4 of 4 Vulnerability Assessment Jobs in Berkshire

Tech lead - vulnerability management

Hiring Organisation
Colt Technology Services
Location
Slough, Berkshire, UK
Employment Type
Full-time
focus on delivering their business goals instead of the underlying infrastructure. Wy we need this role We are seeking a dynamic and motivated Vulnerability Management Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. … Vulnerability Management Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vulnerabilities across the organization's infrastructure and monitoring and reporting on vulnerability and other security compliance status. The role requires collaboration with various partners to ensure that vulnerability ...

Penetration Tester

Hiring Organisation
NSD
Location
Wokingham, Berkshire, South East, United Kingdom
Employment Type
Permanent
Salary
£420 - £470 per day
conjunction with this vacancy only. Key Skills Penetration Testing, CTM, CHECK, CREST, CyberScheme, BurpSuite, Metasploit, Nmap, ITHC, Cloud Security, AWS, Azure, Windows, Linux, Vulnerability Assessment, Security Consultancy, ISO27001 ...

IT Apprentice

Hiring Organisation
A.S.M TECHNOLOGIES LTD
Location
WINDSOR HOUSE, GADBROOK BUSINESS CENTRE, RUDHEATH, NORTHWICH, England
Employment Type
Advanced Apprenticeship
Salary
£14,526.20 a year
controls and permissions with a focus on 'least privilege' Assist in the routine maintenance and monitoring of network, server, and cloud infrastructure Conduct regular vulnerability assessments and system patching to ensure all devices and software are secure and up to date Actively support the Incident Response process by investigating ...

IT Apprentice

Hiring Organisation
A.S.M TECHNOLOGIES LTD
Location
WINDSOR HOUSE, GADBROOK BUSINESS CENTRE, RUDHEATH, NORTHWICH, England
Employment Type
Advanced Apprenticeship
Salary
£14,918 a year
applying ‘least privilege’ principles Assist with the maintenance and monitoring of network, server, and cloud infrastructure, learning how modern IT environments operate Perform vulnerability assessments, security updates, and routine patching to keep systems secure and compliant Participate in the Incident Response process by investigating alerts and applying key security ...