standards and regulations Exception Management: Identify, document, submit and track instances where the implementation of security patches or configuration controls needs to be delayed for business or technical reasons Risk Assessment: evaluate potential risks and impacts of granting a security exception, considering immediate needs and long-term implications Exception Renewal: periodically review active exceptions to determine if they are … limited to, secure configuration management, data protection, security monitoring, incident response, patch management, governance, enterprise security strategies and architecture Understanding of security vulnerabilities, exploits, and mitigation techniques Knowledge of riskanalysis, vulnerability assessment methodologies, and security baselines Clear understanding of various operating systems and versions, secure configuration and build images Experience with automation, scripting, and orchestration (Python, PowerShell More ❯
Offered: Full-time, Permanent, Onsite working. Working Hours/Shifts: 40 hours per week, Monday to Friday. What does this role involve? This role is responsible for network security analysis, monitoring and incident response, as well as maintenance and configuration of network security tools. Security Analysts will work with the latest technologies to detect, analyse, and limit intrusions and … in a fast-paced environment. Demonstrable Experience in implementing security in cloud platforms (M365, Defender/Endpoint/Identity, Conditional Access, etc). An understanding of approaches of: ISMS, riskanalysis, the CIA triad, attack vectors including social engineering. Strong understanding of Cyber Security controls and Security concepts. Cyber/Cloud Security certification (e.g. AZ-500, SC More ❯
coding, design reviews, and architecture assessments. Lead the implementation of DevSecOps practices, integrating security into CI/CD pipelines. Identify and remediate application-level vulnerabilities through static/dynamic analysis, manual code review, and security testing. Collaborate with engineering and platform teams to secure APIs, microservices, and containerized workloads. Evaluate and implement security tools for secure code analysis … in application security architecture. Deep knowledge of OWASP Top 10, SANS CWE Top 25, and secure coding best practices. Familiarity with threat modelling methodologies such as STRIDE and architectural risk analysis. Hands-on experience with tools such as SAST/DAST/IAST, Snyk, SonarQube, Burp Suite, Veracode, or similar. Strong understanding of cloud platforms) and modern development architectures More ❯
to lead and influence architecture direction. Key Responsibilities Expertly manages the priorities, value and time to support the platform to achieve measurable impact to business outcomes Conducts stakeholder and riskanalysis along with problem solving with the dedicated platform consultant as high priority initiatives arise and critical decisions need to be made Influences Discovery and Framing sessions across More ❯