Cardiff, Wales, United Kingdom Hybrid / WFH Options
JR United Kingdom
KPI-driven security reports and dashboards for internal stakeholders Experience needed: 1+ year in a SOC or similar cybersecurity role Hands-on experience with SIEM, IDS/IPS, and vulnerabilityscanning tools Knowledge of AWS, Linux, Windows, IAM (e.g. Okta), and firewalls Understanding of ISO27001, SOC2, GDPR, and third-party risk management Strong communication skills and the ability More ❯
for maximum uptime, performance and stability. This includes load/performance testing and addressing infrastructure issues. Security Management : Manage all aspects of server security, including patching, upgrades, penetration testing, vulnerabilityscanning and remediation, security protocols, and authentication (SSO - SAML and OAuth). User Support : Provide expert technical support, guidance, and training to end-users, resolving connectivity issues and More ❯
Client. Skills & Experience Required Intrusion Detection and Prevention Service (IDPS). Advanced Persistent Threat protection (APT). E-mail sandbox technology. Management of the Public Key Infrastructure (PKI) infrastructure. VulnerabilityScanning and remediation. Real-time metrics portal, as well as monthly and ad-hoc reporting. Threat Intelligence. Forensic capability. #J-18808-Ljbffr More ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
of policy, processes, and procedures to reduce the likelihood of a Cyber Security incident. As a member of the Digital Operations team at Hywel Dda UHB they will undertake vulnerabilityscanning and the monitoring of Cyber Security Systems. They will respond to Cyber Security incidents and provide advice and knowledge to support our Digital services as well as … statistical/analytical techniques and procedures Evidence of additional Continual Professional Development Good understanding of Cyber Security best practices, standards, certifications and terminology. Knowledge of Cyber Security monitoring and vulnerabilityscanning systems Desirable ITIL Foundation Experience Essential Relevant experience working in Cyber Security. Evidence of Cyber Security or other relevant work outside formal training or employment (voluntary, research … academia, social media etc.) Working with SIEM and Vulnerabilityscanning solutions. Delivery of training packages. Desirable Experience of Digital Services provision in a health care setting Delivery of training to technical and non-technical staff Report writing. Procedure development. Language Skills Desirable Welsh Speaker (Level 1) Disclosure and Barring Service Check This post is subject to the Rehabilitation More ❯
Cardiff, Wales, United Kingdom Hybrid / WFH Options
BBC Group and Public Services
practices (IAM, encryption, VPC configuration, audit logging) using AWS native services and third-party tools. Embed security throughout the software development lifecycle by integrating static and dynamic code analysis, vulnerabilityscanning, and policy-as-code tools into CI/CD pipelines—ensuring DevSecOps principles are applied from design to deployment. Promote a culture of continuous learning and knowledge More ❯