OT/ICS Systems Security: Proven experience in securing Operational Technology and Industrial Control Systems (e.g., SCADA, HMI, PLC). IdentityandAccessManagement: In-depth knowledge of identityandaccess management. Threat Mitigation: Familiar with common cybersecurity threats andmore »
architecture and infrastructure requirements. Implement and configure Azure services, such as Virtual Machines, Virtual Networks, Storage Accounts, and Azure Active Directory. Automate deployment andmanagement processes using Infrastructure as Code (IaC) tools, such as Azure Resource Manager (ARM) templates, PowerShell, or Azure CLI. Monitor and optimize Azure infrastructure … performance, troubleshoot issues, and implement necessary enhancements. Implement and maintain robust security measures, including network security groups, access controls, and encryption mechanisms. Collaborate with development teams to streamline application deployment and support Continuous Integration/Continuous Deployment (CI/CD) pipelines. Requirements: You will possess proven work experience … and container orchestration platforms (e.g., Azure Kubernetes Service). Solid understanding of security principles and best practices in Azure, including identityandaccessmanagement, encryption, and network security. Excellent troubleshooting and problem-solving skills, with the ability to quickly identify and resolve issues in more »
Greater Bristol Area, United Kingdom Hybrid / WFH Options
IVC Evidensia
outstanding care in around 2,500 locations globally. IVC Evidensia is undergoing an exciting digital transformation. Key to this is to improve the management of our core data sets. This means accelerating the standardisation of operational systems in practices, the creation of stronger tools for managing master data … breaking the challenges into deliverables. Along with this, they will also work closely with the Data Architect to define our over-arching data management strategy. In return, you will benefit from: * Hybrid working environment in a dog-friendly office * 5 weeks holiday, plus bank holidays * Your birthday as … with information security best practice. Capabilities in interfacing the IT Infrastructure team to ensure non-functional requirements, such as performance, scalability, resilience andidentity/accessmanagement, are effectively delivered in the end-to-end solution. Following receipt of your application, you will be more »
Bristol, Somerset, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
developments and research emerging cyber threats. - Plan and test disaster recovery, business continuity, and create contingency plans. - Monitor systems logs, identityandaccessmanagement, API security, and software libraries. - Maintain security systems, conduct security training, and utilize advanced analytic tools. - Conduct phishing simulations, internal … Compliance, Quality, and Risk:- Implement internal and external audit requirements and maintain accurate process maps. - Ensure compliance with ISO27001, Cyber Essentials Plus, Service Management, and internal governance. Other Responsibilities: - Adhere to Financial Conduct Authority Individual Conduct Rules. Experience and Qualifications: - At Least 5 years experience in Information Security more »
Monitor and ensure the reliability, availability, and performance of applications Implement security best practices and maintain compliance with industry standards Desirable Experience: Experience implementing IDAM Programming experience using Python CDK & Cloud Formation experience Ready to join our team and embark on an exciting journey? Apply now and be part of more »