and compliance Detecting any issues or security breaches across global infrastructure Monitoring of devices and infrastructure, including reporting Investigating potential threats and issues Risk management and analysis Utilising tooling such as packet inspection and security forensics to resolve and report issues Security & Best Practice Working with various other Security … Mitigating Information and Cyber based risks Identifying potential threats and risks Assisting with resolution of incidents Incident response and threat hunting Working with threat management frameworks Threat intelligence and continuous improvement Security monitoring and traffic analysis Vulnerabilitymanagement You will advise on Security best practices, and act more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerabilitymanagement and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and more »
in highly complex corporate IT infrastructure environments. Working knowledge is expected in multiple security disciplines including: MEDR Managed SIEM SOC Services SASE Incident Response VulnerabilityManagement Security Strategy and Architecture consulting Security Awareness and Training Data Protection Able to successfully interact with audiences that may include senior executives more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Swindon, England, United Kingdom Hybrid / WFH Options
WHSmith
awareness to mitigate cyber risks and safeguard critical information. What you will be doing Overseeing day-to-day security operations, including monitoring, incident response, vulnerabilitymanagement, and threat intelligence, to maintain a strong security posture and promptly address any security incidents or vulnerabilities Establishing and maintaining cyber security … policies, standards, and procedures, ensuring compliance with industry regulations and best practices, and creating a framework for security governance Working closely with senior management, IT teams, legal and compliance departments, and other stakeholders to align cyber security initiatives with business objectives Providing strategic guidance to senior management, ensuring … in Information Security across IT and business within areas such as PCI-DSS, GDPR, ISO/IEC 27000+, etc. Experience in an Information Security management function and/or related functions (such as IT audit and IT Risk Management) Experience of IT Architecture including the development (and ensuring more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
Birmingham, England, United Kingdom Hybrid / WFH Options
CRG Recruitment Ltd
Cyber Security Assurance Engineer to come on board to my client to act as Cyber Security Assurance support for my clients Technology Team, providing management of risk in a pragmatic and cost-effective manner to ensure stakeholder confidence. Please note with role is Hybrid, and will require 3 days … per week in the office Knowledge and experience required, Expert knowledge of security data tools, information security controls, security best practice and management strategies. Experience of designing control maturity tests and conducting control maturity assessments. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability … of security monitoring, alerting, and reporting. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools (Nessus and Rapid 7), EDR platforms, SIEMs (Splunk/Azure Sentinel), Powershell automation etc. Previous exposure to enterprise networking and infrastructure more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
organisation, with a focus on the End-User technologies. This includes, but not limited to; Active Directory, Group Policy, User profiles, VMware Mobile Device Management, SCCM, WDS, Remote Desktop Services, FortiClient EMS, and Jira Service Desk Deliver project work to upgrade and improve upon existing infrastructure Respond to tickets … and manage allocations of project tasks Ensure systems are kept safe and secure by embedding vulnerabilitymanagement best practises Proactively monitor systems, embed policy compliance across the end-user estate, highlight trends and proposing preventative measures Be available outside of business hours on an ad-hoc basis to … OS images using SCCM or Windows Deployment Services (WDS). Windows Server OS implementation experience across multiple platform roles, including Active Directory, Group Policy management, Remote Desktop Services. WSUS update patch management. Strong scripting ability in the likes of PowerShell or similar languages Strong experience with Mobile Device Managementmore »
SW9, Oval, Greater London, United Kingdom Hybrid / WFH Options
Integral Recruitment Ltd
and small projects Backup maintenance Configuration of standard mail and messaging clients including Outlook Installation, configuration, troubleshooting and customisation of Office 365 Installation and management of Microsoft SharePoint and SharePoint permission management Understanding of and ability to install, configure and test workstation hardware including video cards, NICs, sound … configuring network devices and implementing network security measures. Knowledge and understanding of security principles, best practices and compliance requirements, including security protocols, access controls, vulnerabilitymanagement and implementing security measures to protect systems and data. Experience with anti-virus products (Sophos/Heimdal etc.). Experience with Cisco more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ?Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ?Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »
automation, IaC and security by design. There's a broad range of responsibilities including handling requests related to system administration, operations governance, threat/vulnerabilitymanagement and incident response, you'll collaborate with engineering teams to evaluate and identify optimal cloud solutions providing subject matter expertise across a … of DevOps and IaC concepts You have a good understanding of cloud based security (e.g. ISO27001, NIST, CIS, OWASP, SOC2) and Identity and Access Management (IAM) within Azure You're familiar with ARM templates and/or Pulumi You have automation and scripting (PowerShell or similar) skills You're more »
technical background in systems, cloud, and networking Expertise simulating adversary tactics and secure offensive operations Proficiency implementing security operations tools like SIEM, EDR, NDR, vulnerabilitymanagement Coding abilities to develop scripts and custom security applications Passion for investigating the latest threats and resolving issues through ownership Apply here more »
Linux Engineer -United Kingdom – Fully Remote Job Title: Linux Server Vulnerability Engineer Office Location: England Flexibility: Fully Remote Salary: £55,000 + 6% Bonus Company profile My client is an enterprise-level insurance company that operates globally. They are currently experiencing a period of significant growth and this opens … such as TCP/IP protocols, DHCP and DNS technologies, and LAN/WAN topologies and transports Main responsibilities will work closely with application management, application development, and other IT teams to support vulnerability reduction of Linux Server infrastructure (both physical and virtual). direct technical support for … all requirements in the planning, coordination, scripting, and implementation of patch/vulnerabilitymanagement or changes to my clients Linux distributed computing. If this role is of interest, please contact me at anthony.dale@adalta-solutions.com more »
as this role will require some hands-on collaboration with the Engineering teams. Some of the key responsibilities will include: Design and implement a vulnerabilitymanagement program integrating the existing sources of vulnerability data Work closely with the Engineering teams to integrate security and compliance best practices … Introduce tools for automating security processes, for example secrets management Lead the security champions programme Lead the innovation of security and compliance best practices across the Engineering division Collaborate across various departments including Engineering, Product and Design Co-design relevant solutions which maximise delivery and quality Some of the more »
Cyber Security Analyst to join their Cyber Security team in London, with the team working across infrastructure, business and application risk, penetration testing, and vulnerability management. The cyber security practice is a mature function and this team member will specifically work within the incident response team, and will be … certifications in this area is desirable. Previous experience in Security Monitoring, having moved into incident management. Strong SIEM experience. Ideally this person would have Vulnerabilitymanagement experience. System Admin background desired but not essential, this includes experience across Unix, Windows, Cisco, Networking, etc. Threat Modelling exposure flexible This more »
Salford, England, United Kingdom Hybrid / WFH Options
Talent
incidents. What will your day look like? Work closely with stakeholders both internally and externally Implementation of security measures and advise on best practices Vulnerabilitymanagement Oversee the design and deployment of security controls Your background? Confident in IT Security Management with a strong focus on development more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by MWI to provide recommendations based on … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Avanti Recruitment
considered Kubernetes – proven production experience, autoscaling, overprovisioning etc. Serverless - Lambda Scripting for automation Good knowledge of Cloud Security – Security hub, guard rails, RBAC, IAM, vulnerabilitymanagement, Patch Management. A Security first mentality to ensure Security is built into all elements of their platforms. Linux Server Administration – Command Line more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
the thousands of servers supporting our cloud services. Other responsibilities include: Designing and evaluating complex systems for security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses … IT security in one or more of the following areas: software/product security assessments, penetration testing, red teaming, web application assessments Interest in vulnerability research and exploit development Demonstrable experience in designing and evaluating complex systems for security Aptitude for self-study, setting and achieving long term goals … for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances are not required, and more »
Leeds, England, United Kingdom Hybrid / WFH Options
Ada Meher
aligned deployment pipelines, as well as further securing their platform. You'll be working hevilty with the AWS ecosystem and help in automating security vulnerability management. You can expect a salary of up to £90,000, 25 days holiday plus bank holidays, Shares, flexible working hours, remote working and more »
London, England, United Kingdom Hybrid / WFH Options
ITRS
are available and fit for purpose to meet our needs as we scale our business. As a Salesforce Support Manager, you will: Provide line management for the Salesforce support staff. Drive the strategy, scalability, innovation, and best practices for Salesforce and solutions with service improvement reviews and drive improving … and tuning services delivered. Identity and Access Management (IAM) for Salesforce and integrated solutions Working with other internal IT departments, you will need to work with key business departments to manage enhancements, solution problems, changes, and releases. Manage the Salesforce support teams, ensuring that all team members are motivated … and their skills are developed to allow them to support our Salesforce and integrated solutions. Manage the commercial and technical management of external 3rd party suppliers, including Salesforce and integrated solutions to ensure excellent service delivery and value for money. Manage the outsourced function relationship. Ensure the compliance of more »
to contain and remediate security incidents. Threat Intelligence Keep up to date with latest trends in cybersecurity threats, vulnerabilities, and best practices. Security Infrastructure Management Assist with the maintenance of existing security tools and technologies, such as SIEM, EDR and firewalls. Contribute to the selection of new security tools. … Documentation and Reporting Create and maintain detailed documentation of security processes and procedures. Generate regular reports on security metrics, incidents, and trends for management review. Collaboration and Communication Work closely with other IT teams to identify and remediate security vulnerabilities. PROFESSIONAL EXPERIENCE/QUALIFICATIONS/SKILLS Hands on experience … with security tools such as SIEM/EDR and vulnerability Management. Proven experience in a security operations role. In-depth knowledge of cybersecurity principles, threat landscapes, and attack vectors. Experience working in a large, multinational, complex company. Good knowledge of infrastructure concepts – such as Windows/Linux, DNS, AD more »