ENDPOINT AND DATA SECURITY jobs in ENGLAND, United Kingdom #4

, endpoint, and cloud environments to look for indicators of security breaches. Leverage internal and external resources...CyberProof is a cyber security services and platform company whose mission is to help our customers react faster...

CyberProof

, and support for cross-data centre Microsoft solutions Microsoft Endpoint Configuration Manager (MECM/SCCM) Security... secure environments Ability to hold Security Clearance at a minimum of SC level Desirable Experience: Storage...

Pertemps

for includes access and identity management, application delivery to endpoints, client security, remote access and vulnerability..., Intune, SCCM, Microsoft SQL, Oracle, Zscaler, Windows Server, Linux, Windows 10, on-premises data centres, HPE and HP...

FirstGroup

for all servers, systems and data. Monitor server and firewall logs, network traffic and endpoint protection systems. Monitor..., MS Access applications, Cascade Security systems - Symantec Endpoint Protection, CrowdStrike, Windows Defender...

Just IT Recruitment

and vulnerability management solutions to ensure end-points are compliant with Security guidelines. Performs endpoint management... in records and information management, digital transformation services, data centers, asset lifecycle management...

Iron Mountain

·Core and edge Switches. ·Security (endpoint and server security, proxies, anti-ransomware, etc) ·VLAN design.... ·Deputise for Infrastructure Manager when required. Technical Experience Hardware Layer: ·Data Centre ·Microsoft...

Wincanton

& and 3rd line support. Gaining exposure to Information Security and the fundamental role it plays in protecting University... data and users. Learning how to maintain line of business applications in an enterprise. Working with software vendors...

University of Plymouth

. - familiarity with network, endpoint controls and technology stack. - ability to translate external and internal data collected... cyber intel and threat briefings to stakeholders. - Provide IT security SME knowledge and support during applicable IT...

UBS

. - Familiarity with network, endpoint controls and technology stack. - Ability to translate external and internal data collected... cyber intel and threat briefings to stakeholders. - Provide IT security SME knowledge and support during applicable IT...

UBS

UK or Netherlands for this role, and have the necessary work permissions. Information security is an integral part..., which is why Visa has made it a priority to create top-tier security operations and incident response teams to defend the company...

Visa

Management, Attack Simulation, Security Configuration, and Endpoint Detection and Response. You will play an important role in... cybersecurity standards construct for Cybersecurity Assurance. Aligned to the key security areas within the Cybersecurity Cyber Risk...

JPMorgan Chase

): security baselines, email filtering, Endpoint ASR rules To manage virtual machines (VMWare & Azure IaaS). Skills/Knowledge... configuration and security, network configuration and filtering, using Intune/Auto-Pilot for Desktop imaging management and updates...

Hawk 3 Talent Solutions

, use cases, and playbooks within the platform. Monitor and analyse security event data to identify potential security incidents.... Use data modelling practices to analyse your findings and create suggestions for strategic and operational improvements...

Cadent Gas

Configuration Manager(SCCM)/ Microsoft Endpoint Configuration Manager (MECM) but also be demonstrate effective application... Manager/ Microsoft Endpoint Configuration Manager (MECM); Have excellent knowledge of Virtualized Environments such as VMware...

Leidos

Membership Domain Health and Security diagnostics Automation and replication Azure Endpoint or other systems management... and administration Linux Server Administration Palo Alto Firewall Net-App SAN ON-TAP Oracle Server BitDefender Endpoint Security...

Gleeson Recruitment Group

. Manage the security and integrity of data and IT systems. Educating staff on good working practices. Management... emphasis on security updates. Ensuring that adequate backups of data are kept both on and off site and that backup...

experience in the areas of: endpoint security, malware analysis, threat hunting, penetration testing, incident response, reverse... innovative and agile use of technology and data. We use product-centric delivery teams using agile methods to implement new...

IAG Tech