Company description: We are seeking a dynamic and motivated VulnerabilityManagement Lead to join our rapidly growing program. The ideal candidate will blend cybersecurity expertise with technical analytical skills to support diverse operational needs. The VulnerabilityManagement Lead will play a crucial role in tracking and managing the identification, assessment, and remediation of security vuln click More ❯
experience using IBM Rational Developer. A solid understanding of software design principles, good analytical and problem-solving capability, strong communication skills and a meticulous approach to detail and time management are also essential. Experience of Agile delivery environments, a willingness to continually improve engineering outcomes, and a degree in computer science or a related field will be advantageous. Additional … exposure to Citrix server administration or vulnerabilitymanagement would be beneficial. This is a rare chance to join an organisation at the start of a major technological evolution, contributing directly to the redesign of systems, processes and services that will define the future of banking for its customers. For an RPG Developer who wants to be part of More ❯
implement, and maintain information security policies, procedures, and guidelines. - Conduct regular security audits and assessments to identify vulnerabilities and ensure compliance with industry standards (e.g., ISO 27001). - SIEM & Vulnerability Management. - Monitor and respond to security incidents, conducting investigations and implementing corrective actions. - Collaborate with IT and other departments to ensure the security of network infrastructure and data. - Manage … risk assessments and vulnerability assessments to identify potential security threats. - Oversee the implementation of security measures such as firewalls, intrusion detection systems, and data encryption technologies. - Provide training and guidance to staff on information security best practices. - Stay updated on the latest cybersecurity trends and technologies. **Qualifications:** - Bachelor's degree in Information Security, Computer Science, or a related field. … Professional certifications such as CISSP, CISM, or ISO 27001 Lead Auditor. - Proven experience in information security management and conducting security audits. - Strong knowledge of information security frameworks and standards. - Excellent analytical and problem-solving skills. - Strong communication and interpersonal skills. **Preferred Qualifications:** - Experience with regulatory compliance requirements such as GDPR, HIPAA, or SOX. - Familiarity with security tools and technologies More ❯
City of London, London, United Kingdom Hybrid/Remote Options
Randstad Digital
VMware environments. Troubleshoot and resolve system, platform, and network issues with minimal supervision. Apply knowledge of networking technologies to support infrastructure needs. Implement and maintain cybersecurity best practices and vulnerabilitymanagement processes. Utilize Python, Bash, and APIs for scripting, automation, and integrations. Continuously challenge and improve existing processes, driving automation and operational excellence. Collaborate effectively with cross-functional … Linux (RHEL) administration. Proven expertise with Red Hat Satellite installation, configuration, and management. Hands-on experience with Ansible/AAP and Infrastructure as Code practices. Practical knowledge of VMware management and upgrades. Solid understanding of networking fundamentals and cybersecurity principles. Scripting experience with Python and Bash; familiarity with working via APIs. Excellent problem-solving abilities and ownership mindset. Strong More ❯
security practices into our DevOps pipelines Requirements Design, implement, and maintaining secure CI/CD pipelines. Integrate security tools and practices into DevOps workflows (e.g., SAST, DAST, SCA, secrets management). Collaborate with development, operations, and security teams to implement and ensure secure coding and deployment practices. Advise on threat modelling, risk assessments, and vulnerability management. Provide expert More ❯