|
7 of 7 Security Auditing Jobs in South Wales
cardiff, United Kingdom Fruition Group
Security Analyst Remote (UK-based) Competitive daily rate, Outside IR35 6 months with chance of extension Why Apply? This is a unique opportunity to contribute to a large-scale uplift of security posture across a global organisation operating at enterprise scale. Following a refresh of security policies … aligned to NIST CSF v2.0, the company requires a strong Security Analyst to carry out a broad review of systems, infrastructure, and applications. This role will focus on identifying legacy security issues, performing gap analysis, and assessing how fit-for-purpose existing security controls are under the … updated standards. Key Responsibilities Perform end-to-end security control assessments across infrastructure, enterprise applications, SaaS platforms, and bespoke systems. Review current ("as-is") environments and conduct gap analyses against the organisation's new security control framework based on NIST CSF v2.0. Identify weaknesses or outdated practices and More ❯
newport, midlands, United Kingdom Fruition Group
Security Analyst Remote (UK-based) Competitive daily rate, Outside IR35 6 months with chance of extension Why Apply? This is a unique opportunity to contribute to a large-scale uplift of security posture across a global organisation operating at enterprise scale. Following a refresh of security policies … aligned to NIST CSF v2.0, the company requires a strong Security Analyst to carry out a broad review of systems, infrastructure, and applications. This role will focus on identifying legacy security issues, performing gap analysis, and assessing how fit-for-purpose existing security controls are under the … updated standards. Key Responsibilities Perform end-to-end security control assessments across infrastructure, enterprise applications, SaaS platforms, and bespoke systems. Review current ("as-is") environments and conduct gap analyses against the organisation's new security control framework based on NIST CSF v2.0. Identify weaknesses or outdated practices and More ❯
cardiff, United Kingdom CyberClan
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all … efforts to rebuild and restore compromised systems and networks, including Active Directory, Exchange, and cloud infrastructures, ensuring they are secure and fully operational Implement security measures and best practices to harden systems against future attacks, including configuring firewalls, VPNs, and group policies Liase with DFIR team and Sales to … vulnerabilities, and remediation techniques to continuously improve response strategies Maintain detailed records of remediation activities, configurations, and changes made during the recovery process for auditing and compliance purposes Identify long term requirements through solutions during the remediation process to be handed over to the Sales teams to pursue the More ❯
newport, midlands, United Kingdom CyberClan
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all … efforts to rebuild and restore compromised systems and networks, including Active Directory, Exchange, and cloud infrastructures, ensuring they are secure and fully operational Implement security measures and best practices to harden systems against future attacks, including configuring firewalls, VPNs, and group policies Liase with DFIR team and Sales to … vulnerabilities, and remediation techniques to continuously improve response strategies Maintain detailed records of remediation activities, configurations, and changes made during the recovery process for auditing and compliance purposes Identify long term requirements through solutions during the remediation process to be handed over to the Sales teams to pursue the More ❯
cardiff, United Kingdom CyberClan
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all … scalable and secure Research and recommend network hardware/software that fits best for CyberClan's clients Participate in planning and implementation of robust security configurations on Firewalls and other perimeter hardware Research and implement ways to optimize network performance. This includes looking for automation opportunities Identify long term … network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the IT and OT space Provide Level More ❯
newport, midlands, United Kingdom CyberClan
Summary/Objective Established in 2006, CyberClan’s carefully selected team of experts are capable of solving complex cyber security challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all … scalable and secure Research and recommend network hardware/software that fits best for CyberClan's clients Participate in planning and implementation of robust security configurations on Firewalls and other perimeter hardware Research and implement ways to optimize network performance. This includes looking for automation opportunities Identify long term … network hardware such as a Router, Switch, Access Points, etc. in both the IT and OT space of CyberClan clients Configure, install and maintain security firewalls and other security systems to maintain and continuously improve our clients’ security posture in the IT and OT space Provide Level More ❯
newport, wales, United Kingdom Hybrid / WFH Options Logiq
a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. Due to rapid growth in our Security Capability , we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations … can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and … context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and a holistic view of security that can guide clients to secure More ❯
|
|