SQM) role aims at supporting the Service line/Value Stream and the Controls Owner to drive various Service Quality upliftment activities across Service Management (SM) disciplines. The SQM will work with Development Managers and the ITSOs to identify and document points of failure for all services within the … Service line/Value Stream based on the technologies used and tier of the service. The SQM extends governance over Incident, Problem, Change, Capacity Management, VulnerabilityManagement, Access Management, and technology evergreen status, among other practices. Responsibilities Identify and document points of failure for services within … the Service line/Value Stream based on technologies used and tier of the service. Govern Incident, Problem, Change, Capacity Management, VulnerabilityManagement, Access Management, and technology evergreen status. Implement and run operational governance processes and meetings for various SM practices. Build appropriate tooling and MI more »
on-call anytime. Strong experience with 8 – 10 years minimum in multiple cybersecurity domains. Mandatory to have experience in design, architecture, deployment, configuration and management in security products and technologies listed below: Endpoint Privilege Management, PAM management via Arcon or similar Endpoint security via Trellix Anti-Malware … Encryption, ePO, DLP VulnerabilityManagement using Tenable SC (Nessus) or similar solution SIEM tool configuration, logging, alerting and monitoring via Trellix SIEM or similar Forensics tools like Axiom Magnet Forensics or similar (optional) Experience in GRC, compliance management and audits. Knowledge of ITIL process in management incident, Change and problem management Provide/share and suggest all best practices across the domain Desired Characteristics Experience with HMGSPF, JSP 440, JSP 490, NCSC ten steps to cyber security, MOD Cyber Security Directives. Cyber security certifications (SANS, ISACA, ISC2, CISSP, GIAC, CISA, CISM) preferred. Quickly able more »
Permanent Job Description: Strong experience with 8 – 10 years minimum in multiple cybersecurity domains. Mandatory to have experience in design, architecture, deployment, configuration and management in security products and technologies listed below: Endpoint Privilege Management, PAM management via Arcon or similar Endpoint security via Trellix Anti-Malware … Encryption, ePO, DLP VulnerabilityManagement using Tenable SC (Nessus) or similar solution SIEM tool configuration, logging, alerting and monitoring via Trellix SIEM or similar Forensics tools like Axiom Magnet Forensics or similar (optional) Experience in GRC, compliance management and audits. Knowledge of ITIL process in management incident, Change and problem management Provide/share and suggest all best practices across the domain Thanks and Regards, Sreeja.J Talent Acquisition Executive | UK & Europe Ampstek Services Limited Sontraer Str. 9 60386, Frankfurt am Main, Hessen Germany Tel - +48221857586 Email – sreeja.j@ampstek.com/www.ampstek.com https://www.linkedin.com more »
This role is based at Coleshill, North Warwickshire and will also include travel to our other sites when required. Senior Network Engineer - Key Responsibilities: - Management and development of the LAN/WAN environment across the Group - Monitor performance and provide improvements across the network infrastructure - Develop and maintain documentation … sets relating to areas covered by the role - Provide ‘weekly/monthly' reporting of both SLA and performance of the networking infrastructure - Vulnerability/Patch Management and Reporting of LAN/WAN infrastructure - Work within the team to provide support to other areas of the infrastructure where appropriate … AWS - Network Security Design and Implementation - General WinTel within an Active Directory Environment - General Hypervisor networking understandings - General cloud platform networking - Network patching and vulnerabilitymanagement - Documentation and reporting As well as having technical skills, the successful candidate will also need to: - Have excellent problem-solving skills and more »
Telford, Shropshire, West Midlands, United Kingdom Hybrid / WFH Options
Kuehne+Nagel
key systems within the contract using a bespoke six-step process Lead investigations following security incidents and preparation of associated reports Lead Information Security Management meetings, which will include technical experts Maintain the Security risk register and write risk assessments Ensure the effectiveness of the vulnerabilitymanagement … policies) Demonstrable experience in an area of technical information security (e.g. Operating Systems, Application & Network security) Experience of building and maintaining an Information Security Management System (ISMS) Knowledge and experience with Business Continuity/Disaster Recovery (ISO 22301) Information Technology Infrastructure Library (ITIL) security management certification or knowledge … is desirable Solid understanding of the risk management lifecycle Ability to gain HMG SC clearance, otherwise willing to undergo SC vetting Great verbal and written communication skills with the ability to build effective relationships with key stakeholders GOOD REASON TO JOIN As well as our competitive pay rates and more »
you will do You will lead and perform IT and cyber risk internal audit activity to understand and report to the Board and Executive Management the extent to which significant IT and cyber risks are governed, managed, and controlled. You will have responsibility for Defining the IT and cyber … Expertise in assessing cyber security risks both in relation to software, application and platform development, and NIST/CBEST risk assessment (identify and access management, network security, vulnerabilitymanagement, data loss prevention, security event monitoring). Experience in testing key IT and cyber controls in SaaS, PaaS more »
offering to work with people in a global team. Roles & Responsibilities: Build a safe and secure system and gain knowledge of the principles of vulnerability assessment and reconnaissance to protect your infrastructure and web presence. Utilize practical exploits and assess how they affect your systems. Evaluate the risk assessment … and perform threat modeling of a web application architecture. Create a successful vulnerabilitymanagement strategy. Learn how to use online open-source intelligence applications for passive reconnaissance. Execute foot printing and reconnaissance, a crucial pre-attack part of the ethical hacking process using the most recent methods and more »
knowledge of Cisco/Dell/Checkpoint/Azure/AWS technologies Network security design and implementation experience Familiarity with cloud platforms, patching, and vulnerabilitymanagement Ability to work under pressure and independently If you’re interested in hearing more about this role, please get in touch for more »
Analyst you will focus on Technical Information Security within the Information Security Function , within a major part of the Organisation's Overall Cyber Incident Management Process. You will work closely with the InfoSec Engineering Team within the Security Department to Define Requirements of the Tools & Onboard New Functionality. You … take Responsibility for Tuning & Maintaining Security Platforms to Deliver the Best Capability to other Information Security Analysts & SOC Analysts & Clients in Identifying & Delivering Threat & Vulnerability Management. You will act as Subject Matter Expert & Escalation Point for other SOC Analysts and will work closely with both the Senior Security Operations … Experience Required for Senior Information Security Analyst role will include: Strong Experience in Security Operations or a related Information Security role Ideally leadership or Management Experience Strong Understanding of Information Security Principles & Technologies. Excellent Analytical & Problem-Solving Skills. Commercial Awareness & (Ideally) Experience of PCI DSS (Current Version) Knowledge of more »
Manage security incidents and conduct reviews/audits. Lead internal and external security audits. Maintain security risk register and write risk assessments. Ensure effective vulnerability management. Engage with external stakeholders on security requirements. Requirements: Minimum 3 years in Information Security. CISM or equivalent; CompTIA Security+ Certification. Experience with ISO … Knowledge of HMG security requirements. Experience in technical information security. Experience with ISMS and Business Continuity/Disaster Recovery (ISO 22301). ITIL security management knowledge. Understanding of risk management lifecycle. Ability to gain HMG SC clearance. Benefits: Competitive salary and benefits package Opportunities for career development and more »