Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerability management platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In addition … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerabilityassessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
practices for cloud infrastructure. Ensure compliance with industry standards and regulations (e.g., GDPR, PCI DSS, relevant aviation regulations). Conduct regular security audits and vulnerability assessments. Performance Monitoring and Troubleshooting: Monitor system performance and identify potential bottlenecks. Troubleshoot and resolve infrastructure-related issues. Implement proactive monitoring and alerting systems. More ❯
you to explore opportunities with us and help us deliver exceptional results. Job Summary: The Associate Director will be responsible for supporting the identification, assessment, and mitigation of cybersecurity risks and vulnerabilities within the organization. This role involves assisting in the development and implementation of cybersecurity frameworks and procedures … cybersecurity risk management framework, including procedures and tools for identifying, assessing, monitoring, and reporting cybersecurity risks and vulnerabilities. Support the execution of risk assessments, vulnerability assessments, and penetration testing to identify potential cybersecurity risks and their impact on the organization. Provide dedicated security functions in accordance with the needs … 6+ years information security experience in a large and complex business environment 3+ years experience identifying and remediating application security risks as part of vulnerability assessments and remediation programs Strong knowledge of the development of application security assessment and code review methodologies. Strong knowledge of application security vulnerabilities More ❯