and various leadership teams for effective IAM implementation. Key Interactions: IAM SME & Product Owner (part of the IAM Team) CISO and the wider Information & CyberSecurity Leadership Team Head of Enterprise, Data & Infrastructure & ED&I Leadership Team Head of IT Corporate Audit Key Skills/Knowledge/Experience: Essential: Extensive more »
Trident Search have partnered with a rapidly growing cybersecurity consultancy who are on the search for a Senior Frontend Developer to join them. The ideal candidate will be responsible for designing, developing, testing, and debugging responsive web and mobile applications for the company. Using JavaScript, HTML, and CSS, this more »
About the company Crypto Quantique is building the most secure end-to-end IoT platform. We are a transformative cybersecurity technology company, using the most advanced techniques in cryptography and quantum physics, designed to ensure that both device security becomes foundational and end-to-end IoT security standard practice. We more »
Gloucester, Gloucestershire, South West, United Kingdom
100% IT Recruitment Ltd
run the whole organisation Monitor the use of IT throughout the organisation, ensuring access to the network and applications is suitably controlled and that cybersecurity provision is robust Manage the maintenance of other IT operated through the network, e.g. telephone system, CCTV Provide technical support for users. 1st line more »
include, but is definitely not limited to, projects and/or programmes centred around data, software development/implementation/migration, IT infrastructure, telecommunications, cybersecurity, service delivery, logistics, robotics and AI.? Qualifications DV (already in place) is required Demonstrable experience of project management methodologies and their application in the more »
N3, Finchley, Greater London, United Kingdom Hybrid / WFH Options
YourRecruit (UK)
Experience required with Windows desktop operating systems Experience with macOS desktop operating systems Experience required with mobile device operating systems Experience with fundamentals of cybersecurity Understanding of TCP/IP and troubleshooting Internet connectivity Experience with routers and firewalls Experience with RDP, RDS, & Citrix Understanding of relationship between switches more »
of data storage and processing and data governance solutions Knowledge and experience with hybrid cloud and on-prem environments Knowledge and experience with the cybersecurity aspects of solution architectures Familiar with cloud architecture frameworks and design patterns Strong communications , active listening and influencing skills (diagrams, written and verbal) Experience more »
large scale Splunk Enterprise Security projectsCreating/tuning of SIEM detection rules to satisfy client requirementsProviding technical consultancy for Hippo clients predominantly in the cybersecurity spaceWorking in hybrid teams across multiple clientsLeading and providing mentorship to technical teams as well as acting as a technical escalation pointMentoring and coaching more »
Birmingham, West Midlands (County), United Kingdom
Hippo Digital
large scale Splunk Enterprise Security projectsCreating/tuning of SIEM detection rules to satisfy client requirementsProviding technical consultancy for Hippo clients predominantly in the cybersecurity spaceWorking in hybrid teams across multiple clientsLeading and providing mentorship to technical teams as well as acting as a technical escalation pointMentoring and coaching more »
cloud-based infrastructure as appropriate • Develop and Test Group Disaster Recovery Plans Maintain Information Security policies, making sure data centres and users adhere. Manage cybersecurity tools and regular penetration testing. Assist in the delivery of CyberEssentials+ (or similar as deemed appropriate) for group companies Verify application, data, and network more »
IT underpins the technology needs of all the different businesses that make up the SSE group. From emerging technologies to data and analytics to cybersecurity - we power SSE's growth and enable it to generate value, while keeping it secure. As a trusted business partner that helps SSE lead more »
operational leader, this sophisticated international professional will have a background in programming, project management, engineering or systems architecture. In addition, essential is experience in cybersecurity, setting up the security organization and SecOps. A visionary with strategic insight and expertise to design and implement robust IS, data management, and technology more »
MI reports. Lead and support branch’s Data Governance work. Assist to support branch’s information security work and safeguard branch’s network against cybersecurity events. Support London Branch employees with IT requirements to ensure they have the right technology and support for their day-to-day work. Support branch more »
Greater London, England, United Kingdom Hybrid / WFH Options
itemit
new technologies and methodologies to enhance operational efficiency and effectiveness. Security and Compliance: Ensure the security of IT systems and data. Implement and manage cybersecurity measures. Ensure compliance with relevant regulations and industry standards. Desirable Skills and Qualifications: Bachelor’s degree in Computer Science, Information Technology, or a related field. more »
desirable Excellent presentation and reporting skills to give regular updates of progress to management and executive layer Knowledge of Data privacy related technology and cybersecurity protocols is desirable. Proactive and must demonstrate high-level of self-motivation. Experience of leading workshops, effectively and efficiently gathering the customer’s business more »
Warwick, Warwickshire, West Midlands, United Kingdom
Tata Technologies Europe Ltd
desirable Excellent presentation and reporting skills to give regular updates of progress to management and executive layer Knowledge of Data privacy related technology and cybersecurity protocols is desirable. Proactive and must demonstrate high-level of self-motivation. Experience of leading workshops, effectively and efficiently gathering the customers business requirements more »
use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to more »
security and data protection spot checks and audit processes, collating results, report and present findings to relevant committees as required, working collaboratively with the CyberSecurity Lead. Coordinate review and management of Data Protection Impact Assessments (DPIAs) with the IG Team in line with Trust processes, to establish any risks more »
Cognitive Services, PowerBIKnowledge and exposure of financial regulation is highly desirableAwareness of industry trends across wider technology e.g. RegTech, Cloud, Big data & Analytics, and Cybersecurity etc.Experience of working in a public, private Enterprise or FTSE 100 organisationQualificationsOur Approach to InclusionThe Bank values diversity, equity and inclusion. We play a more »
Governance (ideally in an Agile context) A strong technical background with demonstrable expertise in at least one of AWS, GCP or Azure. Familiarity with cybersecurity, security architecture or closely related topics like identity and access management, or offensive security engineering An understanding of the end to end technology delivery life more »
zero, product compliance, asset health & performance, supply chain agility and minimise operational disruption. Delivering critical technical solutions that range across automation control, panel build, cybersecurity, digitalisation and industrial operational technology (OT) programmes, we can ensure the integrity, safety and security of complex solutions across the industrial landscape responding to more »
service desk environment. Proficient in supporting Microsoft Windows Desktop Operating Systems. Microsoft/Office 365 Administration Experience. Basic Administration of Windows Server Operating Systems CyberSecurity Awareness Have experience of service desk ticketing systems. Desirable skills: Networking experience, including Switching, Routing, Firewalls and Wireless technologies; Virtualisation technologies Microsoft Azure Cloud more »
Fareham, Hampshire, South East, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
use your passion and abilities at Leidos to keep the people you care about safe. We are at the forefront of machine learning, AI, cybersecurity and solutions. Using your skills in the technology frontline by helping to build a safer world. You can inspire change. Collaboration: having flexibility to more »
the ICB and primary care, with a focus on minimising clinical impact. The role works across the infrastructure team, performing duties that fall within CyberSecurity, Network and Server support, as well as cloud services. Key working relationships The post holder will be required to maintain constructive relationships with a more »
As a CyberSecurity Specialist, you will play a crucial role in safeguarding our clients digital assets and infrastructure from potential cyber threats. Your primary responsibility will involve monitoring, analyzing, and responding to security incidents, as well as implementing measures to proactively prevent security breaches. You will collaborate with cross … actors. Enforce security policies and encryption standards to ensure compliance with regulatory requirements and industry standards. Security Awareness and Training: Educate end-users about cybersecurity best practices, such as safe web browsing habits, avoiding suspicious links or email attachments, and recognizing social engineering techniques. Provide training and guidance on how … field (or equivalent work experience). Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or other relevant certifications preferred. Proven experience in cybersecurity roles, with a strong understanding of security principles, technologies, and best practices. Proficiency in using security tools such as SIEM, IDS/IPS, antivirus, firewalls more »