Vulnerability Assessment Jobs in the South West

8 Vulnerability Assessment Jobs in the South West

Local Operations Security Expert

Bristol, England, United Kingdom
AXA
x) in the local Operations Security department, you will focus on various infor-mation security activities with the following main responsibilities: • Operate and maintain vulnerability management and policy compliance scanning tool • Perform and improve vulnerability management processes as well as ensure remediation and mitigation actions are appropriately implemented … Policy & Standards; Information Security Strategy; Innovation & Business Improvement; Information Security Awareness and Training; Legal & Regulatory Environment; Third Party Man-agement • Information Risk Management: Risk Assessment; Risk Management • Implementing Secure Systems: Security Architecture; Secure Development • Information Assurance Methodologies and Testing • Operational Security Management: Secure Operations Management; Secure Operations & Service Delivery … Vulnerability Assessment • Incident Management: Incident Management; Investigation; Forensics • Computer Security Information Response Team • Cyber Threat Management • Audit, Assurance & Review: Audit & Review • Business Continuity Management Skills/abilities • Strong interpersonal and communication skills; able to deal effectively with diverse cultures, skill sets and per-sonalities, works effectively as a more »
Posted:

Cyber Security & Vulnerability Researchers

Gloucestershire, England, United Kingdom
Evolution
and Infrastructure, harnessing the latest technologies and deploying new ones to do so. The focus is on a wide variety devices, platforms and technologies. Vulnerability Research or development experience with mobile (Android, IOS), firmware, Linux, IoT and Windows is useful but most important is a willingness to learn as … projects require you to hold a valid and transferable UKIC DV clearance. A Cyber Security Researcher has broad skills which generally involve: Exploratory Research. Vulnerability & Technical Research. Experimental Development. Researchers undertaking exploratory research are expected to: An interest and aptitude for Vulnerability Research, Reverse Engineering, and Exploit Development. … problem. Develop, assess and prioritize prototype and simulated capabilities. Provide domain knowledge for technical analysis, experimental development and subsequent engineering. Have experience of advanced vulnerability assessment techniques such as fuzzing and code injection. Familiarity of tools like Wireshark, TCPDump, Scapy, BurpSuite Learning to use tools like Ghidra, IDA more »
Posted:

Information Technology Security Analyst

Weymouth, England, United Kingdom
Hybrid / WFH Options
Cogito
and fine tune existing network & security infrastructure: Endpoint Security, Next Generation Firewall, encryption, email and network proxy gateways, Microsoft 365, DLP etc. comprehensive reports, assessment-based findings, outcomes, and propositions for further system security enhancement. relevant projects, initiatives, and security activities such as the security awareness program and security … emerging technologies. Good problem solving and analytical skills. in security architecture, security solution, security project implementation, security operation, security education, network penetration testing, application vulnerability assessments, risk analysis and compliance testing. driven, with a continuous improvement mind-set acumen. A proven track record as an Information Security Analyst, contributing more »
Posted:

Senior Web Developer

Plymouth, England, United Kingdom
Shift
and performance Implement and maintain automated testing frameworks, continuous integration, and deployment pipelines Ensure web applications are secure by following security best practices, conducting vulnerability assessments, and implementing appropriate security measures Research and evaluate new technologies, frameworks, and development tools to improve development processes and enhance application capabilities Participate more »
Posted:

Hardware Penetration tester

Gloucestershire, England, United Kingdom
Locke and McCloud
in at least one mainstream programming language (Java, .NET, C or C++) Hardware/embedded system hacking Reverse engineering and source code review experience Vulnerability assessment and penetration testing experience Ability to work independently under deadline Rigorous attention to detail and strong analytic skills So if this role more »
Posted:

Vulnerability Engineer

Cheltenham, England, United Kingdom
Salus Cyber
one day per week in Stevenage and passing Security Clearance. Key Responsibilities · Manage vulnerabilities within the organisation's systems and networks, including performing regular vulnerability assessments and remediation. · Work with clients in managing vulnerabilities, undertaking assessments, and assisting with remediation. · Collaborate with the IT Department to ensure that all … date with security patches and updates. · Maintain documentation related to vulnerabilities, compliance, and technical support. · Work on projects internally or for customers related to vulnerability management. · Ensure that all IT processes, policies, and systems meet industry standards and comply with relevant regulations (e.g., GDPR, HIPAA). · Maintain current knowledge … clients and internal staff when required. · Able to pass UKSV SC Qualifications  · Strong knowledge of cybersecurity principles and best practices, with a focus on vulnerability management. · Experience in managing and remediating vulnerabilities across a wide range of technologies (Windows/Linux Desktop & Server) · Proficient in implementing and managing security more »
Posted:

AWS Security Engineer

Bristol, Avon, South West, United Kingdom
Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
Employment Type: Permanent
Salary: £55,000
Posted:

Cyber Security Analyst

Somerset, United Kingdom
Proactive Appointments
a week. You will have OT/SCADA experience. In addition, you will have:- Experience in management and development of reports and dashboards. Conducted vulnerability assessments and resolved security issues. Knowledge of Upgrades, Performance tuning and integration Provide subject matter expertise to NGED in relation to cyber risks and … threats. Threat Monitoring – Training – Threat Assessment Any Cyber qualifications are highly desirable, such as OSCP, CISSP, CCNA Security etc. If this could be your next Cyber contract role, please forward your cv in the first instance Due to the volume of applications received for positions, it will not be more »
Employment Type: Contract
Posted:
Vulnerability Assessment
the South West
25th Percentile
£61,250
Median
£62,500
75th Percentile
£64,063
90th Percentile
£64,625