Alerts Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
Alerts – Handle security alerts and inquiries, providing expert guidance. Cyber Security Awareness – Promote a strong security culture through policies, best practices, and training. Risk & Vulnerability Management – Perform vulnerability scans, risk assessments, and maintain security documentation. Disaster Recovery – Test and refine disaster recovery plans to enhance business resilience. Compliance … Solutions – including threat intelligence, incident response, and disaster recovery. Strong knowledge of Cyber Essentials, ISO 27001, GDPR, and other data protection frameworks. Experience in vulnerabilityscanning, risk management, and security documentation. A proactive approach to identifying and mitigating cyber risks across IT systems and applications. Role Details: Location More ❯
an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetration testing, vulnerability assessment, managed security, and compliance . Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them resilient and … Security Automation & Infrastructure as Code (IaC) Automate security policies and compliance enforcement using Python, Terraform, Ansible, or CloudFormation . Develop security automation scripts for vulnerabilityscanning and patch management . Collaboration & Knowledge Sharing Provide guidance and best practices to internal teams on cloud security. Work closely with developers More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess … Keywords: Information Security Consultant, IT Security Consultant, Cybersecurity Specialist, Microsoft O365 Security, Enterprise Security Jobs, Information Security Leeds, IT Risk Management, Security Incident Response, Vulnerability Management, ISO 27001, GDPR Compliance, Security Awareness, Disaster Recovery and Business Continuity. More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess More ❯
Cyber Essentials, GDPR, and Data Protection Act. Experience with Microsoft O365 Security solutions and network security operations. Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Knowledge of security auditing and security incident response processes. Experience with event and log analysis to monitor and assess More ❯
standards including Cyber Essentials, ISO 27001, 27002 etc. Data Protection Act and the General Data Protection Regulation Microsoft O365 Security solutions; Networking; Security operations; Vulnerability Management Security Auditing Good understanding of security testing principles, including experience of vulnerabilityscanning, identifying, resolving, and reporting risks Experience of formal More ❯
over 1.5 million heat pump installs happening every month making our proposition leading edge with significant growth potential. Our SaaS platform utilises cutting edge scanning technology that is operating system agnostic, using these methods Heatly is redefining how technology is used to survey and create building digital twins. We … process: Implement security checks and controls at every stage of the pipeline to ensure secure software delivery. Use tools to perform static code analysis, vulnerabilityscanning, and compliance checks. Agile Development: Participate in agile ceremonies: Engage in sprint planning, daily stand-ups, and retrospectives to ensure effective and More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web More ❯
Greater Leeds Area, United Kingdom Hybrid / WFH Options
AppCheck Ltd
the art of new business generation, objection handling, solution selling and SaaS sales. AppCheck Company & Product AppCheck is a leading enterprise security software provider (vulnerabilityscanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability to scan their own web More ❯
you will need: Windows Server 2003 to 2022 Veeam Backup and Replication Microsoft Active Directory Group Policy Windows Server Update Services Kaseya VSA Qualys Vulnerability Scanner Documentation writing More ❯