In partnership with Nurtur Group, Althaus Digital are looking for self-motivated, driven individuals with a proven passion for IT Cyber or Infrastructure.
This is an exciting opportunity to take the first step in your IT career in an evolving and growing industry via some initial training.
Posted by ITonlinelearning Recruitment • £24K/yr to £37K/yr
Cyber Security Placement Programme - No Experience Required Are you looking to benefit from a new career in IT and Cybersecurity?
We help place graduates from this programme in top UK companies and organisations needing to employ entry-level IT and Cybersecurity staff that can hit the ground running with up-to-date skills gained from this programme.
Skills shortages in the IT sector are driving the need for qualified, entry-level career seekers and career changers.
Are you a Cyber Secuirty Consultant, qualified in CHECK, looking to join an industry-leading team, where your expertise will drive cutting-edge cyber security initiatives for top-tier clients?
Up to £120,000 Company Pension Private Medical Life Insurance Fully Paid Travel Expenses
They will be a technical resource that will assess security policies and controls for effectiveness and suitability against the security risk profile.
Role Overview
The role of the Technical Security Analyst is to assist the Information Security Manager to ensure the confidentiality, integrity and availability of Stonegate Group information assets and systems.
Our client are looking for an ambitious Deputy Head of Information Security to join their organisation near Birmingham City Centre.
As a well-established, Birmingham-based company - they are looking to onboard an experienced Deputy Head of Information Security to help them to sure up their ISMS and help to effectively and efficiently manage a team.
Ensure robust security practices are in place to protect against identity-related threats by collaborating with architects, security professionals, and both internal and external stakeholders.
Establish standards and lead the design and implementation of identity and access management processes and controls to enhance operations and reduce risks.
Guide internal business teams on best practices, identify and address any concerns, and serve as the liaison between business and technical teams on all identity and access management (IAM) matters.