industrial systems. Responsibilities: Conduct security assessments and risk analyses of operational technology (OT) systems, including SCADA, PLCs, and industrial control systems (ICS). Perform vulnerability assessments and penetration testing on OT networks and devices to identify security weaknesses and potential attack vectors. Monitor OT environments for security incidents, analyze … in cybersecurity, with a focus on operational technology (OT) environments. Solid understanding of OT systems, including SCADA, PLCs, DCS, and industrial networks. Experience conducting vulnerability assessments, penetration testing, and security audits in OT environments. Familiarity with cybersecurity standards and regulations, such as NIST, IEC 62443, and ISA/IEC more »
design. Involved in a wide range of computer security issues including architectures, firewalls, electronic data traffic, and network access. Uses encryption technology, penetration and vulnerability analysis of various security technologies, and information technology security research. Prepares security reports for government agencies. Performs a wide range of computer security duties … including architectures, firewalls, electronic data traffic, and network access. Participates in the certification and accreditation processes; performs technical vulnerability assessments of computer security. Provides business continuity and disaster recovery support. Engages in intrusion detection and prevention; provides incident reporting and response support. Conducts ongoing monitoring of computer security requirements … system security plans and risk mitigation plans. Trains clients in proper computer security measures and prevention. Specifically, this position will: Provide support for all vulnerability and compliance scan tool applications and modules (pre-built and customized). Develop workflows and customize, implement, and maintain the aforementioned applications. Develop and more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerabilityassessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
Assist in the deployment and configuration of security technologies, such as firewalls, intrusion detection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. Participate in incident response activities, including monitoring and analysis of security events. Stay more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
day one you will bring: experience in a penetration testing or security consulting role, a minimum of 3 years. in delivering penetration tests and vulnerability assessments for applications, network infrastructure and cloud services. professional certification is highly desirable, such as OSCP or CREST CRT. with commercial security tools such more »
and performance Implement and maintain automated testing frameworks, continuous integration, and deployment pipelines Ensure web applications are secure by following security best practices, conducting vulnerability assessments, and implementing appropriate security measures Research and evaluate new technologies, frameworks, and development tools to improve development processes and enhance application capabilities Participate more »
or creating new processes for improvement and minimizing wastage. Encouraging and building automated processes wherever possible. Identifying and deploying cybersecurity measures by continuously performing vulnerabilityassessment and risk management. Incidence management and root cause analysis. Coordination and communication within the team and with customers. Selecting and deploying appropriate more »
Greater London, England, United Kingdom Hybrid / WFH Options
Risk Crew
hybrid role for a Security Penetration Tester at Risk Crew. As a Security Penetration Tester, you will be responsible for conducting security assessments, performing vulnerability assessments and penetration testing, and identifying weaknesses in systems and network infrastructure. This role will be based in Greater London but will offer flexibility … problem-solving and analytical skills Excellent communication and teamwork skills Relevant certifications such as CISSP, CEH, OSCP, or similar Experience in conducting security assessments, vulnerability assessments, and penetration testing Understanding of security frameworks and standards (e.g., ISO 27001) Ability to adapt to changing technologies and threats Additional skills in more »
implement security design standards and frameworks Collaborate with engineering and product teams to incorporate security considerations into product design and development Conduct threat modelling, vulnerability assessments, and security code reviews to identify potential security issues Develop and maintain a secure software development lifecycle (SDLC) to ensure security is integrated … at every stage Educate and train engineering and product teams on security awareness and best practices Experience with threat modelling, risk assessment, and the development of mitigation strategies The Senior Product Security Engineer is a high-profile role with significant business and technology engagement. This a hybrid working role more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
Stafford, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Viqu Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
of coordination and communication. Security Clearance Required: Active/Current Top Secret clearance to be considered. Must be US Citizen. Primary Responsibilities Information Security Vulnerability Management Continuously research emerging threats to the environment in order to disseminate the information to all stakeholders, immediately assess the known environment for presence … of the vulnerability, and work with the NOSC and enterprise networking teams to proactively block exploitation within the DHS environment. Perform enterprise-wide network scans, agent scans, including credentialed scans of UNIX, Windows, Network devices, and VMware assets Develop and execute vulnerability/compliance scans through Tenable.SC interface … maintain scan templates based on asset types, repository, credentials, etc. in support of continuous scanning requirements for various FISMA systems Perform security compliance and vulnerability assessments, specifically developing and applying STIG or CIS baselines for various operating systems, including Windows or RHEL and CentOS Maintain, optimize, and troubleshoot scan more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
x) in the local Operations Security department, you will focus on various infor-mation security activities with the following main responsibilities: • Operate and maintain vulnerability management and policy compliance scanning tool • Perform and improve vulnerability management processes as well as ensure remediation and mitigation actions are appropriately implemented … Policy & Standards; Information Security Strategy; Innovation & Business Improvement; Information Security Awareness and Training; Legal & Regulatory Environment; Third Party Man-agement • Information Risk Management: Risk Assessment; Risk Management • Implementing Secure Systems: Security Architecture; Secure Development • Information Assurance Methodologies and Testing • Operational Security Management: Secure Operations Management; Secure Operations & Service Delivery … VulnerabilityAssessment • Incident Management: Incident Management; Investigation; Forensics • Computer Security Information Response Team • Cyber Threat Management • Audit, Assurance & Review: Audit & Review • Business Continuity Management Skills/abilities • Strong interpersonal and communication skills; able to deal effectively with diverse cultures, skill sets and per-sonalities, works effectively as a more »
mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate with … IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Persistent Systems
the work with the offshore team. Candidate should have effective communication skills with excellent customer handling capabilities. Experience required: 1. Experience on Infrastructure & Application Vulnerability Assessments and Management. Validate and triage identified vulnerabilities. 2. Experience in vulnerability remediation. 3. Hands-on experience on SAST, DAST, SCA, Container scanning … issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent development with quarterly assessment cycles and company-sponsored certifications. Working with cutting-edge technologies. Engagement initiatives such as project parties, flexible work hours, Persistent Business Run. Private medical and more »
with a broad knowledge of Security Operations, Access Management, and Policy Development. Understanding of security frameworks such as NIST or ISO 27001 Knowledge of vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Analytical mindset and problem-solving abilities to assess security risks and propose appropriate mitigation more »
Security Risk Assessment Specialist - Permanent - Basel/Barcelona Robson Bale are looking for a Security Risk Assessment Specialist to come on board for a permanent opportunity in either Basel or Barcelona Permanent role, excellent salary 1-2 days per week on site in Basel or Barcelona German language … skills would be useful but not mandatory Role: Proficient in conducting Security Business Impact Assessments, Threat and Vulnerability Assessments, and security controls assessments. Capable of assisting with policy and procedure design, with a focus on conducting assessments post-approval of Security BIA and Risk Management SOPs. Permanent role, excellent … salary 1-2 days per week on site in Basel or Barcelona German language skills would be useful but not mandatory Security Risk Assessment Specialist - Permanent - Basel/Barcelona more »
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerabilityassessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
My client is a leading and technology-driven company in the financial industry. I’m currently seeking a skilled Threat and Vulnerability Engineer to join their cybersecurity team. As a Threat and Vulnerability Engineer, you will play a crucial role in safeguarding our systems and data from potential … threats and vulnerabilities. To be successful in this role, you should have proven experience as a Threat and Vulnerability Engineer in a high performing environment or team and possess In-depth knowledge of threat landscape, vulnerabilityassessment, and penetration testing techniques. You will need to be skilled more »
processes and adhering to best practices. Knowledge of penetration testing methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerabilityassessment tools. Extensive switching, routing and firewall experience. Experience in producing implementation documents (e.g. new office setup). Extensive VPN and Global network more »
work, ensuring the security integrity of software applications throughout the development lifecycle. Responsibilities: - Design, implement, and maintain application security measures - Conduct code reviews and vulnerability assessments - Collaborate with development teams to integrate security practices - Develop and enforce application security policies and procedures - Stay abreast of emerging security threats and more »