technologies such as SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, and log management. knowledge of security approaches including ISMS, riskanalysis and assessments, the CIA triad, attack vectors (including social engineering), cryptography, confidentiality issues, and best practices for cyber security incident response (including more »
SIEM, firewalls, intrusion detection/prevention systems, anti-virus software, authentication systems, log management, and content filtering. Solid grasp of security approaches including ISMS, riskanalysis and assessments, the CIA triad, social engineering, cryptography, confidentiality issues, and incident response best practices. Operate within an ITIL V3 and ISO27001 more »
and climate change business, with a particular focus on decarbonization and clean energy. ERM delivers a wide range of climate change services including climate riskanalysis and reporting, strategy development, policy and regulatory analysis, target setting, and benchmarking. We help clients, including global companies, electric and natural … commercial energy and climate-related challenges including evaluation of alternative fuel and advanced technologies; management of in-use demonstration programs; technical, operational, and economic analysis to evaluate new business cases; and address policy requirements to integrate climate-solutions.Works with leading electric utilities and industries collaborating to address key market … experts supports clients across the breadth of their organizations to operationalize sustainability, underpinned by our deep technical expertise in addressing their environmental, health, safety, risk and social issues. We call this capability our “boots to boardroom” approach for its comprehensive service model that allows ERM to develop strategic and more »
abreast of legislative changes which may impact the organisation, and amending information management practices. This will be done through following the right processes, information riskanalysis, compliance awareness, training requirements, information management advice and any others as appropriate. The post holder is responsible for deriving maximum value for more »
Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Matchtech
security technologies such as SIEM, firewalls, intrusion detection/prevention systems, antivirus software, authentication systems, and log management. Strong knowledge of security approaches, including riskanalysis, attack vectors, cryptography, and cyber security incident response best practices. If the above role sounds like the right step in your career more »
SQL 2012+, Linux appliances A demonstrated history of planning, development and implementation of Azure security related technologies An excellent understanding of security approaches: ISMS, riskanalysis and assessments, CIA triad, attack vectors including social engineering, confidentiality and cyber security The Cyber Security Lead should ideally have qualifications in more »