Cyber Security Placement Programme - No Experience Required Are you looking to benefit from a new career in IT and Cybersecurity?
We help place graduates from this programme in top UK companies and organisations needing to employ entry-level IT and Cybersecurity staff that can hit the ground running with up-to-date skills gained from this programme.
Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers.
The Continuous Security Testing service is a consultant led vulnerability identification and verification service which makes use of automated vulnerability scanning along with significant manual testing against a broad scope in a continuing engagement.
The purpose of the service is to continually monitor a customer's external attack surface for new vulnerabilities, changes in the scope of the attack surface, and proactively inform customers of discovered issues along with recommended remediation; with the overall aim of reducing the lifetime of each vulnerability.
Are you a seasoned Cyber Security professional seeking a leadership opportunity that will elevate your career to new heights?
Join a leading global law firm as their Cyber Security Team Lead and take charge of safeguarding their digital infrastructure while nurturing a high-performing team.
Are you looking to benefit from a new career in Data Analysis?
If you are detail orientated, perceptive, organised, competent, analytical and can communicate well with those around you; you could have a truly rewarding future as a Data Analyst
We do this using our specialised Data Analyst career programme which looks to assist and place qualified candidates into a career pathway in Data Analysis.
Taking into account the further heightened cyber-security environment, work with a focused IT Risk and Security team and other stakeholders, in the provision of security dependencies across multiple Bank requirements, focussing primarily on leading on the continued design, development
And implementation of the Identity and Access Management (JML/RBAC) in a Microsoft Azure cloud environment, and assisting where necessary across other ITSec requirements such as mitigating Cyber Risks, responding to security incidents, and processing BAU security functions as required.