IT Infrastructure Auditors
Found in: Appcast UK C C2 - 2 weeks ago
We are hiring for IT Infrastructure Auditors / Consultant
Location: Cheltenham/Corsham/Eastleigh/Farnborough, UK - Hybrid Working
Must SC Clearance
- Strong expertise in security assessment, compliance audits, risk management, process improvement, and data integrity
- Identifying and analyzing vulnerabilities in hardware, software, network configurations, and security policies.
- Evaluating the effectiveness of existing security controls and recommending improvements.
- Ensuring adherence to industry regulations and security standards relevant to the organization.
- Identifying gaps in compliance and recommending corrective actions.
- Analyzing the IT infrastructure for potential risks associated with security breaches, outages, and inefficiencies and Developing strategies to mitigate these risks.
- Assessing the efficiency of IT processes and identifying areas for improvement.
- Recommending changes to optimize resource utilization and streamline operations.
- Verifying the integrity of data storage and backup/recovery procedures.
- Ensuring data is protected from unauthorized access or corruption.
-
IT Infrastructure Auditors
Found in: Whatjobs ES C2 - 5 days ago
Corsham, United Kingdom GIOS Technology Full timeWe are hiring for IT Infrastructure Auditors / Consultant Location: Cheltenham/Corsham/Eastleigh/Farnborough, UK - Hybrid Working Must SC Clearance Strong expertise in security assessment, compliance audits, risk management, process improvement, and data integrity Identifying and analyzing vulnerabilities in hardware, software, network configurations,...
-
IT Infrastructure Auditors
Found in: Talent UK 2A C2 - 2 weeks ago
Corsham, United Kingdom GIOS Technology Full timeWe are hiring for IT Infrastructure Auditors / Consultant Location: Cheltenham/Corsham/Eastleigh/Farnborough, UK - Hybrid Working Must SC ClearanceStrong expertise in security assessment, compliance audits, risk management, process improvement, and data integrityIdentifying and analyzing vulnerabilities in hardware, software, network configurations, and...