Threat & Vulnerability Manager London – Hybrid Salary: DoE Gresham Hunt is currently partnered with a leading financial services client in the search for an experienced VulnerabilityManagement professional for their London based team. This is an exciting opportunity to help drive the vulnerabilitymanagement programme as … years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and … other standards/frameworks relevant to application security andvulnerability management. Experience with cloud technologies, preferably Azure and AWS. Familiarity with security methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell, Ansible, Jenkins, etc. Hold relevant industry certifications such as CISSP, CISM, CRISC more »
The role: • Provide guidance on advanced engineering methods to safeguard the network from security threats associated with various architectures, including web, mobile, and client/server. • Evaluate the security measures of third-party systems and applications to ensure compliance with bank policies and standards, including authentication, authorization, and error handling. … Collaborate with teams across different regions to address technology and cybersecurity regulations not covered by the global framework. • Lead the implementation of security measures across different platforms by collaborating with technology infrastructure teams, demonstrating expertise and leadership in information and cybersecurity. • Investigate potential security incidents to determine their severity and … whether they constitute a breach. • Work with stakeholders to enhance the cyber program, including refining detection tools and improving access to data sources. • Serve as a point of contact for stakeholders during security incidents and investigations, including those outside the technology team. • Respond to regulatory inquiries regarding security incidents andmore »
Lead. This role will be responsible for establishing an Application Security function from the ground up, which will involve the implementation of tooling, processes and frameworks. As the first Application Security hire, you will work closely with Application, Platform, and Support teams, to embed a shift left culture within SDLC. … Responsibilities: Lead on application threatandvulnerabilitymanagement for prioritising and fixing vulnerabilities. Cultivate strong relationships with IT and Security stakeholders. Monitor application security tools and metrics against SLAs. Collaborate with the wider Security and development teams on deploying scanning tech. Partner with Security teams to assess and … mitigate application vulnerabilities. Coordinate with IT and Enterprise Security for deploying and maintaining scanning solutions. Requirements: Experience in building Application Security programmes. Previous hands-on experience as an AppSec Engineer, Software Security Engineer or Software Engineer will be advantageous. Experience in implementing SAST/DAST/SCA tooling. Knowledge of more »
be centred on ensuring security is delivered into a wide range of projects. There will be a focus on working closely with DevOps teams and embedding security throughout a software development life cycle. Responsibilities: Act as the main security point of contact & SME for required projects Manage security risk for … the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, andvulnerabilitymanagementand risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand Security assessment of … various components like Web apps, Containers, Platforms etc Reviewing security assessment reports and create a remediation pipeline Experience in web application security assessments like SAST, DAST etc. Act as the Security subject matter expert within Agile/waterfall project planning, development, and execution Obtain and review all required artefacts as more »
Company Overview: McDermott is a premier, fully-integrated provider of technology, engineering and construction solutions to the energy industry. For more than a century, customers have trusted McDermott to design and build end-to-end infrastructure and technology solutions—from the wellhead to the storage tank—to transport and transform … oil and gas into the products the world needs today. Job Overview: IT Corporate Functions – Senior IT Pillar Specialist is responsible for being a strategic partner with Finance to help deliver IT solutions/projects that meet business objectives. This specialist will also be responsible for facilitation of quality systems … support for finance end-to-end process including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threatandvulnerabilitymanagement (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs more »
Company Overview: McDermott is a premier, fully-integrated provider of technology, engineering and construction solutions to the energy industry. For more than a century, customers have trusted McDermott to design and build end-to-end infrastructure and technology solutions—from the wellhead to the storage tank—to transport and transform … oil and gas into the products the world needs today. Job Overview: IT Corporate Functions – Senior IT Pillar Specialist is responsible for being a strategic partner with Finance to help deliver IT solutions/projects that meet business objectives. This specialist will also be responsible for facilitation of quality systems … support for finance end-to-end process including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threatandvulnerabilitymanagement (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs more »
Company Overview: People power our future. That is why advancing a dynamic, inclusive environment, where everyone grows and thrives is critically important to us. Our ingenuity fuels daily life. Together, we’ve forged some of the most trusted partnerships across the energy value chain to make what was once just … an idea a reality: laying subsea infrastructure thousands of feet below sea level, installing offshore platforms hundreds of miles from shore, and using our expertise to design and build offshore wind infrastructure. For more than 100 years, we've been making the impossible possible. Today, we're driving the energy … of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber managementmore »
Company Overview: People power our future. That is why advancing a dynamic, inclusive environment, where everyone grows and thrives is critically important to us. Our ingenuity fuels daily life. Together, we’ve forged some of the most trusted partnerships across the energy value chain to make what was once just … an idea a reality: laying subsea infrastructure thousands of feet below sea level, installing offshore platforms hundreds of miles from shore, and using our expertise to design and build offshore wind infrastructure. For more than 100 years, we've been making the impossible possible. Today, we're driving the energy … of the brightest minds across 54 countries. Here, what you do matters Job Overview: As the local Cyber management presence, provide guidance and support for the area. Establish role as a local presence and focal point for business and IT contact. Create the relationships. As the local Cyber managementmore »
Threat & Vulnerability Manager London – Hybrid Salary: DoE Gresham Hunt is currently partnered with a leading financial services client in the search for an experienced VulnerabilityManagement professional for their London based team. This is an exciting opportunity to help drive the vulnerabilitymanagement programme as … years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetration testing frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS and … other standards/frameworks relevant to application security andvulnerability management. Experience with cloud technologies, preferably Azure and AWS. Familiarity with security methodologies: Attack and Defensive, Threat Hunting, etc. Scripting experience would be beneficial i.e. Python, Shell, Ansible, Jenkins, etc. Hold relevant industry certifications such as CISSP, CISM, CRISC more »
The role: • Provide guidance on advanced engineering methods to safeguard the network from security threats associated with various architectures, including web, mobile, and client/server. • Evaluate the security measures of third-party systems and applications to ensure compliance with bank policies and standards, including authentication, authorization, and error handling. … Collaborate with teams across different regions to address technology and cybersecurity regulations not covered by the global framework. • Lead the implementation of security measures across different platforms by collaborating with technology infrastructure teams, demonstrating expertise and leadership in information and cybersecurity. • Investigate potential security incidents to determine their severity and … whether they constitute a breach. • Work with stakeholders to enhance the cyber program, including refining detection tools and improving access to data sources. • Serve as a point of contact for stakeholders during security incidents and investigations, including those outside the technology team. • Respond to regulatory inquiries regarding security incidents andmore »
Lead. This role will be responsible for establishing an Application Security function from the ground up, which will involve the implementation of tooling, processes and frameworks. As the first Application Security hire, you will work closely with Application, Platform, and Support teams, to embed a shift left culture within SDLC. … Responsibilities: Lead on application threatandvulnerabilitymanagement for prioritising and fixing vulnerabilities. Cultivate strong relationships with IT and Security stakeholders. Monitor application security tools and metrics against SLAs. Collaborate with the wider Security and development teams on deploying scanning tech. Partner with Security teams to assess and … mitigate application vulnerabilities. Coordinate with IT and Enterprise Security for deploying and maintaining scanning solutions. Requirements: Experience in building Application Security programmes. Previous hands-on experience as an AppSec Engineer, Software Security Engineer or Software Engineer will be advantageous. Experience in implementing SAST/DAST/SCA tooling. Knowledge of more »
london (city of london), south east england, United Kingdom
Barclay Simpson
be centred on ensuring security is delivered into a wide range of projects. There will be a focus on working closely with DevOps teams and embedding security throughout a software development life cycle. Responsibilities: Act as the main security point of contact & SME for required projects Manage security risk for … the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, andvulnerabilitymanagementand risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand Security assessment of … various components like Web apps, Containers, Platforms etc Reviewing security assessment reports and create a remediation pipeline Experience in web application security assessments like SAST, DAST etc. Act as the Security subject matter expert within Agile/waterfall project planning, development, and execution Obtain and review all required artefacts as more »
Xpertise are working with a client in the Insurance industry who are searching for a talented ThreatandVulnerability Lead to join their team. Job Title: ThreatandVulnerability Lead Salary: £75,000 - £90,000 Location: 3 days a week in Central London office About the role: You … will work closely with the company's Information Technology and Security teams to assess the vulnerabilities and reduce the Cyber related risks. My client is looking for people with the following skillset: - Familiarity with vulnerability scanning and detection technologies. - Familiarity with MITRE ATT&CK framework - Excellent ability to present … information and results to the business - Pen testing experience Key responsibilities in this role will include: - This role will involve working closely with the Enterprise Security team - Great understanding of Threatandvulnerabilitymanagement practises - Working closely with, and reporting into the BISO If keen please apply more »
Job Title: SOC Manager Company Overview: Our client, a leading organization in the financial services sector, is seeking a dedicated and experienced SOC Manager to join their team. This pivotal role will contribute to safeguarding the organization's digital assets and infrastructure from cybersecurity threats, ensuring a robust security posture … and effective incident response. Starting ASAP, paying up to £90,000 per annum. Role Overview: As the SOC Manager, you will be responsible for providing strategic leadership, technical expertise, and operational oversight to the Security Operations Center (SOC) team. Your role will involve managing both external and internal SOC personnel … overseeing security monitoring and analysis, incident response, threat intelligence, andvulnerabilitymanagement activities. Key Responsibilities: Act as the subject matter expert on SOC matters for the organization. Manage the external SOC team and a small internal team, ensuring alignment with organizational security objectives. Review output from the external more »