to drive skill and career development spending on average 10% of time on learning, discovery, and innovation Participate in rotating support schedule for Incident Management and general customer service requests Experience developing in ServiceNow modules: Configuration Management Database, Software Asset Configuration Management, Service Mapping, and Integration Hub … on the Dreyfus engineering scale Preferred Qualifications Bonus Points If You Have: Experience implementing two or more of the following ServiceNow capabilities: Hardware Asset Management, Software Asset Management, VulnerabilityManagement, Configuration Compliance, Threat Intelligence, Service Catalog, Workflow, Integration Hub, Configuration Management, or Service Mapping, Demonstrable more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
Job Title: Cyber Security Vulnerability and Threat Engineer Location: Cheshire (Hybrid - 2 days per week on-site) Benefits: (Full list of benefits available on application) psd group are delighted to bring this newly created job opportunity to market, partnered with a truly industry-leading organisation as they embark on … a journey to improve their current Cloud Infrastructure/Cyber Security. We are looking for an experienced Cyber Security Threat and Vulnerability Engineer, to take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerabilitymanagement reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber incident response activities. The ideal candidate will have come from a Cloud Infrastructure background, have moved into Cyber Security, and will hold a current/ more »
VulnerabilityManagement Internal : Operations (metrics, ID & triage/resolution initiation, patching, hardening, verification scans, maintenance, changes) VulnerabilityManagement External : Operations (metrics. ID & triage/resolution initiation. Track internet endpoints/DNS be this TSB or 3rd party hosted) One FTE as a hands-on engineer LA more »
Design, CSA, ISO 27001/2, ISO 27017, ISO 27018, or NIST Cyber Security Framework Knowledge and Practical Experience, SIEM (Splunk, MS Sentinel), Log Management, VulnerabilityManagement, Incident Response, Security Monitoring, Penetration Testing, Linux Security, Threat Intelligence Analysis, Cloud Security Architecture, Network Security Protocols and Technologies, Secure … DevOps Practices, Cryptography and Key Management, Secure Software Development Lifecycle (SDLC), Identity and Access Management (IAM) Solutions, Data Loss Prevention (DLP) Technologies, Incident Response Plan Development and Execution. We have several fantastic new roles for Cyber Security Software Engineer to join an ambitious Financial Investment company. This is … your chance to work with the sharpest minds in private wealth management and financial software development. Our client's latest product release has changed the way people view private wealth management and allowed them to provide their clients with an individualised, scalable asset management framework that is more »
operations and forensics. Conduct advanced threat hunting to proactively identify hidden threats within the organisation's network, utilising advanced tools and techniques. Participate in vulnerabilitymanagement activities, collaborating with the vulnerabilitymanagement team to prioritise and remediate critical vulnerabilities identified through intelligence gathering and risk assessments. more »
be leading 5 to 10 VAT members, perform research on current threats and vulnerabilities, will be responsible for authoring security advisories and manage enterprise vulnerability compliance and will conduct vulnerability assessments of IT systems. The VAT Lead will be assisting the government with the Enterprise Information System VulnerabilityManagement (ISVM) compliance validation, execute Vulnerability Scans and will conduct vulnerability assessments of IT systems. Perform research on current vulnerabilities, support Incident Response and SOC functions as related to vulnerabilities. Will be responsible for authoring security advisories. Basic Qualifications: BS degree Science, Technology, Engineering, Math or … experience may be considered in lieu of a degree. Relevant experience is within one of the following areas pentesting, security technical assessments or supporting vulnerability scanning/management program. Experience managing teams Experience with vulnerability analysis Ability to identify false positives within scan results and work with more »
Analyst will oversee risk assessment and communication related to infrastructure vulnerabilities. They will collaborate with teams to identify vulnerabilities, prioritise risks, and improve the vulnerabilitymanagement process. The right candidate for the Cyber Security Analyst position will have the following: Enjoy working in a fast-paced, customer-centric … colleagues, and a genuine interest in Cyber Security are key Have experience in similar roles, Cyber Security qualifications, and a track record of enhancing VulnerabilityManagement processes through communication and relationship-building The required skills for the Cyber Security Analyst include but are not limited to: A comprehensive … grasp of security vulnerabilities, their categorization, remediation methods, and associated risks is imperative Proficiency in prioritising vulnerability remediation based on threat intelligence and business context is crucial Strong skills in generating meaningful reports and communicating effectively with relevant stakeholders are a must Familiarity with security tools Proficiency in using more »
to ensure staff are aware of their responsibilities and can act in a manner that minimizes risk to the organization. Regularly report to senior management about the status of the organization's security posture, regulatory compliance status, audit findings, and any other security-related issues and plans. Regularly review … in the decision-making process to obtain needed information, make the most appropriate decisions, and ensure buy-in and understanding of resulting decisions. Task Management Skills: The candidate is expected to proactively determine project or assignment requirements by breaking them down into tasks and identifying types of equipment, and … Publication (SP) 800-53, Revision 4 or Revision 5 Demonstrated success in achieving project completion in a timely manner. This includes having effective project management skills and correctly assessing the time required to carry out given tasks. Experience using Cyber Security relevant tools, systems, and applications to include but more »
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Planet Recruitment
installation and configuration of hardware, applications, and software as part of Privacy by Design and Default. Manage and coordinate operational components of security incident management, including detection response and reporting. Manage the day-to-day activities of threat and vulnerabilitymanagement, identify risk tolerances, recommend treatment plans … and audit requirements. Review, escalate and action any unusual event behaviour identified through the groups information security systems. Create standards in system hardening, change management, documentation. Perform periodic firewall Ensure disaster recovery and data restoration processes work. Ensure appropriate Corrective and Preventative Actions are implemented in line with best … in broad domains of IT infrastructure such as data networks, server and desktop hardware and operating systems, storage and backups, and related monitoring and management systems. Demonstrable experience of applying security controls in one or more of the following areas: Unix/Linux Servers, Windows servers, firewalls, IDS/ more »
ensuring that effective governance and technical assurance can be performed. Maintain and improve the use of artefact templates. Ensure that there is effective capacity management and planning in place for the security services and solutions assigned to you and ensure that the solution is incorporated into the 18-month … technical and budget roadmap for capacity expansion and service improvement. Support the Programme and Project Manager in project planning, risk and issue management and the budgeting process. Candidates should demonstrate: Must have at least 3 years of experience working in Cyber Security within a technical field. Must have a … or difficult it will be to exploit these vulnerabilities. Must be well versed in the application of security policies and standards, governance, compliance, risk management and technical assurance practices. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the more »
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Project People
reliable network which matches the best, whilst ensuring compliance to regulatory requirements, company policy and standards. Should have experience of using common information security management frameworks, such as NIST, PCI, GDPR, ISO Series, OWASP the IT Infrastructure Library (ITIL), the ISF Standards of Good Practice (SoGP) and ISACA's … Control Objectives for Information and related Technology (COBIT) frameworks. The role will involve supporting project managers in risk and issue management Creation, review, and approval of documentation such as requirements, architecture, design, and test artifacts. Experience in documenting and implementing processes, procedures, and architecture/design/decision templates … or difficult it will be to exploit these vulnerabilities. Must be well versed in the application of security policies and standards, governance, compliance, risk management and technical assurance practices Must have expertise and experience in one or more of the following technical domains: Cloud/Hybrid security Infrastructure and more »
and services to ensure that CLS is equipped with appropriate industry best tools and solutions Operational Operate and maintain controls related to SIEM, DLP, VulnerabilityManagement, DLP, Cyber Threat Intelligence, Endpoint Protection, etc with an emphasis on cloud deployments and implementations. Conduct IT Security risk assessments for all … help design, implement and maintain security Prepare for, identify (hunt) and remediate cyber threats Operate and maintain IT Security controls related to SIEM, DLP, VulnerabilityManagement, Cyber Threat Intelligence, DLP, Endpoint Protection, etc. Participate in an on-call rotation to act as an escalation point for events requiring … collaborate effectively with others to drive forward key security objectives Strong documentation and report writing skills (to both technical and business audiences) Excellent time management and organizational skills combined with technical IT Security acumen Expert knowledge of Firewalls, TCP/IP, IPS, DLP, proxies, SIEM, & Endpoint Protection software Financial more »
career development opportunities. About the Role As a Cyber Security Engineer your primary responsibility will be Security Operations and Incident Response as well as VulnerabilityManagement and Threat Intelligence. In addition, you will work closely with the Cyber Security Manager and Security Architect to independently resolve complex issues. … security operations centre (SOC) and responding to security alerts. Experience in creating response playbooks and handling escalations. Additional experience in EDR, M365 security, SIEM, Vulnerabilitymanagement, MITRE attack framework, and Incident response. Strong stakeholder engagement skills and the ability to promote a secure mindset within an organisation. Previous more »
InfraView - Specialist Cloud & IT Infrastructure Technology Recruitment
leading and developing a team of Cyber Security experts. Building, maturing and providing Security services to multiple customers in multiple sectors. This is a management position but this person must also be able to lead from the front from a technical perspective. We need a “people manager” as well … business is excited about the value this person can add. You will provide insights and guidance to customers as a vCISO as well as vulnerabilitymanagement, major incident response, and security monitoring improvements and be expected to demonstrate technical expertise in Audit, Assessments, Design, Implementation, Testing, Compliance and … SC-200, AZ-500, MS-500). Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft stack, vulnerabilitymanagement tools, SIEMs including Sentinel. Previous experience of delivering security projects Experience of overseeing and leading remediation of security assessments including Cyber Essentials more »
and security assurance testing, as well as configuring and fine tuning cyber security tools and solutions including preventative and detective measures for example firewalls, vulnerabilitymanagement tools, and EDR. Skills You will have worked as a Cyber Security Engineer or in a similar position. You will have experience … in a broad variety of technology including AWS, Microsoft 365, internet protections, vulnerabilitymanagement, SIEM, EDR. Experience securing on premises infrastructure and cloud services. Experience working with Systems Engineering teams, DevSecOps, CI/CD Senior Security Engineer - Onsite - £100K more »
configuring SIEM Required qualifications to be successful in this role Track record of moving from project into service delivery Elastic SIEM experience Vmware experience VulnerabilityManagement Tooling #LI-SB2 Together, as owners, lets turn meaningful insights into action. Life at CGI is rooted in ownership, teamwork, respect and … and broaden your horizons. Come join our teamone of the largest IT and business consulting services firms in the world. Skills Security Operations Centre VulnerabilityManagement(IAVM) Reference (phone number removed more »
assurance capabilities across various platforms and technologies. • Ensure that the IT estate complies with technical standards and the company policies to safeguard company assets. Management oversees directing the required remediation actions and countermeasures to lessen vulnerabilities and weaknesses that have been identified. • Create and enhance a regular penetration testing … programme for the red and purple teams that are in line with industry cyber threats and primary threat intelligence. • Create a VulnerabilityManagement procedure to guarantee that all security flaws and vulnerabilities that are known to exist are located, evaluated in context, given priority, and tracked for remediation … task requiring cross-partner cooperation at varying degrees of technical security proficiency. • In-depth knowledge and comprehension of operational excellence in programmes related to vulnerabilitymanagement and cloud security posture management. • A working knowledge of compliance and regulatory frameworks, including GDPR, ISA/IEC 62443, ISO/IEC more »
Bradford, West Yorkshire, Yorkshire, United Kingdom
Yorkshire Water
a key part of how we plan to meet the changing expectations of customers and regulators. Where you fit in: As our IT Asset Management Manager you will Develop and mature the IT Asset Management strategy Design and maintain Asset Management policies, procedures and process Ensure our … systems of record and management are maintained and up to to date Provide standard and ad hoc reporting of software and hardware inventory, equipment inventory and other ad hoc reporting of hardware and software estates Monitor and manage software licenses to ensure they comply with license agreements and useage … software harvesting programme, recovering and redeploying unused licences. What skills & qualifications you will need: Considerable experience working in a leadership role in IT Asset Management Demonstratable background knowledge within licence management and software audit management Good understanding of mega vendors including SAP, Oracle, IBM and Microsoft licencing more »
ATT&CK and CIS. * Legal and Regulatory Understanding: Familiarity with laws and regulations related to cybersecurity, such as GDPR, CCPA, or HIPAA. Skills * Personnel Management * In house training of personnel. * Stakeholder engagement * Risk Management * Threat Hunting * Threat Analysis * Use of vulnerabilitymanagement tools * Malware reverse engineering … Detection rule engineering * Incident Management * Alert Triage * Crisis management Experience * Extensive working experience in a live SOC environment * Line management experience. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to more »
Birmingham, West Midlands, West Midlands (County), United Kingdom
Proftech Talent
Manager We are recruiting for a Lead IT Security Manager on a permanent basis. The Lead IT Security Manager is responsible for the effective management of the Security Operations pillar within the IT Security, Compliance & Identity function. This includes Security technology and Security Operations Centre management. This role is … . Ability to provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Ability to identify and classify security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability … Lead the Security Operations pillar, determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerabilitymanagement (among other activity) . Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks more »
Dublin, City of Dublin, Republic of Ireland Hybrid / WFH Options
The Recruitment Company
network issue resolution Contribute to budget development Monitor spending Your Experience: Windows Server (Apply online only), Windows 10/11, Hyper-V, Active Directory Management, Group Policy Management, SCCM, SQL 2016+, Microsoft 365 and Azure platform administration and security, SharePoint, Endpoint Protection Technologies, Network Access Control (NAC) solutions … Backup methodology and management, Check Point firewall Excellent knowledge of and proven experience in best practice Information Security, e.g. Incident Response, Intrusion mgmt., Attack Monitoring, Network mgmt., Threat and VulnerabilityManagement, e.g. SIEM, XDR, Firewall, IPS, NAC, Server config controls Excellent knowledge of and proven experience in … netting, Firewalls, routing protocols, encryption standards Proficient in automation tools including PowerShell, Power Automate, Office apps Excellent knowledge of and proven experience in Data Management - including database technologies and methodologies around implementing data privacy and data encryption Proven experience in liaising with an array of external vendors Strong English more »
computer infrastructure, information systems and to ensure the organization maintains an acceptable risk posture. The Senior Information Security Analyst is highly engaged in risk management and mitigation, including evaluating vendor risk, examining vendor contracts for terms of service, understanding third-party risk, and data privacy issues. The analyst serves … detect, mitigate, and analyze threats. Works closely with other teams to develop controls such as firewalls, business systems, data leakage protection systems, patching, encryption, vulnerability scanning, application code scanning, remediation as well as defining configuration for a variety of security tools. Prior experience in an international enterprise environment is … delivery is on-time, within budget, and adopted to meet the company's information protection requirements. Performs or coordinates internal security assessments, penetration tests, vulnerability scans, and assess organization cybersecurity maturity Complying with frameworks and regulations such as COBIT, NIST (800-53, cybersecurity), ISO, ITIL, PCI, GLBA, GDPR, HIPAA more »
Aberdeen, Scotland, United Kingdom Hybrid / WFH Options
prosource.it
leads to the creation of high quality, secure by design, project deliveries. Examples of projects: Secure Internet Access Privileged Remote Access VPN consolidation Information Management (Records Management & Data Governance) Infrastructure Road Mapping Security Email Gateway Identifying security related risk from projects and leading risk assessment processes Identify divergences … deliveries Technical Experience: Security Risk Assessment Network Architecture Principles Web & email security technologies Reviewing and assessing security policy configuration within cloud environments (preferably Azure) VulnerabilityManagement and Security logging and monitoring tools Cloud Virtualisation and Containerisation security assessments and review Edge Security Technology, IAM, PAM Data Security and … governance Network Monitoring Tools and SIEM Technology Risk Management Tools Ability to act proactively, escalating issues as required Strong documentation and communication skills (verbal and written) Excellent problem-solving skills Strong knowledge and experience of IT change management processes and principles Willingness to stay up to date on more »
Vulnerability Analyst £55,000 Leeds Are you passionate about cybersecurity and ready to make an impact? Join my clients team in Leeds as a Vulnerability Analyst and play a crucial role in fortifying their defences against evolving threats. You will bride the communication gap between technical teams and … senior leadership, ensuring that security protocols remain effective and aligned with business objectives. To succeed in this role, you'll need strong experience in vulnerability analysis or a related role. You must be able to show proficiency in vulnerability scanning tools and technologies, as well as a solid … excellent communication skills to convey technical information to non-technical audiences. Offensive security certifications are a definite plus. This is your chance to expand vulnerabilitymanagement across new horizons within their business, ensuring that security is not just integrated but ingrained in every facet. Don't miss out more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
best practice, quality assurance and governance, as appropriate for each project. The SecOps Engineer will take a proactive approach to security matters and risk management, leading investigations, root cause analysis and vulnerabilities under the guidance of the cloud architecture team. There may be an opportunity to develop a management … Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. VulnerabilityManagement: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage … automated scanning tools to ensure continuous security monitoring. Secure Configuration Management: Establish and enforce secure configuration standards for EC2 instances, Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Automate configuration management processes using infrastructure-as-code tools (Terraform). Security Compliance: Ensure AWS infrastructure and applications comply more »