About the role The Security Operations Analyst is part of a team responsible for a broad range of cyber security tasks and activities, including management and operation of the Universitys Security Operations Centre (SOC), operating and applying security controls in line with standard frameworks ISO 27001, NIST CSF, Cyber … regulatory and compliance responsibilities for universities, including GDPR, DPA, PCI DSS, and Ofsted. - Broad technical knowledge of various tools, including Security Information and Event Management, VulnerabilityManagement and Endpoint Detection and Response systems, how to operate and maintain them, interpret the output and apply the recommendations. - Excellent More ❯
all work together to be brilliant for customers, every single day. Our CISO function is created by Cyber Defence Centre, Business Resilience, Privacy & Information Management, Strategy & Operating Office and Security Design, Innovation & Enablement. What we look for We are looking for a Security Engineer who will provide security-related … in line with compliance commitments. Ensure security technical platforms are configured to optimise the overall security offered to DLG. Improve Security Information and Event Management (SIEM) coverage of DLG's overall environment. Make sure that all changes to the production environment have been reviewed and approved. Communicate and build … protocols, and network security management. Security Technologies : Expertise in Web Application & Network Firewalls, IDS/IPS, File Integrity Monitoring, SIEM, Advanced Endpoint Protection. Security Management : Advanced skills in vulnerabilitymanagement, event management, application security, incident response, forensics, and encryption. Technical Proficiency : Strong foundation in algorithms, data More ❯
frameworks (MoD and HMG experiences helpful) • Cloud-based cyber security principles and architecture points • Boundary controls, network segmentation and access control • Identity and Access Management (including RBAC and A/PBAC, permissions management), • Cryptographic techniques and implementations • IT asset management and tracking • VulnerabilityManagement and More ❯
we'll do our best to agree a working pattern that works for everyone. World changing work From science to technology, from meteorology to management, and from planning to communication, our expertise helps us stand out as the authority on weather accuracy and climate prediction. We help individuals, industries … security posture, safeguarding systems that are essential to public safety and national security. This role requires close collaboration with our Security Operations Center and VulnerabilityManagement teams to continuously improve our security services. Your key duties: * Design and implement enterprise security solutions for on-premises and cloud-based … systems by applying technical architecture, risk management, and threat analysis to create solutions that are resilient from attack * Assess and improve security postures to address evolving cyber threats, keeping our operational defenses proactive and effective by identifying risks and closing gaps * Develop security solutions that enhance our ability to More ❯
reports to the Head of Technology Services and works directly with clients. The Dev Sec Ops Engineer is responsible for the design, implementation, and management of both Squarcle and client cloud infrastructure, Dev Sec Ops environment and deploying our solutions to client environments. The ideal candidate will have extensive … patterns such as microservices, containers, and serverless architecture. Develop and maintain CI/CD pipelines for efficient, secure, and automated deployments. Security by design Vulnerabilitymanagement Threat modelling Cloud Security Ensure compliance with industry security standards and best practices, such as ISO 27001, SOC 2, and GDPR. Experience … with DevSecOps practices, handling secrets management (Vault, Azure Key Vault), and zero-trust security. Implement security controls for both cloud and on-premises environments, ensuring data integrity, confidentiality, and availability. Knowledge of securing containerised environments (Kubernetes security, Docker security). Monitor and troubleshoot systems to ensure optimal performance, identifying More ❯
equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks (ISO27001, NIST CAF, OWASP) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport More ❯
equivalent + 6-7 years in InfoSec Experience maturing security programs & frameworks ( ISO27001, NIST CAF, OWASP ) Strong knowledge of SIEM, IDS/IPS, RBAC, vulnerabilitymanagement Understanding of cloud, COTS/SaaS platforms & IoT security Ability to communicate risks & strategies at executive level Full driving license & personal transport More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
travel into London around once or twice a month (expenses-paid). Responsibilities: Implement and manage security controls for Microsoft and Azure infrastructure. Lead vulnerabilitymanagement and incident response. Enhance security monitoring and IAM with Microsoft tools. Drive security architecture and ensure endpoint security. Support M&A security More ❯
to E suites) Modern identities & security Azure (PaaS, IaaS) security & governance Familiar with firewall configuration & advance threat hunting Experience with security tools and general vulnerabilitymanagement Production of documentation for end users and the support desk Summary of Daily Duties: Monitor and maintain the infrastructure Undertake regular patch …/upgrade activities Assist IT support team with end-user queries Assist in configuring end user devices (new hardware/policy/compliance management) Hours of Work: Monday to Friday: 9am – 5pm. 1-hour for lunch. 35-hours per week. More ❯
and maintain IT documentation and procedures. Experience Required: Proven experience in IT Engineering or a similar technical role. Strong understanding of security principles and vulnerability management. Proficiency in scripting languages (Python, Bash, PowerShell). Knowledge of networking concepts and security protocols. Due to the volume of applications received for More ❯
Exeter, Devon, South West, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
and maintain IT documentation and procedures. Experience Required: Proven experience in IT Engineering or a similar technical role. Strong understanding of security principles and vulnerability management. Proficiency in scripting languages (Python, Bash, PowerShell). Knowledge of networking concepts and security protocols. Due to the volume of applications received for More ❯
Monitor, analyse, and enhance the performance and reliability of large-scale distributed systems to ensure continuous uptime and efficiency. Develop automation solutions for configuration management, system provisioning, and deployment to streamline operations and reduce manual interventions. Implement and maintain security protocols, ensuring systems are compliant with regulatory standards and … best practices, including data encryption, access control, and vulnerability management. Lead the resolution of system outages or performance degradation issues, conducting root cause analysis and implementing preventive measures. Work closely with cross-functional teams, including software development, DevOps, and IT operations, to integrate solutions, troubleshoot issues, and enhance system More ❯