cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯
and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security More ❯
Engineer will set technical and architectural direction. The IT Project Engineer will have first-class scoping and planning skills. The IT Project Engineer will host security consultations and conduct vulnerability assessments. The IT Project Engineer will oversee and direct Penetration Testing exercises. The IT Project Engineer will be familiar with Cyber Essentials, Microsoft Copilot and PCI-DSS. The IT More ❯
Asm Technologies Ltd, Windsor House, Gadbrook Business Centre, Northwich, England
A.S.M TECHNOLOGIES LTD
access controls and permissions with a focus on 'least privilege'. Infrastructure & Cyber Security: Assist in the routine maintenance and monitoring of network, server, and cloud infrastructure. Conduct regular vulnerability assessments and system patching to ensure all devices and software are secure and up-to-date. Actively support the Incident Response process by investigating security alerts and applying essential More ❯
pipelines for integration, development, and deployment. Implement and maintain monitoring systems. Maintain and enhance the team's cloud infrastructure. Promote and implement automation processes. Enhance security protocols by conducting vulnerability assessments and risk management to deploy cybersecurity measures. Technical Proficient in Terraform and AWS. Solid experience with CI/CD, ideally with GitLab CI and Jenkins. Extensive experience using More ❯
information governance and IT risk management strategy and plan.Provide expert cyber security advice to senior stakeholders and technical teams across the organisation.Work directly with key stakeholders to facilitate risk assessment and risk management processes. Collaborate with all departments within the Trust (and ICS) where necessary to identify and disseminate high-quality information that facilitates effective cyber and information security … management and improvement.Use advanced analytic tools (artificial intelligence) to determine emerging threat patterns and vulnerabilities. Scoping and delivery of penetration tests and ensure actions from vulnerability assessments are resolvedLead on audit and audit preparation relating to IT securityMaintaining compliance with various standards in place e.g. Data Security and Protection Toolkit, CareCERT, Cyber Essentials+, Network and Information Systems Regulations etc. More ❯