varied role, which includes things like: • Build, deployment and maintenance of new and existing environments • Designing and maintaining highly available architectures • Security (patch management, vulnerabilityscanning & monitoring) • Uptime - design and maintain the systems and networking for uptime, resilience, architecting for failure. • Evaluation of new, cutting-edge technologies to more »
are conducted, and improvements implemented and ensure colleague queries around policies and requirements are appropriately answered in a timely manner. Be responsible for the Vulnerability Management process. Act on vulnerability information and conduct Cyber Security risk assessments and work with suppliers, partners, and internal teams to ensure security … need: In depth knowledge of Information Security concepts and principles, including cloud security capabilities. Experience with configuring and utilising security tooling, including SIEM, EDR, vulnerability scanners, CASB, network scanning, DLP. Hands-on IT experience with proven expertise in a previous Information Security role. Vendor management experience. A relevant more »