cyber threats. What You'll Do Design and implement secure software solutions, applying security-by-design principles and recognised standards (ISO 27001, NIST). Conduct threat modelling, code reviews, vulnerability assessments, and penetration tests to identify and mitigate risks. Respond to security incidents, perform root cause analysis, and enhance incident response capabilities and documentation. Collaborate with developers and clients … to embed secure coding practices and provide expert security guidance. Contribute to team development through mentoring, knowledge sharing, and continuous improvement initiatives. Contribute to security assurance procedures and vulnerability analysis across systems and networks. Assist with defence security assessment and authorisation processes. What You'll Bring Experience in Cyber Security Analysting, ideally within defence, government, or critical infrastructure … sectors Strong knowledge of secure software development, security protocols, and cyber security principles Skilled in using vulnerabilityassessment and penetration testing tools (e.g. Nessus, Burp Suite) Familiarity with security frameworks (ISM, PSPF, ISO 27001) and tools like SIEM, IDS/IPS, and threat intelligence platforms Excellent problem-solving, communication, and collaboration skills, with strong attention to detail and More ❯
IT systems and networks are secure from threats and vulnerabilities Implement and manage security measures, such as firewalls, antivirus software, and intrusion detection systems Conduct regular security audits and vulnerability assessments Work within the parameters of ISO 27001, taking guidance from the compliance team as needed System Monitoring Monitor system performance and identify areas for improvement Implement performance tuning More ❯
Business Unit: Cyber Security Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In … Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and social engineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises with the goal of More ❯
Perform system installations, configurations, and upgrades, adhering to best practices. Respond promptly to incidents, resolving issues within defined SLAs. Implement and manage system security measures, including patch management and vulnerability assessments. Collaborate with cross-functional teams to support infrastructure projects and deployments. Develop and maintain scripts to automate routine tasks and improve system efficiency. Document system configurations, procedures, and More ❯
Dundee, Angus, Scotland, United Kingdom Hybrid / WFH Options
Reed
assets within ATM infrastructure. Stay current with emerging security trends and integrate advanced technologies and strategies to prevent card fraud, system vulnerabilities and operational liabilities. Conduct comprehensive risk and vulnerability assessments of ATM systems and deliver data-driven solutions to senior management. Effectively prioritise the level of risk/vulnerabilities, define strategies and roadmaps to implement reactive and preventive More ❯
support project implementation aligned with company objectives, including continuous improvement of margin, customer satisfaction, schedule, working capital, and safety performance. The role involves providing cybersecurity, networking, secure architectures, solutions, vulnerability & risk assessments, and supporting client assignments and project teams. The candidate should have experience in identifying vulnerabilities & risks in networks, software systems, and data centers through ongoing scans, monitoring … of architectures, technologies, & procedures in client facilities. Design solutions that meet client requirements and implement security measures (e.g., antivirus, patch management, insider threat protection, incident response, compliance). Conduct vulnerability assessments & audits on client systems & network devices, considering OT sensitivities. Provide expertise in network design, implementation, & testing for automation & control systems. Identify & define network requirements for automation & control solutions. More ❯
skilled to lead the development and implementation of a cyber risk management programme. Key Responsibilities • Design and deliver a robust cyber security risk management framework. • Conduct regular risk and vulnerability assessments • Work collaboratively across departments to define risk tolerance and align with strategic objectives. • Analyse cyber security data to identify risks and recommend mitigation strategies. • Maintain comprehensive risk documentation … cyber security risk management role. • Strong understanding of cyber security frameworks and standards (ISO 27001, SOC2, NIST, GDPR). • Excellent analytical, communication, and stakeholder engagement skills. • Proficient in risk assessment tools and methodologies. • Professional certifications such as CRISC, CISM or CISSP are desirable. Bright Purple is an equal opportunities employer: we are proud to work with clients who share More ❯
skilled ?????????? ???????????????? ???????? ?????????????? to lead the development and implementation of a cyber risk management programme. Key Responsibilities Design and deliver a robust cyber security risk management framework. Conduct regular risk and vulnerability assessments Work collaboratively across departments to define risk tolerance and align with strategic objectives. Analyse cyber security data to identify risks and recommend mitigation strategies. Maintain comprehensive risk documentation … cyber security risk management role. Strong understanding of cyber security frameworks and standards (ISO 27001, SOC2, NIST, GDPR). Excellent analytical, communication, and stakeholder engagement skills. Proficient in risk assessment tools and methodologies. Professional certifications such as CRISC, CISM or CISSP are desirable. Bright Purple is an equal opportunities employer: we are proud to work with clients who share More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Bright Purple
Manager to lead the development and implementation of a cyber risk management programme. Key Responsibilities • Design and deliver a robust cyber security risk management framework. • Conduct regular risk and vulnerability assessments • Work collaboratively across departments to define risk tolerance and align with strategic objectives. • Analyse cyber security data to identify risks and recommend mitigation strategies. • Maintain comprehensive risk documentation … cyber security risk management role. • Strong understanding of cyber security frameworks and standards (ISO 27001, SOC2, NIST, GDPR). • Excellent analytical, communication, and stakeholder engagement skills. • Proficient in risk assessment tools and methodologies. • Professional certifications such as CRISC, CISM or CISSP are desirable. Bright Purple is an equal opportunities employer: we are proud to work with clients who share More ❯
In this role you’ll – Develop and implement a comprehensive cyber security risk management program to identify, assess and prioritise cyber threats and vulnerabilities. Conduct regular risk assessments and vulnerability assessments. Provide guidance to project teams to integrate risk management practices into the project life cycle. Collaborate with internal and external partners to enhance the organization's cyber resilience … You should have the following skills and experiences – Advanced certifications (CRISC, CISM, CISSP) are highly desirable. Proven experience in a cyber security risk management role, strong understanding of risk assessment methodologies. Experience with ServiceNow GRC is a plus. In-depth knowledge of cyber security principles, frameworks and best practices. Experience with risk assessment tools and methodologies. Familiarity with More ❯
Security Engineer will support project implementation aligned with company objectives, focusing on improving margins, customer satisfaction, schedules, working capital, and safety performance. Responsibilities include providing cybersecurity, networking, secure architectures, vulnerability and risk assessments, and supporting project teams and clients with technical solutions. Our Systems Integration (SI) team works with high-profile clients in the energy sector, delivering automation and … Key Objectives: Assess cybersecurity architecture robustness within customer facilities. Design and implement solutions to mitigate security risks, including antivirus, patch management, insider threat protection, incident response, and compliance. Conduct vulnerability assessments and audits on client systems and network devices, considering OT sensitivities. Provide expertise in network design, implementation, and testing for automation and control systems. Define network requirements supporting More ❯
in ensuring the security and integrity of the infrastructure, which includes the data centers, cloud environments, networks, and office/branch assets. This is an exciting opportunity to lead vulnerability assessments, drive remediation efforts, and enforce secure builds and configurations across our estate. Key Responsibilities: Lead the implementation of Infrastructure & Cloud security strategies, policies, controls, services, metrics, and compliance. … Oversee and support vulnerability management efforts across both on-premise and cloud environments. Contribute to the strategy, policy, controls, services, and metrics related to network security, including WAF, DDoS protection, and firewalls. Experience & Skills: Primary Expertise: Vulnerability management within infrastructure environments, with proven experience leading teams. Secondary Expertise: Knowledge and experience in network security, including firewalls, micro-segmentation More ❯