of sensitive data. This is a contract position offering a competitive daily rate and the opportunity to work remotely. Key Responsibilities Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetration testing to identify … potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams to address vulnerabilities and implement security controls. Maintain up-to-date knowledge of emerging security threats and industry best practices. Participate in incident response and provide guidance in the … event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerabilityassessment, penetration testing, and remediation. Strong knowledge of vulnerability scanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as OWASP, NIST, and CVSS. Ability to analyze more »
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
West Norwood, England, United Kingdom Hybrid / WFH Options
Haleon
architectures, network protocols, industrial protocols, Active Directory, Backup processes, virtualization of applications and other general IT knowledge. Fundamental knowledge in IT-Security threat modelling, vulnerability assessments and pen-testing. Experienced in the use of tools for incident investigations, simulation, and forensics - GxP regulations. Ability to present technical design proposals more »
San Antonio, Texas, United States Hybrid / WFH Options
Leidos
C2E members and teams, delegated authorizing officials and other government security representatives. Adherence to all aspects of the Information Assurance (IA) program, Preparation of Assessment and Authorization (A&A) documents, procedures, and policies to ensure the organization is secure. A Hybrid work plan is in place and the mission … related experience. DoD 8570 IAT-II or above Knowledge of various security concepts: enterprise cloud architecture, infrastructure security and compliance, data encryption, continuous monitoring, vulnerabilityassessment, security control validation, etc. Supports secure systems operations and maintenance Effectively communicate, conduct meetings, and brief executive leadership, key stakeholders and customers more »
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
processes and adhering to best practices. Knowledge of penetration testing methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerabilityassessment tools. Extensive switching, routing and firewall experience. Experience in producing implementation documents (e.g. new office setup). Extensive VPN and Global network more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerabilityassessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
Seattle, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Tacoma, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Redmond, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
the organisation’s security stance across on-premises and cloud environments. Monitor and respond to security incidents. Maintain Cyber Security certifications and conduct regular vulnerability assessments. Conduct Phishing tests and respond to breaches promptly. Ensure all assets and infrastructure are up-to-date with patches. Provide security awareness training more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers to more »
and implement a comprehensive pen testing strategy for Group business and schedule of pen testing activities. Conduct Pen Tests and output risk assessments and vulnerability assessments to identify potential weaknesses in the organisation's systems, processes, infrastructure, supply chain and employee susceptibility to social engineering techniques. Collaborate with internal more »
Weymouth, England, United Kingdom Hybrid / WFH Options
Cogito
and fine tune existing network & security infrastructure: Endpoint Security, Next Generation Firewall, encryption, email and network proxy gateways, Microsoft 365, DLP etc. comprehensive reports, assessment-based findings, outcomes, and propositions for further system security enhancement. relevant projects, initiatives, and security activities such as the security awareness program and security … emerging technologies. Good problem solving and analytical skills. in security architecture, security solution, security project implementation, security operation, security education, network penetration testing, application vulnerability assessments, risk analysis and compliance testing. driven, with a continuous improvement mind-set acumen. A proven track record as an Information Security Analyst, contributing more »
Stafford, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Viqu Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Experience: Bonus points if you have experience with: Experience creating deployment pipelines with ArgoCD Technical exposure to Containerization, Kubernetes, Helm, Kibana, Elasticsearch, Grafana Security vulnerabilityassessment and resolution The Benefits: Joining our team comes with a host of benefits, including: Flexible working arrangements (fully remote or flexible hybrid more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerability management and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and GDPR. more »