CONTRACTOR MUST HOLD SC CLEARANCE Role Title: Network Architect Location: Onsite 4/5 days in Warwick, Farnborough or Corsham Duration: Until 30/09/24 Role Description: Virtual Network Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building NSX-T services for workload domains within the VMware Software Defined Datacentres (SDDC) This would include the deployment of NSX Global Manager nodes to support NSX Federation across VMware Cloud Foundation instances. - Experience of NSX Edge virtual appliance deployment by using SDDC Manager, Deployment and life cycle management by using SDDC Manager workflows and NSX Manager with Automated password management using SDDC Manager. - Experience of vSphere HA recovery used across availability zones. - Experience of Uplink Policy Design - Experience of working with restraints of Computer Security Incident Response Team (CSIRT) Security Requirements - Design experience within a Cloud-native environment and providing solutions which are affordable, good value and meet security and other relevant standards relating to Critical National Infrastructure (CNI) - Architect required to create HLD, LLD and Build Scripts: Cisco NXOS underlay (not ACI) for which requirements are for a NSXT overlay. Virtual Network Microsegmentation, Integration with SDWAN, Network Packet Capture and Inspection. - Conduct testing and reporting result
17/05/2024
Project-based
CONTRACTOR MUST HOLD SC CLEARANCE Role Title: Network Architect Location: Onsite 4/5 days in Warwick, Farnborough or Corsham Duration: Until 30/09/24 Role Description: Virtual Network Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building NSX-T services for workload domains within the VMware Software Defined Datacentres (SDDC) This would include the deployment of NSX Global Manager nodes to support NSX Federation across VMware Cloud Foundation instances. - Experience of NSX Edge virtual appliance deployment by using SDDC Manager, Deployment and life cycle management by using SDDC Manager workflows and NSX Manager with Automated password management using SDDC Manager. - Experience of vSphere HA recovery used across availability zones. - Experience of Uplink Policy Design - Experience of working with restraints of Computer Security Incident Response Team (CSIRT) Security Requirements - Design experience within a Cloud-native environment and providing solutions which are affordable, good value and meet security and other relevant standards relating to Critical National Infrastructure (CNI) - Architect required to create HLD, LLD and Build Scripts: Cisco NXOS underlay (not ACI) for which requirements are for a NSXT overlay. Virtual Network Microsegmentation, Integration with SDWAN, Network Packet Capture and Inspection. - Conduct testing and reporting result
LA International Computer Consultants Ltd
Warwick, Warwickshire
*SC Cleared* Network Architect 4 Month contract initially Hybrid - Warwick, Corsham, Farnborough £625 - £675 p/d (Via Umbrella-PAYE) We have a great opportunity with a world leading organisation, a true leader in their field. We are looking for a Network Architect to join the successful team on a fantastic, long-term program of work. Key Responsibilities: Virtual Network Solution Design Architect with experience of designing and building NSX-T services for workload domains within the VMware Software Defined Datacentres (SDDC) This would include the deployment of NSX Global Manager nodes to support NSX Federation across VMware Cloud Foundation instances. Key Skills & Experience: - Experience of NSX Edge virtual appliance deployment by using SDDC Manager, Deployment and life cycle management by using SDDC Manager workflows and NSX Manager with Automated password management using SDDC Manager. - Experience of vSphere HA recovery used across availability zones. - Experience of Uplink Policy Design - Experience of working with restraints of Computer Security Incident Response Team (CSIRT) Security Requirements - Design experience within a Cloud-native environment and providing solutions which are affordable, good value and meet security and other relevant standards relating to Critical National Infrastructure (CNI) - Architect required to create HLD, LLD and Build Scripts: Cisco NXOS underlay (not ACI) for which requirements are for a NSXT overlay. Virtual Network Microsegmentation, Integration with SDWAN, Network Packet Capture and Inspection. - Conduct testing and reporting result This is an excellent opportunity on a great project of work, if you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
17/05/2024
Project-based
*SC Cleared* Network Architect 4 Month contract initially Hybrid - Warwick, Corsham, Farnborough £625 - £675 p/d (Via Umbrella-PAYE) We have a great opportunity with a world leading organisation, a true leader in their field. We are looking for a Network Architect to join the successful team on a fantastic, long-term program of work. Key Responsibilities: Virtual Network Solution Design Architect with experience of designing and building NSX-T services for workload domains within the VMware Software Defined Datacentres (SDDC) This would include the deployment of NSX Global Manager nodes to support NSX Federation across VMware Cloud Foundation instances. Key Skills & Experience: - Experience of NSX Edge virtual appliance deployment by using SDDC Manager, Deployment and life cycle management by using SDDC Manager workflows and NSX Manager with Automated password management using SDDC Manager. - Experience of vSphere HA recovery used across availability zones. - Experience of Uplink Policy Design - Experience of working with restraints of Computer Security Incident Response Team (CSIRT) Security Requirements - Design experience within a Cloud-native environment and providing solutions which are affordable, good value and meet security and other relevant standards relating to Critical National Infrastructure (CNI) - Architect required to create HLD, LLD and Build Scripts: Cisco NXOS underlay (not ACI) for which requirements are for a NSXT overlay. Virtual Network Microsegmentation, Integration with SDWAN, Network Packet Capture and Inspection. - Conduct testing and reporting result This is an excellent opportunity on a great project of work, if you are looking for your next exciting opportunity, apply now for your CV to reach me directly, we will respond as soon as possible. Due to the nature and urgency of this post, candidates holding or who have held high level security clearance in the past are most welcome to apply. Please note successful applicants will be required to be security cleared prior to appointment which can take up to a minimum 10 weeks. LA International is a HMG approved ICT Recruitment and Project Solutions Consultancy, operating globally from the largest single site in the UK as an IT Consultancy or as an Employment Business & Agency depending upon the precise nature of the work, for security cleared jobs or non-clearance vacancies, LA International welcome applications from all sections of the community and from people with diverse experience and backgrounds. Award Winning LA International, winner of the Recruiter Awards for Excellence, Best IT Recruitment Company, Best Public Sector Recruitment Company and overall Gold Award winner, has now secured the most prestigious business award that any business can receive, The Queens Award for Enterprise: International Trade, for the second consecutive period.
Network Architect - SC Cleared Whitehall Resources are looking for a Network Architect - SC Cleared. This role is based on site 4/5 days per week in either Warwick, Farnborough or Corsham and the rest remote, for an initial 4-month contract. *SC Cleared - Due to the nature of the work, the client requires you to hold Security Clearance* *Inside IR35 - You will be required to use an FCSA Accredited Umbrella Company* Job Description: Looking for a Virtual Network Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building NSX-T services for workload domains within the VMware Software Defined Datacentres (SDDC). This would include the deployment of NSX Global Manager nodes to support NSX Federation across VMware Cloud Foundation instances. Skills and Experience: - Experience of NSX Edge virtual appliance deployment by using SDDC Manager, Deployment and life cycle management by using SDDC Manager workflows and NSX Manager with Automated password management using SDDC Manager. - Experience of vSphere HA recovery used across availability zones. - Experience of Uplink Policy Design - Experience of working with restraints of Computer Security Incident Response Team (CSIRT) Security Requirements - Design experience within a Cloud-native environment and providing solutions which are affordable, good value and meet security and other relevant standards relating to Critical National Infrastructure (CNI) - Architect required to create HLD, LLD and Build Scripts: Cisco NXOS underlay (not ACI) for which requirements are for a NSXT overlay. Virtual Network Microsegmentation, Integration with SDWAN, Network Packet Capture and Inspection. - Conduct testing and reporting result All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
17/05/2024
Project-based
Network Architect - SC Cleared Whitehall Resources are looking for a Network Architect - SC Cleared. This role is based on site 4/5 days per week in either Warwick, Farnborough or Corsham and the rest remote, for an initial 4-month contract. *SC Cleared - Due to the nature of the work, the client requires you to hold Security Clearance* *Inside IR35 - You will be required to use an FCSA Accredited Umbrella Company* Job Description: Looking for a Virtual Network Solution Design Architect/Subject Matter Expert (SME) with experience of designing and building NSX-T services for workload domains within the VMware Software Defined Datacentres (SDDC). This would include the deployment of NSX Global Manager nodes to support NSX Federation across VMware Cloud Foundation instances. Skills and Experience: - Experience of NSX Edge virtual appliance deployment by using SDDC Manager, Deployment and life cycle management by using SDDC Manager workflows and NSX Manager with Automated password management using SDDC Manager. - Experience of vSphere HA recovery used across availability zones. - Experience of Uplink Policy Design - Experience of working with restraints of Computer Security Incident Response Team (CSIRT) Security Requirements - Design experience within a Cloud-native environment and providing solutions which are affordable, good value and meet security and other relevant standards relating to Critical National Infrastructure (CNI) - Architect required to create HLD, LLD and Build Scripts: Cisco NXOS underlay (not ACI) for which requirements are for a NSXT overlay. Virtual Network Microsegmentation, Integration with SDWAN, Network Packet Capture and Inspection. - Conduct testing and reporting result All of our opportunities require that applicants are eligible to work in the specified country/location, unless otherwise stated in the job description. Whitehall Resources are an equal opportunities employer who value a diverse and inclusive working environment. All qualified applicants will receive consideration for employment without regard to race, religion, gender identity or expression, sexual orientation, national origin, pregnancy, disability, age, veteran status, or other characteristics.
We are Global IT Recruitment specialist that provides support to the clients across UK, Europe and Australia. We have an excellent job opportunity for you. Role Title: SIEM/Incident SME (Need Active DV Clearance) Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Use of the SOAR platform to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on a broad range of information security standards and best practices. Offer strategic and tactical security guidance including valuation requirement of technical controls. Be part of the CRM process Liaise with the SOC engineers to maintain up-to-date dashboards of security alerts, to allow the organisation to better respond to an incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience of Enterprise ICS/network architectures and technologies Experience and knowledge of SIEM solutions; having the ability to identify use cases and their creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks (eg ISO, NIST 800-53, 800-171, 800-172, C2M2) Excellent communication skills Experience of writing Defence/Government documentation Desirable Qualifications: Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent) SIEM Design, Architecture and Analyst Course (SANS SEC455 or SEC555 or equivalent) Advanced Analyst Course (SANS SEC503 or equivalent)
17/05/2024
Project-based
We are Global IT Recruitment specialist that provides support to the clients across UK, Europe and Australia. We have an excellent job opportunity for you. Role Title: SIEM/Incident SME (Need Active DV Clearance) Location: Hybrid onsite in one of the following locations 2/3 days per week - Corsham, Portsmouth or Northallerton Duration: 6 months Role Description: Main Tech Skills required are ELK (Elastic, Logstash, Kibana) and Tanium The Cyber role is to join a growing security team responsible for designing, delivering and maintaining operational cybersecurity capabilities. Conducting pro-active, risk-based, protective monitoring on priority C4IS/networks to identify internal and external cyber-threats/attacks. This position involves a broad range of skills, including the development and mentoring of Junior Analysts, monitoring networks to actively remediate unauthorised activities. Your role Develop and integrate security event monitoring and incident management services. Respond to security incidents as they occur as part of an incident response team. Implement metrics and dashboards to give visibility of the Enterprise infrastructure. Use of the SOAR platform to assist with playbook automation and case management capabilities to streamline team processes and tools. Produce documentation to ensure the repeatability and standardisation of security operating procedures. Develop additional investigative methods using the SOC's software toolsets to enhance recognition opportunities for specific analysis. Maintain a baseline of system security according to latest threat intelligence and evolving trends. Participate in root cause analysis of incidents in conjunction with engineers across the enterprise. Provide Subject Matter Expertise (SME) on a broad range of information security standards and best practices. Offer strategic and tactical security guidance including valuation requirement of technical controls. Be part of the CRM process Liaise with the SOC engineers to maintain up-to-date dashboards of security alerts, to allow the organisation to better respond to an incident. Document, validate and create operational processes and procedures to help develop the SOC. Assist in identifying, prioritising, and coordinating the protection of critical cyber defence infrastructure and key resources. Build, install, configure, and test dedicated cyber defence hardware. Support Junior Analysts to manage SOC systems. Previous experience of Enterprise ICS/network architectures and technologies Experience and knowledge of SIEM solutions; having the ability to identify use cases and their creation, their deployment and tuning. Experience as a mentor/coach to Junior Analysts Your profile Previous experience of utilising the MITRE ATT&CK and Cyber Kill Chain frameworks Skilled in maintaining Microsoft directory services. Skilled in using virtualisation software. Knowledge of key security frameworks (eg ISO, NIST 800-53, 800-171, 800-172, C2M2) Excellent communication skills Experience of writing Defence/Government documentation Desirable Qualifications: Broad Spectrum Cyber Course (SANS SEC401 or SEC501 or equivalent) SIEM Design, Architecture and Analyst Course (SANS SEC455 or SEC555 or equivalent) Advanced Analyst Course (SANS SEC503 or equivalent)
Cyber Security Engineer Manchester City Centre Hybrid Cybersecurity Engineer Are you a skilled cybersecurity professional looking to take your career to the next level? We're seeking a Mid-Level Cybersecurity Engineer to join our team and contribute to our organisation's security posture. If you're passionate about protecting systems, networks, and data, this role is for you! Responsibilities: Evaluate ongoing security needs: Continuously assess the organization's security requirements and establish standard operating procedures to respond to inbound security issues. Develop and implement threat models: Stay informed about new threats and attack vectors, and proactively address them. Perform routine security assessments/audits: Evaluate networks, systems, code, controls, and applications to identify vulnerabilities. Investigate intrusion attempts: Conduct in-depth analysis of exploits and security incidents. Stay educated: Keep up-to-date with the latest cybersecurity trends and best practices. Qualifications: Education: Relevant degree (eg, Bachelor's in Engineering, Information Security, Information Assurance, Computer Science). Certifications (preferred): CISSP (Certified Information Systems Security Professional) CEH (Certified Ethical Hacker) CompTIA Security+ Other relevant certifications (eg, GIAC, TIA, IAM) Experience: At least 3 years of experience in incident detection, response, and forensics. Technical Skills: Familiarity with NIST SP 800-53 and RMF implementation. Knowledge of PKI infrastructure tools. Understanding of Firewalls, proxies, and encryption. Proficiency in programming languages (Python, C++, Java, etc.). If you're interested, please apply below to have your application processed TODAY!
17/05/2024
Full time
Cyber Security Engineer Manchester City Centre Hybrid Cybersecurity Engineer Are you a skilled cybersecurity professional looking to take your career to the next level? We're seeking a Mid-Level Cybersecurity Engineer to join our team and contribute to our organisation's security posture. If you're passionate about protecting systems, networks, and data, this role is for you! Responsibilities: Evaluate ongoing security needs: Continuously assess the organization's security requirements and establish standard operating procedures to respond to inbound security issues. Develop and implement threat models: Stay informed about new threats and attack vectors, and proactively address them. Perform routine security assessments/audits: Evaluate networks, systems, code, controls, and applications to identify vulnerabilities. Investigate intrusion attempts: Conduct in-depth analysis of exploits and security incidents. Stay educated: Keep up-to-date with the latest cybersecurity trends and best practices. Qualifications: Education: Relevant degree (eg, Bachelor's in Engineering, Information Security, Information Assurance, Computer Science). Certifications (preferred): CISSP (Certified Information Systems Security Professional) CEH (Certified Ethical Hacker) CompTIA Security+ Other relevant certifications (eg, GIAC, TIA, IAM) Experience: At least 3 years of experience in incident detection, response, and forensics. Technical Skills: Familiarity with NIST SP 800-53 and RMF implementation. Knowledge of PKI infrastructure tools. Understanding of Firewalls, proxies, and encryption. Proficiency in programming languages (Python, C++, Java, etc.). If you're interested, please apply below to have your application processed TODAY!
Cyber Security Management - Incident Response, Security Monitoring, Threat Modelling Frameworks, NIST, Kill Chain, Attack Lifecycle, MITRE, Windows, UNIX, Stratus, Networks, SIEM, IAM, DLP I am looking for a Cyber Security professional for my client who is a leading investment bank based in London. You will join the Information Risk Management Department which is responsible for security admin, information security practices, third-party risk management, and cyber security services within the bank. Key responsibilities: Monitoring & Compliance Develop and refine security monitoring controls to detect anomalies and incidents. Monitor and report suspicious activity, conduct IR investigations, and escalate security incidents. Utilize IR and Forensics tools for incident analysis. Security Engagement & Best Practice Collaborate with penetration testing programs and other departments to mitigate security risks. Develop Incident Response and Threat-hunting capabilities, including frameworks like Kill Chain and MITRE. Enhance Threat Intelligence integration and implement custom IOCs for monitoring. Other Provide cybersecurity expertise as needed. Contribute to security monitoring effectiveness reporting. Be available for coverage from 7 am to 7 pm on business days, with potential for ad-hoc coverage outside regular hours. Key Skills: Incident Response & Security Monitoring Threat modelling frameworks Experience in banking/Investment Banking Managing cyber security incidents NIST, Kill Chain, Attack life cycle, MITRE Cloud Security Assessments Windows Server, Windows XP, UNIX, Stratus Networks - LAN, WAN, Routers, Switches, Firewalls, remote access SIEM Tools IAM Solutions - DLP This is a Full time role at AVP level within the bank offering a salary of £65k plus a bonus. You will be required to be in the office 3 days per week which is in central London. If you're interested please get in contact. Cyber Security Management - Incident Response, Security Monitoring, Threat Modelling Frameworks, NIST, Kill Chain, Attack Lifecycle, MITRE, Windows, UNIX, Stratus, Networks, SIEM, IAM, DLP
17/05/2024
Full time
Cyber Security Management - Incident Response, Security Monitoring, Threat Modelling Frameworks, NIST, Kill Chain, Attack Lifecycle, MITRE, Windows, UNIX, Stratus, Networks, SIEM, IAM, DLP I am looking for a Cyber Security professional for my client who is a leading investment bank based in London. You will join the Information Risk Management Department which is responsible for security admin, information security practices, third-party risk management, and cyber security services within the bank. Key responsibilities: Monitoring & Compliance Develop and refine security monitoring controls to detect anomalies and incidents. Monitor and report suspicious activity, conduct IR investigations, and escalate security incidents. Utilize IR and Forensics tools for incident analysis. Security Engagement & Best Practice Collaborate with penetration testing programs and other departments to mitigate security risks. Develop Incident Response and Threat-hunting capabilities, including frameworks like Kill Chain and MITRE. Enhance Threat Intelligence integration and implement custom IOCs for monitoring. Other Provide cybersecurity expertise as needed. Contribute to security monitoring effectiveness reporting. Be available for coverage from 7 am to 7 pm on business days, with potential for ad-hoc coverage outside regular hours. Key Skills: Incident Response & Security Monitoring Threat modelling frameworks Experience in banking/Investment Banking Managing cyber security incidents NIST, Kill Chain, Attack life cycle, MITRE Cloud Security Assessments Windows Server, Windows XP, UNIX, Stratus Networks - LAN, WAN, Routers, Switches, Firewalls, remote access SIEM Tools IAM Solutions - DLP This is a Full time role at AVP level within the bank offering a salary of £65k plus a bonus. You will be required to be in the office 3 days per week which is in central London. If you're interested please get in contact. Cyber Security Management - Incident Response, Security Monitoring, Threat Modelling Frameworks, NIST, Kill Chain, Attack Lifecycle, MITRE, Windows, UNIX, Stratus, Networks, SIEM, IAM, DLP
Technology Resilience Lead - Disaster Recovery - London Salary £60-70k - 2 Day per week office based Bonus Scheme Technology Resilience Lead required for a leading client based in London. My client is currently seeking a suitable candidate to Support the capacity and capability of our clients' collective, including their operational entities and subsidiaries, to prepare for, respond to, and rebound from disruptions to our global technology infrastructure and operational environments. We seek a highly skilled IT professional with expertise in one or more of the following areas: infrastructure, cybersecurity, engineering, testing, and project management. Your dedication lies in ensuring our clients maintain a robust and resilient technological ecosystem, mitigating risks, and enhancing operational readiness. Your commitment extends to ensuring the continuity of critical business functions and technology systems despite disruptions or challenges. Your role entails defining the standards of technology resilience and overseeing the Group-wide Disaster Recovery program. This program emphasizes testing the resilience, continuity, and recoverability of our critical applications and systems. Key skills: -Display unwavering dedication to our clients' core values by adhering to our standards of business conduct, ensuring compliance with Group policies and procedures, and setting a precedent through personal example. -Your duties will encompass delineating the criteria for robust technology resilience and overseeing the Group-wide Disaster Recovery program, concentrating on assessing the resilience, continuity, and recoverability of vital applications and systems. -You'll collaborate with Technology Service Owners and broader Group IT and Operating Business teams to facilitate data restoration exercises and execute backups. This involves maintaining and testing existing backups to uphold data integrity and availability. -Conducting operational assessments of defined Disaster Recovery plans will be part of your responsibilities. This entails utilizing various methods such as checklists, walk-throughs, tabletop exercises, simulations (parallel or full interrupt), and comprehensive exercises, coordinated with related plans like IT DR plans and crisis management plans. -Furthermore, you'll integrate cybersecurity scenarios, analyse test outcomes, implement lessons learned, and incorporate necessary improvements or corrective actions into IT DR and Cyber Resilience plans. -By conducting post-incident reviews and analysing pre-planned testing outcomes, you'll continuously monitor and assess key performance indicators (KPIs) like recovery time objectives (RTOs) and recovery point objectives (RPOs). This process aims to continually enhance the efficiency and effectiveness of the disaster recovery program. -Foster a work environment that emphasizes the significance of employees acting with integrity and ethics, aligning with the Group Code of Conduct. -Serve as a subject matter expert, forging trusted partnerships with the business and staying abreast of the latest advancements and innovations in the field. -Assume responsibility for overseeing the implementation of the clients' disaster recovery plan in the event of a crisis, facilitating swift responses to potential disruptions such as cyberattacks or infrastructure damage. -Possessing one of the following certifications is advantageous: CompTIA Network +, CompTIA Security +, CISM, CISSP, or COBIT 5. -Demonstrate a fundamental understanding of frameworks such as NIST CSF, ISO 27001/27002, and COBIT. -Experience in Operational Technology Security, with the ability to identify and address IT and operational vulnerabilities, is preferred. Interested? Please submit your updated CV to Dean Parkes at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
16/05/2024
Full time
Technology Resilience Lead - Disaster Recovery - London Salary £60-70k - 2 Day per week office based Bonus Scheme Technology Resilience Lead required for a leading client based in London. My client is currently seeking a suitable candidate to Support the capacity and capability of our clients' collective, including their operational entities and subsidiaries, to prepare for, respond to, and rebound from disruptions to our global technology infrastructure and operational environments. We seek a highly skilled IT professional with expertise in one or more of the following areas: infrastructure, cybersecurity, engineering, testing, and project management. Your dedication lies in ensuring our clients maintain a robust and resilient technological ecosystem, mitigating risks, and enhancing operational readiness. Your commitment extends to ensuring the continuity of critical business functions and technology systems despite disruptions or challenges. Your role entails defining the standards of technology resilience and overseeing the Group-wide Disaster Recovery program. This program emphasizes testing the resilience, continuity, and recoverability of our critical applications and systems. Key skills: -Display unwavering dedication to our clients' core values by adhering to our standards of business conduct, ensuring compliance with Group policies and procedures, and setting a precedent through personal example. -Your duties will encompass delineating the criteria for robust technology resilience and overseeing the Group-wide Disaster Recovery program, concentrating on assessing the resilience, continuity, and recoverability of vital applications and systems. -You'll collaborate with Technology Service Owners and broader Group IT and Operating Business teams to facilitate data restoration exercises and execute backups. This involves maintaining and testing existing backups to uphold data integrity and availability. -Conducting operational assessments of defined Disaster Recovery plans will be part of your responsibilities. This entails utilizing various methods such as checklists, walk-throughs, tabletop exercises, simulations (parallel or full interrupt), and comprehensive exercises, coordinated with related plans like IT DR plans and crisis management plans. -Furthermore, you'll integrate cybersecurity scenarios, analyse test outcomes, implement lessons learned, and incorporate necessary improvements or corrective actions into IT DR and Cyber Resilience plans. -By conducting post-incident reviews and analysing pre-planned testing outcomes, you'll continuously monitor and assess key performance indicators (KPIs) like recovery time objectives (RTOs) and recovery point objectives (RPOs). This process aims to continually enhance the efficiency and effectiveness of the disaster recovery program. -Foster a work environment that emphasizes the significance of employees acting with integrity and ethics, aligning with the Group Code of Conduct. -Serve as a subject matter expert, forging trusted partnerships with the business and staying abreast of the latest advancements and innovations in the field. -Assume responsibility for overseeing the implementation of the clients' disaster recovery plan in the event of a crisis, facilitating swift responses to potential disruptions such as cyberattacks or infrastructure damage. -Possessing one of the following certifications is advantageous: CompTIA Network +, CompTIA Security +, CISM, CISSP, or COBIT 5. -Demonstrate a fundamental understanding of frameworks such as NIST CSF, ISO 27001/27002, and COBIT. -Experience in Operational Technology Security, with the ability to identify and address IT and operational vulnerabilities, is preferred. Interested? Please submit your updated CV to Dean Parkes at Crimson for immediate consideration. Not interested? Do you know someone who might be a perfect fit for this role? Refer a friend and earn £250 worth of vouchers! Crimson is acting as an employment agency regarding this vacancy
Conexus have partnered with a global company within life sciences to source an incident management specialist to launch new initiatives around Incident Response. In this role, you'll be at the forefront, setting the example for junior team members. We're looking for someone with a process-oriented background, ideally from a highly regulated environment such as pharmaceuticals, banking, or a company specializing in SOC Services. While you won't directly manage people, a significant aspect of this role involves training the team. Hands-on experience in dealing with incidents is crucial. Responsibilities: Lead the incident response efforts, ensuring incidents are managed effectively and in line with established processes and initiatives. Mentor and train junior team members to enhance their skills and capabilities in incident response, fostering a culture of continuous improvement. Collaborate with stakeholders to understand business requirements and align incident response processes accordingly. Continuously assess and refine incident response procedures to ensure they meet industry standards and best practices. Act as a subject matter expert on incident response, providing guidance and support to the internal team and other stakeholders. Coordinate with external partners and vendors as needed to enhance incident response capabilities and stay updated on emerging threats. Document and analyze incident response activities to identify areas for improvement and implement corrective actions. Stay informed about the latest trends and developments in incident response and cybersecurity to inform strategic decision-making. Requirements: Demonstrated experience in incident response management, preferably in a process-oriented environment. Proven ability to lead incident response efforts and train junior team members effectively. Hands-on experience dealing with security incidents and a strong understanding of incident response methodologies. Background in a highly regulated industry such as pharmaceuticals or banking, or experience with SOC Services, is desirable. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Relevant certifications such as CISSP, CISM, or GIAC certifications are a plus. If this position is of interest, please apply here or contact me directly for more details.
16/05/2024
Project-based
Conexus have partnered with a global company within life sciences to source an incident management specialist to launch new initiatives around Incident Response. In this role, you'll be at the forefront, setting the example for junior team members. We're looking for someone with a process-oriented background, ideally from a highly regulated environment such as pharmaceuticals, banking, or a company specializing in SOC Services. While you won't directly manage people, a significant aspect of this role involves training the team. Hands-on experience in dealing with incidents is crucial. Responsibilities: Lead the incident response efforts, ensuring incidents are managed effectively and in line with established processes and initiatives. Mentor and train junior team members to enhance their skills and capabilities in incident response, fostering a culture of continuous improvement. Collaborate with stakeholders to understand business requirements and align incident response processes accordingly. Continuously assess and refine incident response procedures to ensure they meet industry standards and best practices. Act as a subject matter expert on incident response, providing guidance and support to the internal team and other stakeholders. Coordinate with external partners and vendors as needed to enhance incident response capabilities and stay updated on emerging threats. Document and analyze incident response activities to identify areas for improvement and implement corrective actions. Stay informed about the latest trends and developments in incident response and cybersecurity to inform strategic decision-making. Requirements: Demonstrated experience in incident response management, preferably in a process-oriented environment. Proven ability to lead incident response efforts and train junior team members effectively. Hands-on experience dealing with security incidents and a strong understanding of incident response methodologies. Background in a highly regulated industry such as pharmaceuticals or banking, or experience with SOC Services, is desirable. Excellent communication and interpersonal skills, with the ability to collaborate effectively with cross-functional teams. Relevant certifications such as CISSP, CISM, or GIAC certifications are a plus. If this position is of interest, please apply here or contact me directly for more details.
AWS/Security/DevSecOps/Control Tower/IAM Are you an enthusiastic security specialist in AWS? A top-tier DevSecOps Engineer? Are you eager to take charge of the technical direction for one of the most rapidly expanding companies in the PropTech sector? If so, and you have - 3+ years' experience as a DevSecOps Engineer or Security Engineer with AWS In depth knowledge of AWS security tools inc. SecurityHub, Inspector, Detective, CloudTrail, GuardDuty and CloudWatch Proficiency in AWS services and features, including IAM, VPC, EC2, S3, RDS, Lambda, and CloudFormation Strong understanding of security best practices, principles, and frameworks, such as ISO 27001 controls and NIST Guidelines Experience in implementing security automation using Scripting languages eg Python and infrastructure-as-code (IaC) tools Ability to perform security threat modelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding business stakeholder engagement and management experience, inc. presenting of solutions to the exec team Certifications such as AWS Certified Security Specialist are a plus 70/75K, Occasional Travel to the Midlands Required Then get in touch today, interviews next week for the right candidates!
16/05/2024
Full time
AWS/Security/DevSecOps/Control Tower/IAM Are you an enthusiastic security specialist in AWS? A top-tier DevSecOps Engineer? Are you eager to take charge of the technical direction for one of the most rapidly expanding companies in the PropTech sector? If so, and you have - 3+ years' experience as a DevSecOps Engineer or Security Engineer with AWS In depth knowledge of AWS security tools inc. SecurityHub, Inspector, Detective, CloudTrail, GuardDuty and CloudWatch Proficiency in AWS services and features, including IAM, VPC, EC2, S3, RDS, Lambda, and CloudFormation Strong understanding of security best practices, principles, and frameworks, such as ISO 27001 controls and NIST Guidelines Experience in implementing security automation using Scripting languages eg Python and infrastructure-as-code (IaC) tools Ability to perform security threat modelling and risk assessments to identify and prioritize security risks Experience with security incident response and handling, including log analysis and forensics Outstanding business stakeholder engagement and management experience, inc. presenting of solutions to the exec team Certifications such as AWS Certified Security Specialist are a plus 70/75K, Occasional Travel to the Midlands Required Then get in touch today, interviews next week for the right candidates!
The role As QHSSE Coordinator you are responsible for SEA-KIT s Quality, Health, Safety, Security and Environment (QHSSE) guidelines and for ensuring that the company is in compliance with published policies, supporting standards and legislative framework. You coordinate and lead the QHSSE assurance activities for SEA-KIT, ensuring high standards are achieved and maintained across the company and its activities, and specifically the build/fit-out of its uncrewed surface vessels (USVs). Lead investigations into HSE incidents and near misses and coordinate the actions and responses arising from these. Provide day-to-day QHSSE advice and active assistance by ensuring that good standards and practices are identified, developed, implemented and adhered to across SEA-KIT s design, build, testing and commissioning operations. Define, lead and oversee all Quality processes in SEA-KIT s design, build and testing of its products. Perform quality checks and instigate problem solving to investigate and resolve any issues identified. Review non-conformances identified during the build/fit-out and testing of SEA-KIT s USVs to improve the quality of the vessel design and build. Lead the company s ISO 9001 annual recertification, and oversee external reviews and audits to maintain certification. Lead the implementation of required management systems and processes required for additional ISO certifications. SEA-KIT s head office and manufacturing yard is based in Tollesbury, Essex. The role involves some travel within the UK and potentially to international locations. Responsibilities Generate and cultivate a strong culture of HSE awareness. Management, implementation, maintenance and continuous improvement of the company s management system. Ensure adherence to relevant procedures. Lead investigations into HSE incidents and near misses. Review all Hazard Observation Cards (HOCs) submitted. Coordinate and close out actions arising from incidents, near misses and HOCs. Generate and cultivate a culture of high quality workmanship and rigorous testing standards. Ensure adherence by SEA-KIT staff and contracted third parties to relevant procedures Ensure QA/QC processes are in place and followed by all relevant staff. Monitor and update the company on updates or changes to legal or regulatory requirements. Oversee updates to and reviews of the company s Quality and HSE processes and procedures. Review all non-conformances and ensure follow-up actions are implemented and closed out. Provide management updates at monthly HSE meetings and monthly/quarterly management team meetings, including reports for senior management as required. Who we re looking for You have the right to work in the UK. You hold a bachelor s degree (preferred). You have a track record in Quality and HSE systems and assurance, with relevant QHSSE experience in a manufacturing and/or project environment. Experience in the implementation and maintenance of a Quality Management System/ ISO certification is essential. You are well organised, with good analytical and critical thinking skills, and excellent verbal and written communication skills. You are flexible and will be available for weekend or out of hours work, and willing and able to travel as required. What we offer SEA-KIT provides a positive and dynamic work environment. You will gain immersive experience, where you will be at the forefront of cutting-edge technology, with opportunities to stretch and develop yourself whilst contributing to the emerging market of carbon-reducing uncrewed surface vessels.
15/05/2024
Full time
The role As QHSSE Coordinator you are responsible for SEA-KIT s Quality, Health, Safety, Security and Environment (QHSSE) guidelines and for ensuring that the company is in compliance with published policies, supporting standards and legislative framework. You coordinate and lead the QHSSE assurance activities for SEA-KIT, ensuring high standards are achieved and maintained across the company and its activities, and specifically the build/fit-out of its uncrewed surface vessels (USVs). Lead investigations into HSE incidents and near misses and coordinate the actions and responses arising from these. Provide day-to-day QHSSE advice and active assistance by ensuring that good standards and practices are identified, developed, implemented and adhered to across SEA-KIT s design, build, testing and commissioning operations. Define, lead and oversee all Quality processes in SEA-KIT s design, build and testing of its products. Perform quality checks and instigate problem solving to investigate and resolve any issues identified. Review non-conformances identified during the build/fit-out and testing of SEA-KIT s USVs to improve the quality of the vessel design and build. Lead the company s ISO 9001 annual recertification, and oversee external reviews and audits to maintain certification. Lead the implementation of required management systems and processes required for additional ISO certifications. SEA-KIT s head office and manufacturing yard is based in Tollesbury, Essex. The role involves some travel within the UK and potentially to international locations. Responsibilities Generate and cultivate a strong culture of HSE awareness. Management, implementation, maintenance and continuous improvement of the company s management system. Ensure adherence to relevant procedures. Lead investigations into HSE incidents and near misses. Review all Hazard Observation Cards (HOCs) submitted. Coordinate and close out actions arising from incidents, near misses and HOCs. Generate and cultivate a culture of high quality workmanship and rigorous testing standards. Ensure adherence by SEA-KIT staff and contracted third parties to relevant procedures Ensure QA/QC processes are in place and followed by all relevant staff. Monitor and update the company on updates or changes to legal or regulatory requirements. Oversee updates to and reviews of the company s Quality and HSE processes and procedures. Review all non-conformances and ensure follow-up actions are implemented and closed out. Provide management updates at monthly HSE meetings and monthly/quarterly management team meetings, including reports for senior management as required. Who we re looking for You have the right to work in the UK. You hold a bachelor s degree (preferred). You have a track record in Quality and HSE systems and assurance, with relevant QHSSE experience in a manufacturing and/or project environment. Experience in the implementation and maintenance of a Quality Management System/ ISO certification is essential. You are well organised, with good analytical and critical thinking skills, and excellent verbal and written communication skills. You are flexible and will be available for weekend or out of hours work, and willing and able to travel as required. What we offer SEA-KIT provides a positive and dynamic work environment. You will gain immersive experience, where you will be at the forefront of cutting-edge technology, with opportunities to stretch and develop yourself whilst contributing to the emerging market of carbon-reducing uncrewed surface vessels.
Senior Security Engineer - Capellen, Luxembourg (Hybrid role) - €69K + Car allowance + Bonus An exciting opportunity to join a global IT solutions and services organisation currently seeking a Senior Security Engineer. By bringing together talented people, world-class technology partners and emerging innovators, we help our clients solve some of the world's most significant technological, business and societal challenges. As the Senior Security Engineer at NTT, you will be responsible for designing, implementing, and managing security solutions to safeguard the network, applications, and digital assets of our client. You will work with technologies, such as Palo Alto, Bluecoat, F5 (LTM, ASM, APM), ASA VPN, Mobile Iron, Infoblox, Splunk, Fireye or PKI, to ensure the highest level of security for our organization. Key Responsibilities: Being responsible to implement projects to replace/upgrade the current infrastructure with new versions or solutions, and you will analyze, recommend, and implement new cyber security technologies and solutions. Monitor operational infrastructure - leveraging standard tools & processes to respond & resolve incidents and requests in a timely manner. Incident Response - Monitor security events, investigate & respond to security incidents, and assist in post-incident analysis & remediation. Collaboration: Work closely with cross-functional teams, including IT, Network, and App Dev, ensuring integration of security measures. Research & Innovation: Staying up to dat with emerging tech threats. Qualifications : Relevant Bachelor's degree in Computer Science, Info Security, or a relevant field. 6+ years field experience in networking & security area with solutions. Proven experience in network and application security, with expertise in Palo Alto, Bluecoat, F5 (LTM, ASM, APM), ASA VPN or Splunk. Knowledge of Firewall management, intrusion detection, content filtering, web application security, and VPN technologies. Proficiency in PKI design and management, digital certificate issuance, and secure key management. A proactive approach to identifying & mitigating security vulnerabilities and risks. Skills Summary Automation Tools, Cloud Security, Firewalls, Local Area Network (LAN), Palo Alto Networks Prisma Access Secure Access Service Edge (SASE), Security Technologies, TCP/IP Networking, Threat Management Senior Security Engineer - Capellen, Luxembourg (Hybrid role) - €69K + Car allowance + Bonus
14/05/2024
Full time
Senior Security Engineer - Capellen, Luxembourg (Hybrid role) - €69K + Car allowance + Bonus An exciting opportunity to join a global IT solutions and services organisation currently seeking a Senior Security Engineer. By bringing together talented people, world-class technology partners and emerging innovators, we help our clients solve some of the world's most significant technological, business and societal challenges. As the Senior Security Engineer at NTT, you will be responsible for designing, implementing, and managing security solutions to safeguard the network, applications, and digital assets of our client. You will work with technologies, such as Palo Alto, Bluecoat, F5 (LTM, ASM, APM), ASA VPN, Mobile Iron, Infoblox, Splunk, Fireye or PKI, to ensure the highest level of security for our organization. Key Responsibilities: Being responsible to implement projects to replace/upgrade the current infrastructure with new versions or solutions, and you will analyze, recommend, and implement new cyber security technologies and solutions. Monitor operational infrastructure - leveraging standard tools & processes to respond & resolve incidents and requests in a timely manner. Incident Response - Monitor security events, investigate & respond to security incidents, and assist in post-incident analysis & remediation. Collaboration: Work closely with cross-functional teams, including IT, Network, and App Dev, ensuring integration of security measures. Research & Innovation: Staying up to dat with emerging tech threats. Qualifications : Relevant Bachelor's degree in Computer Science, Info Security, or a relevant field. 6+ years field experience in networking & security area with solutions. Proven experience in network and application security, with expertise in Palo Alto, Bluecoat, F5 (LTM, ASM, APM), ASA VPN or Splunk. Knowledge of Firewall management, intrusion detection, content filtering, web application security, and VPN technologies. Proficiency in PKI design and management, digital certificate issuance, and secure key management. A proactive approach to identifying & mitigating security vulnerabilities and risks. Skills Summary Automation Tools, Cloud Security, Firewalls, Local Area Network (LAN), Palo Alto Networks Prisma Access Secure Access Service Edge (SASE), Security Technologies, TCP/IP Networking, Threat Management Senior Security Engineer - Capellen, Luxembourg (Hybrid role) - €69K + Car allowance + Bonus
Technical Cyber Incident Responder Salary: £65-£80k + Strong Bonus + Benefits Location: UK Wide I am currently partnered with a NCSC accredited Cyber Incident Response provider who are looking for a technical Cyber Incident Responder to complement their established practice and take the lead on complex cyber DFIR investigations. This team is integral in responding to any external threats faced by clients, identifying, and preventing the root cause effectively and swiftly. This is a seriously exciting opportunity for a technical Digital Forensics & Incident Response (DFIR) lead to join one of the most established Incident Response practices in the world, gain access to some of the highest profile and sophisticated incidents out there; and focus exclusively on hands-on investigative pieces of work, away from the incident management and planning side of things. Key Responsibilities Act as a lead and technical escalation point on the most complex Digital Forensics & Incident Response investigations. Work closely with security research team to develop new and innovative investigations tooling and methodologies. Mentor and train junior team members through complex incident response investigations. Required Skills In-depth knowledge of various Incident Response techniques and procedures. Evidence of responding to, containing, and remediating high profile and high severity incidents. Experience conducting investigations and responding to incidents in cloud settings, such as AWS, GCP, and Azure. Previous consulting experience. This is an incredible opportunity for an experienced, technically minded Digital Forensics & Incident Response consultant to join one of the most established and NCSC accredited Cyber Incident Response firms in the world; and focus their time exclusively on responding to the highest severity incidents. Lawrence Harvey is acting as an Employment Business in regards to this position.
14/05/2024
Full time
Technical Cyber Incident Responder Salary: £65-£80k + Strong Bonus + Benefits Location: UK Wide I am currently partnered with a NCSC accredited Cyber Incident Response provider who are looking for a technical Cyber Incident Responder to complement their established practice and take the lead on complex cyber DFIR investigations. This team is integral in responding to any external threats faced by clients, identifying, and preventing the root cause effectively and swiftly. This is a seriously exciting opportunity for a technical Digital Forensics & Incident Response (DFIR) lead to join one of the most established Incident Response practices in the world, gain access to some of the highest profile and sophisticated incidents out there; and focus exclusively on hands-on investigative pieces of work, away from the incident management and planning side of things. Key Responsibilities Act as a lead and technical escalation point on the most complex Digital Forensics & Incident Response investigations. Work closely with security research team to develop new and innovative investigations tooling and methodologies. Mentor and train junior team members through complex incident response investigations. Required Skills In-depth knowledge of various Incident Response techniques and procedures. Evidence of responding to, containing, and remediating high profile and high severity incidents. Experience conducting investigations and responding to incidents in cloud settings, such as AWS, GCP, and Azure. Previous consulting experience. This is an incredible opportunity for an experienced, technically minded Digital Forensics & Incident Response consultant to join one of the most established and NCSC accredited Cyber Incident Response firms in the world; and focus their time exclusively on responding to the highest severity incidents. Lawrence Harvey is acting as an Employment Business in regards to this position.
*Fully remote position* *Long Term Contract* A prestigious company is looking for a Red Team Operator - Contract to Hire. This person use and will develop scanning tools. They will go on the offensive side and help find bugs that the scanning tools can't find. They will need experience in a large enterprise environment and work within Linux/Windows/VMware/Azure, etc. Also needed is a coding background for automation purposes (Python, C, Go, Rust, etc.) Responsibilities/Qualifications: We are looking for candidates that take a structured approach to Red Team operations (ie, testing in lab environments, creating and operating according to runbooks and SOPs, writing detailed after-action reports, participating in daily operation syncs). Development experience, including low-level exploit and/or implant development experience (ie, they must have experience in a low-level language such as C or assembly), to aid in our shift to automating as much of our Red Team program as possible. Experience automating repeated tasks with building CI/CD pipelines in Gitlab. Experience developing automation tools using distributed workers using technologies such as RabbitMQ and Celery Experience developing custom red team tools across the entire spectrum of an operation Experience from the initial access exploits to the core implant, the implant features to achieve mission objectives, control posts, and everything in between using programming languages including C, Python, Assembly, Go, Rust Experience with Incident Response Tabletop Exercises including running the exercises and the dispositioning of results from previous exercises
01/05/2024
*Fully remote position* *Long Term Contract* A prestigious company is looking for a Red Team Operator - Contract to Hire. This person use and will develop scanning tools. They will go on the offensive side and help find bugs that the scanning tools can't find. They will need experience in a large enterprise environment and work within Linux/Windows/VMware/Azure, etc. Also needed is a coding background for automation purposes (Python, C, Go, Rust, etc.) Responsibilities/Qualifications: We are looking for candidates that take a structured approach to Red Team operations (ie, testing in lab environments, creating and operating according to runbooks and SOPs, writing detailed after-action reports, participating in daily operation syncs). Development experience, including low-level exploit and/or implant development experience (ie, they must have experience in a low-level language such as C or assembly), to aid in our shift to automating as much of our Red Team program as possible. Experience automating repeated tasks with building CI/CD pipelines in Gitlab. Experience developing automation tools using distributed workers using technologies such as RabbitMQ and Celery Experience developing custom red team tools across the entire spectrum of an operation Experience from the initial access exploits to the core implant, the implant features to achieve mission objectives, control posts, and everything in between using programming languages including C, Python, Assembly, Go, Rust Experience with Incident Response Tabletop Exercises including running the exercises and the dispositioning of results from previous exercises