withtraveltoclientsites Are you a seasoned Infrastructure/Project Engineering Professional looking for an exciting opportunity to work for an award-winning Cyber Security & Risk Management company? Our client is a leader in cyber incident response and security managed services. Rapidly expanding and seeking Mid & Senior level IT Infrastructure Engineers … vectors, and mitigation strategies. Excellent communication skills to convey technical information . Key responsibilities include: Incident Response& Analysis Security Monitoring&Incident Detection Threat Hunting VulnerabilityManagement Security Reporting and Documentation Benefits: Cycle to work scheme Gym membership Private dental insurance Private medical insurance We are IP-People We more »
I'm on the lookout for an Infrastructure Engineer specialist with a strong background in cloud services and modern IT infrastructure management, specifically within the Microsoft ecosystem to join my client based just outside of Cirencester. and easily commutable from Swindon. Their office is in a beautiful location with … desktop infrastructure. Your skill set should encompass the entire Microsoft 365 Suite and MS Azure, along with a good knowledge of email security platforms, vulnerabilitymanagement, and IT networking techniques as they currently work towards their Cyber essentials plus certification. They are in the process of upgrading their more »
on different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerabilitymanagement A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. more »
with resolutions. Keeping company up to date and compliant with industry best practice, policies, and guidelines. Managing penetration tests. End to end threat and vulnerability management. Rolling out, managing, and configuring a range of network security tools and appliances. Key Skills: SIEM Tenable.io/Nessus IDS/IPS, MFA more »
of business goals in order to constructively engage senior business leaders on information security, identifying key threats and areas for improvement, driving appropriate risk management decisions and collaborating with partners to achieve positive outcomes and business benefits Ensure emerging information and cyber security threats to the business are identified … and with internal and external audit functions. Ensure timely delivery of actionable threat intelligence across the organisation, including key stakeholders; Security Operations, Incident Response, VulnerabilityManagement, Security Leadership, Fraud Prevention and Industry intelligence communities. Continuous Improvement through the delivery of; Provide mentoring and development of Threat Intelligence Analysts … and processes such as run books that help the team achieve outstanding results. Championing and supporting Group Security's wider BCM, Incident and Crisis Management functions. Disclaimer: This vacancy is being advertised by either Advanced Resource Managers Limited, Advanced Resource Managers IT Limited or Advanced Resource Managers Engineering Limited more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
real-world experience. Worked on a Managed Security Service previously. Previous experience of working as a Cyber Security Consultant across multiple customers. Microsoft stack, vulnerabilitymanagement tools (Nessus and Rapid 7), EDR platforms, SIEMs. Previous experience of delivering security projects, including implementation and post- implementation support, providing guidance … and support to customers throughout. Experience of overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Responsibilities: Deliver the technical and advisory aspects of our Managed Security Service across the customer base. Join security incident response calls more »
and departments to align infrastructure initiatives with business goals and priorities. Monitor infrastructure performance and capacity, and proactively address any issues or bottlenecks. Manage vulnerabilitymanagement What we’re looking for: Proven experience leading Infrastructure Teams Strong technical skills across a broad range of IT disciplines, including network … administration, system architecture, cybersecurity, and cloud computing. Experience delivering on a migration to Azure cloud Experience with ITIL or other IT service management frameworks is highly desirable. Knowledge of Microsoft Windows server and desktop operating systems PowerShell scripting, process automation using terraform. A good understanding of networking principles as more »
Salford, England, United Kingdom Hybrid / WFH Options
Talent
incidents. What will your day look like? Work closely with stakeholders both internally and externally Implementation of security measures and advise on best practices Vulnerabilitymanagement Oversee the design and deployment of security controls Your background? Confident in IT Security Management with a strong focus on development more »
ISO 27001, 27002, as well as regulations such as the Data Protection Act and GDPR Proficiency in Microsoft O365 Security solutions, networking, security operations, vulnerabilitymanagement, and security auditing Solid grasp of security testing principles, including hands-on experience with vulnerability scanning, risk identification, resolution, and reporting more »
Title: Security Engineer Salary: £80,000 to £100,000 We are seeking a Security Engineer, for a fast-growing FinTech firm, specialising in Wealth Management and Financial Advisory. As the first dedicated cybersecurity professional you'll play a pivotal role in establishing and fortifying the firm's cybersecurity infrastructure. … development processes. Conduct thorough reviews of existing tools and processes, identifying gaps and implementing enhancements to strengthen our security posture. Perform security scanning and vulnerabilitymanagement, taking proactive measures to reduce operational risks. Monitor security alerts and implement mitigations to safeguard against potential threats and attacks. Develop and … Familiarity with distributed event stores such as Apache Kafka. Proficiency with operating systems (e.g., Linux) and command-line interfaces. Experience with network security, incident management, and penetration testing. Familiarity with automated cloud-based CI/CD pipelines and secure software design principles. In addition to your technical prowess, we more »
About this Role Role Title: Threat & Vulnerability Lead Location: UK- London La Fosse Associates are working with a global Insurance business who are looking to add a Threat & Vulnerability Lead to their strong internal security function. You will report directly into the BISO and be a senior individual … within their existing team. You will be joining the UK entity of their Security team to lead on vulnerability scanning and threat intelligence reporting. They are a large organisation with a huge amount of vulnerabilities and need somebody who understands how to approach on this scale. You will be … in the business to ensure security is prioritised Work on and lead penetration tests across the global estate Requirements: Hands on experience working with vulnerabilitymanagement technology- preferably Qualys Direct experience working within a regulated in-house security team Understanding and knowledge of different security frameworks- MITRE ATT more »
Stockport, Greater Manchester, North West, United Kingdom
INFUSED SOLUTIONS LIMITED
to upskill your abilities to ensure you excel in your career. Skills: Hands on experience as a Cyber Security Analyst/Engineer Experience with VulnerabilityManagement (Tenable) Experience in Application Security Exposure to Threat intelligence (Rapid7) Must have Stakeholder engagement experience Strong communication skills Adaptable mentality Understanding of more »
solving, and root-cause analytical (RCA) skills. Good working knowledge of Cisco Meraki and associated technologies. Practical knowledge of Continual Service Improvement (CSI) methodologies. Vulnerabilitymanagement and assessment. Intrusion detection and prevention analysis/frameworks. Solid exposure to cloud based applications security and provisioning. Experience in writing policy more »
Xpertise are working with a client in the Insurance industry who are searching for a talented Threat and Vulnerability Lead to join their team. Job Title: Threat and Vulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in Central London office About the role: You … Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerability scanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present information and results to the business - Pen testing experience Key … responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threat and vulnerabilitymanagement practises - Working closely with, and reporting into the BISO If keen please apply more »
Reading, England, United Kingdom Hybrid / WFH Options
Areti Group
one or more of the following technical areas: Cloud/Hybrid security , Infrastructure and data center security, Network security, Application security, Identity and access management , Vulnerability Management. · Skilled in defining and overseeing the achievement of security-related contractual and business goals. Capable of influencing and negotiating technical outcomes … with external partners, including resolving conflicts arising from changing priorities. · Familiarity with common information security management frameworks like NIST, PCI, GDPR, ISO Series, OWASP, ITIL, ISF Standards of Good Practice (SoGP), and ISACA’s Control Objectives for Information and related Technology (COBIT) frameworks. Areti Group – Carbon positive tech recruitment more »
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Interact Consulting Limited
pipelines and integrating security tooling. Scripting Responsibilities will include Lead efforts to assess the current security posture of Azure infrastructure, encompassing Azure resources, processes, vulnerabilitymanagement tools, and techniques. Collaborate with the wider Infosec team and any third-party consultants engaged by MWI to provide recommendations based on … into CI/CD pipelines. Maintain an active risk registry and devise a plan to address identified issues in order of priority, ensuring proactive management of security risks. Please apply now more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Ada Meher
software and infrastructure security best practices and implementations. You'll also be pivotal in helping gear toward another successful ISO27001 audit and automating security vulnerability management. You'll need demonstrable experience in a similar DevSecOps role; with experience in AWS, Docker/Kubernetes, and Security implementation. Responsibilities Develop DevSecOps … AWS (Accreditations a huge bonus) Demonstrable level of experience with Cyber Security experience (security concepts, practices, and technologies, such as access control, encryption, and vulnerabilitymanagement) Experience with software security and development practices and implementations Python, Bash, or PowerShell Security certification such as CISSP, CEH, OSCP We understand more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Strategy, Policy, and Plans (PLCY), the Cybersecurity and Infrastructure Security Agency (CISA) , DHS Office of the Chief Information Officer (OCIO) , and the Federal Emergency Management Agency (FEMA) . As a DHS Cybersecurity Service employee in the Technical Career Track, you will continually maintain and share your expertise in Physical … and/or implement comprehensive countermeasures to detect threats and maintain the overall cybersecurity posture of these systems Performing technical and nontechnical risk and vulnerability assessments of Information and Operational Technology (IOT) environments, such as ICS/Supervisory Control and Data Acquisition (SCADA)/Distributed Control Systems (DCS), local … physical or embedded systems and facilities (e.g., heating, ventilation, and air conditioning (HVAC), telecommunications, wireless technologies) Assessing effectiveness of security controls through penetration testing, vulnerability scanning, or security architecture review on enterprise network or control systems assets to improve understanding of organizational or national cybersecurity risks Engaging with other more »
Birmingham, West Midlands (County), United Kingdom Hybrid / WFH Options
Avanti Recruitment
considered Kubernetes – proven production experience, autoscaling, overprovisioning etc. Serverless - Lambda Scripting for automation Good knowledge of Cloud Security – Security hub, guard rails, RBAC, IAM, vulnerabilitymanagement, Patch Management. A Security first mentality to ensure Security is built into all elements of their platforms. Linux Server Administration – Command Line more »