Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
security incident response plan, including detection, analysis, containment, eradication, recovery, and post-incident review, supporting timely reporting to relevant authorities (eg ICO, NHS England) where required. Vulnerability management and testing: Own, support and oversee programs for vulnerability scanning, penetrationtesting, and security audits of applications and infrastructure to identify and address security weaknesses. Security awareness and training … mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerability scanning, penetrationtesting, and security audits. Desirable: Cloud Security Expertise: Experience securing cloud-native applications and infrastructure (eg AWS, GCP), including knowledge of cloud security best practices and compliance frameworks More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
security incident response plan, including detection, analysis, containment, eradication, recovery, and post-incident review, supporting timely reporting to relevant authorities (eg ICO, NHS England) where required. Vulnerability management and testing: Own, support and oversee programs for vulnerability scanning, penetrationtesting, and security audits of applications and infrastructure to identify and address security weaknesses. Security awareness and training … mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerability scanning, penetrationtesting, and security audits. Desirable: Cloud Security Expertise: Experience securing cloud-native applications and infrastructure (eg AWS, GCP), including knowledge of cloud security best practices and compliance frameworks More ❯
or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and PenetrationTesting (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security More ❯