Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
manage the information security incident response plan, including detection, analysis, containment, eradication, recovery, and post-incident review, supporting timely reporting to relevant authorities (eg ICO, NHS England) where required. Vulnerability management and testing: Own, support and oversee programs for vulnerabilityscanning, penetration testing, and security audits of applications and infrastructure to identify and address security weaknesses. Security … technical stakeholders, including senior leadership, product teams, and external partners. Team leadership & mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerabilityscanning, penetration testing, and security audits. Desirable: Cloud Security Expertise: Experience securing cloud-native applications and infrastructure More ❯
Bath, Somerset, United Kingdom Hybrid / WFH Options
Mayden
manage the information security incident response plan, including detection, analysis, containment, eradication, recovery, and post-incident review, supporting timely reporting to relevant authorities (eg ICO, NHS England) where required. Vulnerability management and testing: Own, support and oversee programs for vulnerabilityscanning, penetration testing, and security audits of applications and infrastructure to identify and address security weaknesses. Security … technical stakeholders, including senior leadership, product teams, and external partners. Team leadership & mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerabilityscanning, penetration testing, and security audits. Desirable: Cloud Security Expertise: Experience securing cloud-native applications and infrastructure More ❯
able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and Penetration Testing (e.g., reconnaissance, vulnerabilityscanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security best practices) Application Security More ❯