with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and VulnerabilityAssessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and VulnerabilityAssessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and VulnerabilityAssessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
San Antonio, Texas, United States Hybrid / WFH Options
Leidos
C2E members and teams, delegated authorizing officials and other government security representatives. Adherence to all aspects of the Information Assurance (IA) program, Preparation of Assessment and Authorization (A&A) documents, procedures, and policies to ensure the organization is secure. A Hybrid work plan is in place and the mission … related experience. DoD 8570 IAT-II or above Knowledge of various security concepts: enterprise cloud architecture, infrastructure security and compliance, data encryption, continuous monitoring, vulnerabilityassessment, security control validation, etc. Supports secure systems operations and maintenance Effectively communicate, conduct meetings, and brief executive leadership, key stakeholders and customers more »
with a broad knowledge of Security Operations, Access Management, and Policy Development. Understanding of security frameworks such as NIST or ISO 27001 Knowledge of vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Analytical mindset and problem-solving abilities to assess security risks and propose appropriate mitigation more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerabilityassessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
Burton Upon Trent, England, United Kingdom Hybrid / WFH Options
Clinigen
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
Assist in the deployment and configuration of security technologies, such as firewalls, intrusion detection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. Participate in incident response activities, including monitoring and analysis of security events. Stay more »
environments and the seamless integration of new code into production. Security Compliance : Maintain and enforce security standards required by regulatory bodies; manage access controls, vulnerability assessments, and security audits. Performance Optimization : Optimize system configurations to manage load and latency to meet the demands of high-speed trading. Disaster Recovery more »
security compliance regulations and standards such as HIPAA, HITECH, PCI DSS and/or ISO27000 required. Excellent presentation and communication skills preferred. Experience with vulnerability assessments, risk analysis, contingency planning and auditing required. Vendor negotiation experience preferred. ADA ESSENTIAL FUNCTIONS: Hearing: within normal limits with or without use of more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
and coordination. Security Operations & Monitoring: Collaborate with the SOC to analyse and respond to security events. Regulatory Compliance: Ensure compliance through assessments and reporting. Vulnerability Management: Conduct vulnerability assessments and remediation (Qualys or similar vulnerability management tools). Incident Investigation & Forensics: Conduct forensic investigations following incidents to more »
and coordination. Security Operations & Monitoring: Collaborate with the SOC to analyse and respond to security events. Regulatory Compliance: Ensure compliance through assessments and reporting. Vulnerability Management: Conduct vulnerability assessments and remediation (Qualys or similar vulnerability management tools). Incident Investigation & Forensics: Conduct forensic investigations following incidents to more »
the MSSP's contacts through status tracking, informal comms, review sessions with the MSSP functionality to analyse value delivered, SLAs, enhancements, review control and vulnerability assessments to identify control weaknesses and assess remedial action. Regarding Incident management you will ensure that Incident information is shared with all relevant stakeholders more »
day one you will bring: experience in a penetration testing or security consulting role, a minimum of 3 years. in delivering penetration tests and vulnerability assessments for applications, network infrastructure and cloud services. professional certification is highly desirable, such as OSCP or CREST CRT. with commercial security tools such more »
Redmond, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Seattle, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Tacoma, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »