Posted by INTEC SELECT LIMITED • £500/day to £550/day
Overview
A global brand is seeking an experienced Cyber Security Business Analyst to document security policies and procedures based on a recent Centre for Internet Security (CIS) assessment.
The role also involves analysing business processes, data flows, and collaborating on business continuity planning.
Role and Responsibilities
CIS Policy Documentation: Analyze CRA recommendations and align with CIS standards.
Posted by Precise Placements • £80K/yr to £117K/yr
Our leading global law firm are looking to recruit a Senior Network Engineer (Firewalls, Routing & Switching, NAC, SASE) on a permanent basis to ensure that defined standards in place across Network Security are implemented for any new projects.
The right Senior Network Engineer (Firewalls, Routing & Switching, NAC, SASE) will lead all technical design and implementation to ensure the smooth operation and security of the network infrastructure throughout its lifecycle.
Additionally, the Engineer will provide day to day technical guidance for all Network Security Operations Analysts based offshore.
We are looking for a highly skilled and motivated Information Security Analyst to join our team.
In this role, you will play a crucial part in evaluating cybersecurity controls, conducting risk assessments, and collaborating with cross-functional teams.
You will support our Information Security Manager in maintaining all aspects of information security risk management, responding to security inquiries and incidents, and ensuring compliance with relevant regulatory requirements.
Looking for a Role that Will Have a Meaningful Impact on Security Engineering?
We are seeking a talented individual to reduce enterprise risk through the secure design, implementation, and administration of cybersecurity tools, while also enhancing departmental strategies to protect our customers, data, and colleagues.
The Opportunity
As a Security Engineer, you'll play a pivotal role in strengthening our internal network against unauthorised access and cyber threats.