contact

EXPERTISE

MANAGED SECURITY MONITORING / THREAT MANAGEMENT /
INCIDENT RESPONSE

SECURE UNDERSTANDS THE IMPORTANCE OF FINDING THE RIGHT TALENT WHEN ORGANISATIONS ACROSS ALL INDUSTRIES

EXPERTISE INTRODUCTION

Unified Threat Management (UTM) is an Information Security term that refers to a Single Security Solution, and usually Single Security Appliance, that provides Multiple Security Functions at Single Point on the Network.

Functions such as: Anti-Virus, Anti-Spyware, Anti-Spam, Network Firewalling, Intrusion Detection & Prevention, Content Filtering & Leak Prevention.

SECURE understands the importance of finding the Right Talent when organisations across all industries, size and technical environments find themselves the victims of a Security Breach and Clients find themselves Conducting Incident Response Investigations or Threat Management Response.
Whether this is a Single-System Event or an Enterprise-Wide Intrusion Across All Systems, our commitment to finding the Best Talent of Highly Experienced Specialists including Analysts, Incident & Assessment Investigators in the areas of Business Remediation & Readiness, Compromise & Vulnerability.
SECURE specialises in successfully delivering on Business Critical Recruitment Assignments across all areas of Managed Security Monitoring within Security Operations Centres (SOC), IT Security Engineering, Vulnerability Assessment & Penetration Testing, Identity Management (IDM) & Data Loss Prevention with Major Commercial & Financial Services Based Organisations, Consultancies & Systems Integrators alongside other End Users.

SCOPE OF EXPERTISE

OUR CONSULTANTS HAVE SUCCESSFULLY WORKED IN VARIOUS ASSIGNMENTS

SECURE Recruitment also provide talent across Corporate Governance.

Secure are an Equal Opportunities Recruiter.

EXPLORE ALL OUR LATEST PERMANENT & CONTRACT INFORMATION SECURITY / CYBER SECURITY JOBS

If you do not find anything suitable, please do not hesitate to send us your CV regardless, using the button below, and we will be in touch with other exciting opportunities. We are always working on new, exciting Cyber Security & Risk roles, so keep an eye on this page for regular updates!

Working across business functions conducting risk assessments and monitoring business systems to identify potential threats. Mitigating potential risk and proposing appropriate solutions. Day-to-day working on identifying fraudulent transactions and patterns, preparing reports for risk management.
My Client is looking for a highly competent OT Cyber Security Manager to join their Clients globally established Cyber Security Specialist Team, based in Manchester. By establishing and maintaining policies and practises for governance, risk assessment, vulnerability management, incident response, and conducting investigations into cyber security incidents, you will ensure the NIS Directive is adhered to. The role involves managing Cyber Security Incidents in real time and identifying attack pathways and related vulnerabilities to safeguard operational technology systems.
An exciting Network Security Engineer position has been mandated to Secure Recruitment by a nationally recognised Blue Chip Client based out of the South Manchester Region as they grow & develop their Security Function. This is a hands-on technical position, requiring a detailed understanding of evolving Security Threats & Trends. You’ll have the technical ability to Implement, Configure Existing Toolsets and Implement New Security Solutions.
Development & Management of Security Consulting Team in the field of OT / IoT Security. As a leader you are able to influence by serving our customers as thought leaders, support them in shaping their strategy as the market leader in the field of security and, in particular, to expand OT Security.
Our Client is an Award Winning Data Science based organisation now looking for Information Security Manager to work alongside the Head of Information / Cyber Security and Cyber Security Team

OUR FEEDBACK

WHAT OUR CLIENTS SAY ABOUT US

Our expert knowledge of our niche market, precision search techniques and our rigorous project management process enable us to quickly identify and adapt to the fast, ever changing and complex needs of our clients to achieve unparalleled accuracy and satisfactory solutions.