Greater London, England, United Kingdom Hybrid / WFH Options
itecopeople
re looking for a dynamic Cloud Infrastructure Analyst to become an integral part of this client Cloud Infrastructure Support team, offering technical support and management across our client's cloud and infrastructure systems. This role is perfect for someone passionate about ensuring security, availability, and reliability in the Azure … a Cloud Infrastructure Analyst, you will: Maintain and secure cloud and infrastructure services, ensuring top-notch security, availability, and reliability. Handle incident and problem management, maintaining the smooth BAU operation of our infrastructure services daily. Manage changes to cloud and network infrastructure, keeping systems up to date and running … efficiently. Ensure delivery and implementation of technical solutions and support IT disaster recovery and business continuity processes. Play a key role in change management within the Cloud and Infrastructure environment. What they Offer: Location: Hybrid role with 1 – 2 days a week in our London office. Salary more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Alexander Mann Solutions - Public Sector Resourcing
Location: Hybrid - London 60% office attendance As a Lead Monitoring & Incident Response Analyst, your main responsibilities will be: Conducting both on-demand and continuous vulnerability monitoring activities, tracking vulnerability remediation in conjunction with technical counterparts. Working both independently and in conjunction with contracted SOC services to carry out … an essential requirement for this role, as a minimum you must be eligible and willing to undergo these checks. Experience in-line with the VulnerabilityManagement role (with additions) of the Government Security Profession Career Framework - Information Risk Assessment and Risk Management. Threat Intelligence and Threat Assessment. Experience more »
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long transformation of … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerabilitymanagement tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
all issues are identified, tracked, and resolved in a timely manner; provide support for server/router/firewall configuration and will perform security management and application performance optimization functions. The environment includes Microsoft-based servers, databases, and workstations as well as VMware and Linux server instances. Additional responsibilities … include: Maintaining a complex server-based enclave, including performing system scans, vulnerabilitymanagement activities, and active directory configuration. Identifying and correcting hardware and software issues. Utilizing enterprise monitoring solutions to identify alarms that have been triggered against the test infrastructure environment. Proactively contacting customers when test infrastructure processes … technical assistance to companion work groups in support of overlapping projects and maintaining good inter-departmental relations. Executing the process for managing information assurance vulnerability alerts (IAVAs) and system security scanning for equipment suites in accordance with the System Security Plans for these systems to identify and remediate IAVAs more »
s degree in a related technical area. One or more relevant certifications such as CISSP, CISM, GCIH, CEH, or OSCP. Proficiency in SIEM Platforms, vulnerabilitymanagement tools, and incident management processes. Experience in managing security functions or SOC capabilities. Strong analytical skills to analyze security monitoring data more »
investigate security incidents to determine their root causes - Contribute to the automation and enhancement of security processes and technologies - Implement and maintain robust configuration management practices for IT environment stability - Conduct supplier assurance activities to ensure vendor security compliance - Establish and enforce governance processes for IT security compliance Essential … Requirements: 5 years of relevant experience in information security management activities Strong experience with Microsoft Security Suite products, including Azure, Sentinel, and Defender Proficiency in Microsoft 365 and Azure services such as Entra ID, Conditional Access, Enterprise Apps, App Registrations, Identity Protection, Privileged Identity Management, Identity Governance, Azure … Infrastructure, Entra Connect, Intune etc Experience with firewalls, SIEM, EDR, IDS/IPS concepts, email security, vulnerabilitymanagement Understanding of common industry standards and frameworks ie NIST, ISO 27001 etc Microsoft Security Operations Analyst certification is essential Reperio Human Capital acts as an Employment Agency and an Employment more »
security within a fast-paced environment and may be involved in SOX control responsibilities. Day to Day of the role: Assist with security incident management and response activities. Manage and respond to security alerts from systems and end-users. Perform security checks, reconciliation, compliance checks, and investigate exceptions. Complete … information security standards such as Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. Proficiency in Microsoft O365 Security solutions, Networking, Security operations, VulnerabilityManagement, and Security Auditing. Experience in security testing, vulnerability scanning, and risk management. Ability to create formal documents such as reports or more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Security+, AWS Security or MA Azure Security and ideally CISSP. You will be responsible for: Security Monitoring and Incident Response Threat Intelligence Security Infrastructure Management Documentation and Reporting Candidates who can show hands on experience with security tools across SIEM/EDR and vulnerabilityManagement will be more »
Llantwit Major, Vale of Glamorgan, South Glamorgan, United Kingdom Hybrid / WFH Options
Artis Recruitment
technologies that will effectively and efficiently meet our clients security requirements. Manage annual PEN test and subsequent remediations. Manage improvements highlighted in 3rd party vulnerability scans. Monitor the systems and respond to any potential cyber issues, acting as a point of escalation for the ICT team. Monitor of network … operational needs of the business. Required Background: Proven track record and experience in a similar cyber security role. Experience of working with cyber defence vulnerabilitymanagement/threat detection platforms. Experience/understanding of how technology can be leveraged to support data management practices. Broad understanding of … including Microsoft Azure cloud services, hybrid cloud environments, LAN/WAN networking and BCP/DR. Solid understanding of security, risk, compliance, and data management frameworks such as ISO27001, Cyber Essentials, NIST, TOGAF, COBIT, MITRE ATT&CK. Understanding of secure by design principles. Ability to travel between sites and more »
frameworks and standards such as NIST, ISO 27001, and CIS Controls. With security tools and technologies, including SIEM, IDS/IPS, endpoint protection, and vulnerability management. Analytical and problem-solving skills, with the ability to assess complex security issues and recommend effective solutions. Communication skills and ability to collaborate more »
be responsible for researching, supporting and configuring to analyse security risks and ensure security policies are in place and being followed. The Role: Handling vulnerabilitymanagement tools, creating reports for fixing issues, and prioritising actions. Investigating incidents and trends, as well as identifying threats using SIEM tools like … Splunk and Microsoft Sentinel. Using IT Service Management tools to classify cyber incidents and analyse trends for management reports. The Candidate: Working knowledge of various security technologies such as network and application firewalls, host intrusion prevention and anti-virus Experience of public cloud infrastructure and cloud delivery models more »
to ensure the implementation of security processes aligns KPMG’s security frameworks, policies, standards, whilst collaborating with other security teams in areas such as vulnerabilitymanagement, and incident management. In this delivery-focused Security Engineer role, you will have the exciting opportunity to manage multiple workstreams simultaneously. Your … doing? Develop, document, and maintain Platform security processes and plans per KPMG’s trust and verify framework. Support in the development/design and management of Product/Platform security processes and automated tooling that prevent security issues. Lead on threat modelling exercises for our products. Perform security-focused … code reviews. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and risks raised by the SOC. What will you need to do it? Excellent understanding of security controls within Azure environments Previous more »
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerabilitymanagement processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
infrastructure. * Familiarity with enterprise information security standards: Cyber Essentials, ISO 27001, 27002, Data Protection Act, GDPR. * Proficiency in Microsoft O365 Security, Networking, Security operations, VulnerabilityManagement, and Security Auditing. * Strong understanding of security testing principles, including hands-on experience in vulnerability scanning, risk identification, resolution, and reporting. more »
provide advice and guidance on IT security and further develop IT policies and processes across a multi-region infrastructure. Responsibilities: ▪Assist with security incident management and response activities ▪ Perform daily, weekly, and monthly security checks, reconciliation and compliance checks and investigate exceptions ▪ Completing client security requirement questionnaires and support … of Azure security related technologies ▪An excellent understanding of security technologies: SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, log management, content filtering, etc. ▪Hands-on experience of security and/or infrastructure ▪Cyber Essentials, ISO 27001, 27002 ▪Networking; Security operations; VulnerabilityManagementmore »
skills across the implementation, maintenance, and configuration of security tools and platforms; creating policy changes, completing constant monitoring, identifying/resolving issues. and performing vulnerability testing. The role is very diverse covering all aspects of Cyber Security and would offer an excellent opportunity to further your skills and expand … of different security products and offer the chance to gain additional certifications and experience. You will gain further exposure to End to end threat & vulnerabilitymanagement Operational support of security technologies, products, and services Vulnerability scans and identifying vulnerabilities in systems Monitoring for unusual activities, implement defensive … of contemporary standards, practices, procedures, and methods. Wireless security, network monitoring, network design, windows desktop/server security, database security, routing protocols and incident management Aptitude to use online research tools and internal documentation to find resolutions to problems Be able to conduct cyber essential assessments. Any experience with more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »
be mitigated efficiently. Experience needed: A Cyber Security Analyst with 4+ years' experience in a Cyber Security role A Cyber Security Analyst with strong vulnerabilitymanagement skills A Cyber Security Analyst with proven experience working in an Azure environment A Cyber Security Analyst with an understanding of firewalls more »
On-Site About Our Client: Our client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as VulnerabilityManagement, Information Security, PCI-DSS, Penetration Testing, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are more »
duties as assigned. • Ability to work on a shift basis including weekends and evenings. Skills Theoretical knowledge of security toolsets such as SIEM, IDS, VulnerabilityManagement, Availability Monitoring and other threat detection technologies. · Pre-existing knowledge of common network protocols. · Pre-existing knowledge of Windows and Linux based more »
to resolve problems identified and ensure systems are operated, maintained, and disposed of in accordance with established policies and procedures. Develop process for the management, review, and retention of security audit data. Report audit discrepancies to the ISSM. Perform security audits IAW established procedures. Establish system specific recovery processes … to ensure security features and procedures are properly protected and restored. Conduct vulnerabilitymanagement (scanning, assessment, reporting, and mitigation verification), security reviews and tests of systems to verify security features and controls are functional and effective. Take corrective action to resolve identified vulnerabilities. Perform periodic maintenance on systems … training or experience with Windows-based Information Systems with a working knowledge of LINUX operating systems. Current Certified Information System Security Professional (CISSP) certification Vulnerability assessment and analysis experience utilizing SCAP, ACAS/NESSUS and DISA STIGs Experience with DoD implementation of the Risk Management Framework (RMF) and more »
tech teams to ensure Security best practice is followed and compliance is met Push Security framework maturity Deliver projects to improve Security compliance Conduct vulnerability scans/reviews and schedule pen tests Provide an understanding of Security tools (SIEM, EDR, IAM, Network devices etc) Handle and investigate incidents Conduct … internal & external Security assurance reviews What skills do you need as an Information Security Manager? People management ISO27001 NIST Cloud Security principles, controls and tools experience Vulnerabilitymanagement expertise Experience with Security tooling Managing, implementing and reporting on Security frameworks Security related degree or relevant certifications Experience more »
Kingston Upon Thames, England, United Kingdom Hybrid / WFH Options
JNC Recruitment Limited
Data Protection Act 2018 Cyber Essential Plus IASME Governance Sarbanes Oxley On top of this, the role is responsible for: Managing the information security management system (ISMS) Managing information security risk identification and remediation Conduct and document internal audits to support the information security program Ensure adherence to legal … and regulatory compliance Monitor security operations toolsets including SIEM, vulnerabilitymanagement, endpoint protection, intrusion detection and threat intelligence Liaise with and give presentations to all levels of business including clients and senior stakeholders. Promote Info Sec awareness within the business through knowledge transfer and training In line with more »