Nottingham, Nottinghamshire, England, United Kingdom Hybrid / WFH Options
Digital Waffle
response plans, ensuring continuous improvements Integrate security practices seamlessly into the DevOps pipeline Manage and optimise monitoring tools to provide real-time threat visibility Carry out regular threat and vulnerability assessments, applying effective remediation strategies Coach and mentor colleagues, keeping the team ahead of evolving risks and technologies What you bring: Significant experience in security operations across both cloud More ❯
Lincoln, Lincolnshire, East Midlands, United Kingdom
MASS Consultants
Deliver Cyber Essentials and Cyber Essentials Plus assessments to clients Strengthen our internal security posture and processes Provide expert guidance on large, customer-facing projects Support penetration testing and vulnerability assessments, building real-world cyber skills The invaluable experience youll bring, to help us achieve more Essential: Around 3 years experience in an IT role Familiarity with operating systems More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
UKRI
organisation to identify, assess, and mitigate risks, ensuring security policies and processes align with organisational objectives and regulatory requirements. Advise stakeholders and implement effective security solutions, providing oversight for vulnerability assessments, remediation activities, and technical control evaluations. Promote a culture of security by participating in awareness programs, supporting internal and external audits, and assisting in the development of policy … standards, and procedures. Lead the collection, analysis, and presentation of InfoSec performance metrics, and prepare briefings for senior leaders on studies and plans. Analyse data from security assessment tools and systems, identify process inefficiencies, and contribute innovative solutions to improve security and efficiency across projects and initiatives Personal Specification: The below criteria will be scored during Shortlisting (S), Interview … I). Essential A professional certification (e.g., CISM, CISSP, CompTIA Security+, CCSP or AWS certification). Degree in a related subject or relevant comparable education. Solid experience with risk assessment methodologies and vulnerability management processes, including relevant tooling. (S&I) Excellent analytical, problem-solving, and decision-making skills, with strong attention to detail. (I) Proficient in communicating complex More ❯