for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. VulnerabilityManagement: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting … Documentation: Generating detailed reports on security incidents, response actions, and improvement recommendations. Maintaining accurate records of incidents, investigations, and security-related activities. Security Tools Management: Configuring, updating, and maintaining security tools such as firewalls, intrusion detection/prevention systems, endpoint protection, and SIEM solutions. more »
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & VulnerabilityManagement: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
maintaining and improving all security operational procedures, processes and technical controls, monitoring, detecting and responding to security threats, threat hunting, threat intelligence and the management of security testing in order to reduce operation information security risks. Role responsibilities : Configuration and scheduling of vulnerability scans within the vulnerabilitymanagement programme. Monitoring, prioritisation and remediation of identified vulnerabilities according to organisational SLAs. Organisation of penetration tests with 3rd party providers and remediation of vulnerabilities on a risk prioritised basis. Investigation and resolution of Information Security Incidents, requests and investigations. Ensuring information is available for scheduled audits. Ensuring more »
Reading, England, United Kingdom Hybrid / WFH Options
Project People
the Confidentiality, integrity and availability of information systems are maintained to protect Customer, corporate and 3rd party data. You will have responsibility for the management of the CERT function as well as responsibility for the management of the SEIM and SOC Partners. Responsibilities Creation and maintenance of Information … Security processes and procedures to support business policies and operations. Provide leadership and management of Information Security Operational teams to ensure efficient and effective, proactive and reactive security monitoring and defense across information assets. Ensure regular KPIs are developed and maintained and identify areas for improvement and make recommendations … is maintained and in-line with compliance and regulation. Act as an escalation point for Information Security Incidents, changes and problems. Responsibility for IDAM management and control. Production of Risk Landscape documentation in conjunction with the Information Security Risk functions and other colleagues. Technical Experience Minimum 5+ years commercial more »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
and Managed Services. Our suite of services blends together best-in-breed technologies to provide real time 24×7 monitoring, triage, remediation, threat assessment, vulnerabilitymanagement, and Professional Services to give our Clients absolute peace of mind that their critical environments are protected. Our Security Operations Centre (SOC … levels of service. Collaboration with the Customer at both technical and business levels to underpin the activities of sub-contractors or service provisioning teams. Management of small enhancement projects utilising capabilities within the service team. Management of the handling of incidents, problems and change in their area of … of performance, collection of performance data and investigation of problems and trends. Resolution or escalation of problems, implementation of service improvement actions and programmes, management of these to agreed timelines and ownership of communication to both the Customer and internal management teams. Provision of feedback on service portfolio more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
relevant TTP Your skills and experience Important skills and experience: SOC operations and transformation, Developing security operating procedures and processes, Producing dashboards and reports, VulnerabilityManagement utilising Tanium & Tripwire Incident Management utilising Elastic Stack and DCC and Endpoint security utilising Trend, SolarWinds and vSphere Cyber Kill Chain more »
business on what is good practice, what are the current threats and how to avoid appearing in the news. Providing specialist security advice to management, project teams and internal stakeholders. Continuous improvement of MI reporting up to and including board level audience. Monitoring the vendor and product landscape to … know what products are available. Perform threat identification and vulnerabilitymanagement duties. Responsible for ensuring that security vulnerabilities are raised to internal teams and/or 3rd parties suppliers and remediated according to agree timescales. Working with internal and external teams to mitigate and/or control Cyber … Cyber Security risks within IT Operations and escalating as required. Liaising with stakeholders to determine impacts, workarounds, analytical services and recommendations for improvement. Monitoring vulnerability and intelligence feeds for the latest news and alerts in the Cyber Security space. Required You need a proven track record in Security. You more »
Information Security Vulnerability Analyst £50,000 - £55,000 Hybrid - 2 days per week in either Horley/Portsmouth/Glasgow office depending on location We are looking for a brilliant Vulnerability Analyst to join a constantly growing UK utilities company as they embark on a 5 year long … for an individual that has: At least 2 years’ cyber security experience, with a background in IT infrastructure or networking Experience or knowledge of vulnerabilitymanagement tools such as Qualys, Nessus, etc. Good understanding of Cyber Assurance Framework Experience with working with Regulators and providing compliance updates for more »
for our client, responding to alerts and conducting initial triage to determine appropriate actions. With a primary focus on threat detection, incident assessment and vulnerabilitymanagement the Tier 1 Security analyst will be a critical role in maintaining the cybersecurity for our client. Overall Role Objectives Control and … monitor for threats using Microsoft Sentinel & XDR suite. First response to incident and alerts providing repeatable incident triage To take part in regular Vulnerability Scanning exercises and identify remediation steps Identify ways to improve the current security tools and usage to provide demonstrable enhancements to aid security and productivity. … Asses the urgency and severity of incidents. Determine whether an incident requires immediate action or further investigation. Escalate incidents to higher tiers when necessary. Vulnerability Scanning: scan systems for vulnerabilities. and manage vulnerabilities discovered during scans. Security Tool Management: Configure and manage security tools (e.g., SIEM, IDS/ more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
COMPUTACENTER (UK) LIMITED
You will be exposed to many technologies and situations which will help your career grow. The successful candidate will provide proactive and reactive network management, including resolution of network incidents, root cause analysis and completion of change requests. The role will focus on remotely resolving incidents, performing platform upgrades … relationships within IT Services and Business Change, additionally interacting with business teams, as and when required Maintain good customer relationships Managing compliance and patching, vulnerabilitymanagement, ITIL BAU Queue management, small project work within the customers time frames, providing technical advice and recommendations where required Managing documentation … required Liaising with 3rd Line team members to enable any service improvement to reduce incidents on customer environments. Roles and Responsibilities: Call and incident Management Delivery of network configuration tasks on LAN, WAN and security devices Implement and manage disaster recovery and back-up of network devices Monitoring the more »
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Doncaster, South Yorkshire, Yorkshire, United Kingdom
Forward Role
24x7x365. The successful candidates will work in the Security Operations Centre on both reactive and proactive security engagements with regards to Security Information & Event Management (SIEM), Intrusion Detection Systems (IDS), Cyber Threat Intelligence (CTI) and Threat Mining (TM). Role Responsibilities Provide around the clock protective monitoring through the … Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM , EDR and VulnerabilityManagement tools Assistance with active directory administration. Assistance with firewall management. Key Skills Experience in a SOC environment Excellent communication skills and comfortable more »
Staffordshire University, College Road, Stoke-On-Trent, England
Staffordshire University
with a wide number of enterprise technologies. Role The role of the Cyber Security Analyst Apprentice will perform the following: • Security event monitoring and management • Initiate incident response • Review and act on threat intelligence • Undertake vulnerabilitymanagement and liaise with Digital Services teams to remediate • Undertake security … different functional teams we provide services from provision of desktop devices and support, internet and wi-fi connectivity, cloud based server infrastructure, identity management, Microsoft 365 services, cyber security, application development and project management. more »
Provide analytical support to other SOC team members during security incidents and Threat Mining engagements. Assistance with onboarding process - deployment of SIEM, EDR and VulnerabilityManagement tools Direct communication with customers on threats and alerts Providing customers with reports and presenting findings Assistance with active directory administration. Assistance more »
Oxford, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
Employment Type: Contract, Work From Home
Rate: £450.0 - £500.0 per day + Up to £500 Per day
Didcot, Oxfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
infrastructure and enterprise servicesunderpinning our clients' programme activities. Their project portfolio spans arange of disciplines, including IT Security, Networks, Applications, Telephony,Cloud, Infrastructure, Data Management, and High-Performance Computing. Your new role As a Cybersecurity Subject-Matter Expert (SME), youwill be integral to the delivery of the cyber programme. … relevant SME knowledge andexperience will ensure successful and secure project outcomes. What you'll needto succeed A relevant information security/information managementbackground. Incident management experience and an ability toquickly tailor responses to deal with fast-paced situations. Proven people & stakeholder management skills. Knowledge of Information Security standards … Protection act 2018. Experience with a range of IT systems (bothon-premises and cloud-based). Knowledge of technical areas, such as antivirus,Networking, vulnerabilitymanagement, encryption (Microsoft & Linuxenvironments are advantageous). Strong problem-solving ability, with flexibility tothink creatively and adapt to and implement constantly evolving systems more »
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Blackpool, Lancashire, North West, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
DWP Digital
within one of Europe's largest deployments of directory services and hybrid cloud environment? We are looking for an Infrastructure Engineer specialising in Identity management to join our dynamic team. As an Identity Infrastructure engineer, you will play a pivotal role in ensuring integrity, security, and efficiency of DWPs … Modern Authentication (MFA, WHfB), Entra ID Connect, and Single Sign-On technologies such as ADFS. The team provides support for a custom-built Identity Management platform that integrates seamlessly with ServiceNow, along with enterprise security systems such as Active Directory. What skills, knowledge and experience will you need? Experience … Entra ID eg. Enterprise Applications Knowledge in scripting languages for automation eg. PowerShell, Bash, Azure CLI Experience of implementing and working with Privileged Access Management systems and RBAC eg. Azure Privileged Identity (PIM) Management or CyberArk PAM Knowledge and experience of Windows Server Security, Monitoring and Vulnerabilitymore »
organisations assets and information. Role & Responsibilities: To act as a trusted advisor on information security matters. Oversee, manage , and maintain the companys information security management system and associated security certifications ( currently ISO 27001 and Cyber Essentials Plus in the UK) Support internal business teams with client and 3rd party … business. Manage and lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerabilitymanagement processes, penetration testing and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. … and communicate this appropriately to your audience. The ability to embrace and encourage change and provide continual improvement. Implementation of and/or ongoing management of security policies and associated documentation. A pragmatic view of information security and its relationship with the wider business objectives. A willingness to self more »
Doncaster, England, United Kingdom Hybrid / WFH Options
Cloud Decisions
SOC Engineer you'll work handling both reactive and proactive security engagements. Your responsibilities will include: ✨Protective Monitoring: Utilize industry-leading Security Information & Event Management (SIEM) and Intrusion Detection Systems (IDS) to monitor and detect threats. Provide advice and guidance to clients targeted by cyber attacks and malicious activity. … and alerts. Prepare and present findings to clients. ✨Technical Assistance: Assist with the onboarding process, including deploying SIEM, Endpoint Detection and Response (EDR), and VulnerabilityManagement tools. Provide support for active directory administration and firewall management. Key Skills and Traits Needed: Must be eligible for SC Clearance Excellent more »