|
5 of 5 Permanent Computer Emergency Response Teams Jobs in Derbyshire
derby, midlands, United Kingdom CyberClan
of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with Proven defensive methodology. Our goal is to … Overview: We’re looking for a UK qualified lawyer with experience or strong interest in insurance law and claims handling. This role supports the CERT team with reviewing insurance policies, assisting with claims assessments, and contributing to breach response efforts. Ideal for someone with early in-house or … to manage the immediate impact of a security incident with timely, practical advice. The role involves close coordination with IT, legal, and other internal teams to ensure a swift and organized response Responsibilities of Role: Handle the intake of severe cyber events, including the coordination with breach More ❯
chesterfield, midlands, United Kingdom CyberClan
of experts are capable of solving complex cybersecurity challenges – keeping data secure and businesses running as usual. CyberClan’s Global Incident Response Teams are available 24/7/365 to leap into action, responding to all cyber-attacks with Proven defensive methodology. Our goal is to … Overview: We’re looking for a UK qualified lawyer with experience or strong interest in insurance law and claims handling. This role supports the CERT team with reviewing insurance policies, assisting with claims assessments, and contributing to breach response efforts. Ideal for someone with early in-house or … to manage the immediate impact of a security incident with timely, practical advice. The role involves close coordination with IT, legal, and other internal teams to ensure a swift and organized response Responsibilities of Role: Handle the intake of severe cyber events, including the coordination with breach More ❯
Derbyshire, UK EMBS Technology
experience of ARM based microcontrollers (e.g. STM-32). Experience of embedded debugging techniques (e.g. JTAG, ETM). Written code to specific standards (e.g. CERT C, MISRA). Applied software unit test automation and tools (e.g. LDRA, Parasoft etc). Familiarity with static analysis tools. Technical report writing. Desirable skills … C# development experience. Proficiency with scripting languages (Python, Perl, Bash, PowerShell). Computer network security and vulnerability analysis. Conversant with IP standards. Experience in a range of CPU/MPU’s with practical experience. Requirements capture. Appreciation of cryptographic algorithms. Please Note : Applicants must be able to obtain More ❯
derbyshire, midlands, United Kingdom EMBS Technology
experience of ARM based microcontrollers (e.g. STM-32). Experience of embedded debugging techniques (e.g. JTAG, ETM). Written code to specific standards (e.g. CERT C, MISRA). Applied software unit test automation and tools (e.g. LDRA, Parasoft etc). Familiarity with static analysis tools. Technical report writing. Desirable skills … C# development experience. Proficiency with scripting languages (Python, Perl, Bash, PowerShell). Computer network security and vulnerability analysis. Conversant with IP standards. Experience in a range of CPU/MPU’s with practical experience. Requirements capture. Appreciation of cryptographic algorithms. Please Note : Applicants must be able to obtain More ❯
derby, midlands, United Kingdom EMBS Technology
experience of ARM based microcontrollers (e.g. STM-32). Experience of embedded debugging techniques (e.g. JTAG, ETM). Written code to specific standards (e.g. CERT C, MISRA). Applied software unit test automation and tools (e.g. LDRA, Parasoft etc). Familiarity with static analysis tools. Technical report writing. Desirable skills … C# development experience. Proficiency with scripting languages (Python, Perl, Bash, PowerShell). Computer network security and vulnerability analysis. Conversant with IP standards. Experience in a range of CPU/MPU’s with practical experience. Requirements capture. Appreciation of cryptographic algorithms. Please Note : Applicants must be able to obtain More ❯
|
|