and Attack Simulation (BAS) solutions. Leveraging a unique combination of dedicated security experts, intelligent process, and advanced technology, NetSPI brings a proactive approach to cybersecurity with more clarity, speed, and scale than ever before. NetSPI is on an exciting growth journey as we disrupt and improve the proactive security market. more »
CyberSecurity Lead – Leeds (hybrid) - £65,000 - £85,000 + Bonus + Benefits Locke & McCloud are looking for an experienced Cybersecurity professional to join our client. The CyberSecurity Lead will be responsible for ensuring the integrity and availability of our clients' data and acting as the primary cyber … deep understanding of the company's products, services, and Service Management processes. By leveraging advanced technical expertise and a commitment to customer service, the CyberSecurity Lead will secure the company's and its customers' data infrastructure. Main Responsibilities: daily operations of the CyberSecurity Team, including scheduling to ensure … adequate resources, conducting quality reviews, and ensuring compliance with established processes and procedures. in for the CyberSecurity Manager when needed. and manage the Security cloud migration process, identifying and addressing gaps from experience. one-on-one performance meetings with team members. complaints and escalations proactively, addressing issues before they more »
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
Northallerton, North Yorkshire, Yorkshire and the Humber
Computer Futures
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves more »
or as part of a cohesive team, adeptly managing multiple tasks with varying priorities while ensuring timely completion of all responsibilities. Proficient understanding of cybersecurity principles, encompassing endpoint protection, least privilege (JEA), and event logging, ensuring the implementation of robust security measures to safeguard organisational assets. Hands-on experience with more »
years of experience with security information and event management (SIEM) tools 1+ years of experience with perimeter security Primary Functions Operate within the global Cybersecurity Team within the Information Technology department Ensure global alignment with Company’s best practices for patch, posture, and vulnerability management Maintain and improve the TVM … program’s operational performance, processes, and technology Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs) Act as a trusted advisor within IT on vulnerabilities and patches Collaboration with system owners and support teams to analyze and evaluate mitigation strategies, providing guidance and improving strategies/procedures Work … standards tools, or processes are implemented Advise on product roadmap security features and practical implementation Track emerging technologies and identify opportunities for improving overall Cybersecurity Tasks and Responsibilities Regular interaction with the Director of Cybersecurity and the Security Operations Team to review threat activity, adversary tactics, targeted vulnerabilities, and exposure more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
and resolve system faults that fall under 1st - 3rd support tasks and to liaise with software/hardware suppliers to resolve issues. To review cybersecurity issues/vulnerabilities and remediate according with suppliers. To provide timely and accurate remote telephone & remote system responses to site based technical issues and more »
Scanner, Nessus Manager, Tenable.io Solid understanding of IT Security concepts to include vulnerability & patch management, security operations, Incident Management and Incident response. Experience integrating Cybersecurity data using enterprise or custom tools data aggregation and analysis tools, including Splunk Ability to provide support in an IT operations and maintenance, including ticket more »
upgrade, and support of all IT systems, including servers, PCs, operating systems, hardware, software, email provision, anti-virus software, print services and peripherals Maintaining cybersecurity, preventing internal and external attacks Supporting and maintaining ESPs Azure tenant, including Azure AD and Exchange Online, Intune & company portal Managing all hardware/ more »
s). Understanding of working in a regulated financial services environment. Experience of IT network support/administration in an SME Knowledge of current cybersecurity threats and of how to mitigate them. Experience in the configuration of firewalls and network. Experience of management and support of a VOIP telephony more »
Wolverhampton, West Midlands (County), United Kingdom
Ansaldo Nuclear Limited
related knowledge, qualifications and experience Excellent analytical and problem-solving skills Good communications skills - written and verbal Knowledge of ticketing systems Basic understanding of cybersecurity Excellent troubleshooting skills Extensive application support experience with Office 2016/365, MS Teams, CAD systems Working knowledge of network and PC operating systems, Windows more »
North Cumbria Integrated Care NHS Foundation Trust
are being followed accurately. Lead on and design, configuration, implementation and management of new and existing solutions which involve end user devices. Support the CyberSecurity Team to ensure security compliance by providing appropriate recommendations with respect to end user devices. Lead on the research into new technologies relevant to more »
and Containerization infrastructure. Establish On-prem and Cloud Network interface with Load balancers, firewalls, VPNs, DNS, DHCP, Active Directory Services. Partner with Development teams, CyberSecurity, Infrastructure teams to deliver and maintain a cloud platform. Create the capabilities required to utilize automation practices for initializing, provisioning, and optimizing systems, and facilitate more »
maintenance of data warehouse and Business Intelligence solutions. 2.5 Ensure data is processed in accordance with guidelines provided by the Trusts Information Governance and cybersecurity leads. 2.6 Maintain processes, documentation, concerning the development and optimisation of complex Extract, Transform & Load (ETL)/Extract, Load & Transform (ELT) data pipelines. 2.7 Produce more »
design, and advise on security controls, configurations, and implementations for IT projects Continuously improve the integration and effectiveness of implemented technologies Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs) Identify cybersecurity operations technology gaps, deficiencies, and recommend corrective actions Assist with the planning, testing, tracking, remediation for … identified cybersecurity operational weaknesses Identify, create and mature cybersecurity operations processes Work with IT risk assessment function to ensure the proper security configurations and controls are implemented for IT projects Provide pros/cons of security solutions impact business strategies Create documentation of findings and recommendations (root cause and risk … review, identification, development, and implementation of effective security controls, processes, and policies to improve security posture and identify gaps in existing controls. Assist with Cybersecurity awareness initiatives and events Assist with incident response planning and activities Essential Qualifications and Education: Bachelor’s Degree in Information Technology (minimum) or equivalent more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
Senior CyberSecurity Analyst Permanent - £50,000 - £70,000 Location: Hybrid – Brighton Your new company: A leading Financial Services organisation in Brighton are currently looking for a Senior CyberSecurity Analyst to come in and support the existing Cyber team with the day to day running of the CyberSecurity … infrastructure for the organisation. The role responsibilities: You will be supporting the Head of IT and CyberSecurity with the day-to-day operational management of the cybersecurity function. You will work with the Senior CyberSecurity Manager to define and evolve the cyber strategy across the organisation. Lead … and/or mentor a team of cybersecurity professionals, providing guidance, support, and mentorship to ensure optimal performance and productivity. Develop, Implement, and maintain information security strategies and objectives to enhance the overall security posture of the business. Monitor and analyse security incidents and breaches, and lead incident response more »
platforms. • Experience using host and network-based IDS/IPS • Experience using packet capture solutions. • Skill in developing and deploying signatures. • Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). • Ability to provide technical and service leadership to junior SOC more »
platforms. Experience using host and network-based IDS/IPS Experience using packet capture solutions. Skill in developing and deploying signatures. Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). Ability to provide technical and service leadership to junior SOC more »
Computer Futures - London & S.E(Permanent and Contract)
platforms. * Experience using host and network-based IDS/IPS. Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC more »
platforms. * Experience using host and network-based IDS/IPS * Experience using packet capture solutions. * Skill in developing and deploying signatures. * Skill to apply cybersecurity and privacy principles to organizational requirements (relevant to confidentiality, integrity, availability, authentication, non-repudiation). * Ability to provide technical and service leadership to junior SOC more »
standards. Demonstrable experience in a variety of areas such as cloud security, IAM, 3rd party risk, threat assessments and vulnerability management. Strong knowledge of cybersecurity architecture. Relevant certifications would be beneficial (e.g. TOGAF, SABSA). Ability to interact with and challenge technical teams and the methodologies they are implementing. more »
CV if interested! Key Words: Information Security Analyst, Information Security Engineer, Security Analyst, Information Security, NIST, COBIT, ISO-27001, ISO-27002, Compliance, Governance, Risk, CyberSecurity, SOX, Sentinel, Defender, InTune BeTechnology Group Limited is acting as an Employment Agency in relation to this vacancy. more »
technology or security (TOGAF, SABSA, SANS Architecture, Microsoft/Azure Architecture, British Computer Society Diploma) Relevant certifications (CISSP, CISM, CRISK, CGEIT) Computer Science or CyberSecurity Degree As a Principal Security Architect, you will have the opportunity to work with a talented team of security professionals, collaborating with various technology more »