement Process to remediate identified vulnerabilities. Support IT Operation Teams, including Service Desk, with technical issues in EUC device deployment or management. Liaise … Manager, Active Directory, and Endpoint/Cloud Apps Security. Proven experience in complex project implementation and ownership of technology projects. Familiarity with other Device Management platforms. Experience working within an ITIL environment. Proficient in desktop image configuration, automation, and management. Experience in implementing and maintaining Microsoft Autopilot environment. If more »
into the Head of Information Security, eventually building and leading a new security team. Key Responsibilities: Implement and manage security controls and countermeasures. Perform vulnerabilitymanagement and remediation. Collaborate with software engineering and product teams. Manage Active Directory, Azure, Office 365, and Defender services. Respond to new vulnerabilities … IDS, IPS). Knowledge of Microsoft Security Centre and Sentinel. Understanding of ISO27001:22, NIST, and secure software development. Attributes: Excellent communication and stakeholder management skills. Strong leadership and time management abilities. Collaborative approach and relationship-building skills. Why Join Us? Be part of a dynamic start-up more »
instrumental in defining, identifying, and specifying security countermeasures. You will drive suppliers to deliver the required systems and changes, manage projects, and ensure that vulnerabilitymanagement is advanced to provide top-tier cyber security. Key Responsibilities: Collaborate with the Head of Cyber Security and other security and engineering … communicate the security context, consider solutions (both tactical and strategic), and ensure successful delivery. Maintain a good working knowledge of security best practices and vulnerability management. Essential Qualifications and Experience: At least 5 years technical security experience Strong technical skills including Azure, Microsoft Defender, M365 networking and firewalls. Able … consider solutions (both tactical and strategic) and drive the delivery to completion A good working knowledge of security best practice Good working knowledge of vulnerabilitymanagement . Desirable Skills and Experience: Experience with security testing tools. Knowledge of formal standards such as NIST, NCFC, and CIS. Experience in more »