Information Security and policies. You will interact with IT representatives to ensure adherence to corporate and information security policies. You will have skills to provide expert level assurance in penetrationtesting and vulnerability assessments. The ability to manage business and IT expectations, compliance, and Security requirements are critical to success. You should also have the ability to manage … a small team/vendor resources for tasks assigned by Cyber Assurance Program Managers. Each Technical Project Manager will be responsible for oversight of a subset of annual penetration tests. This includes planning, execution and closure tasks (i.e Scoping, ensuring all prerequisites are in place, tests run on schedule, reports received, remediation advice is clear, setting up post test … calls) to ensure AXA XL can meet its testing goals. Knowledge of the security impact and implementation of the triad (confidentiality, integrity, and availability) on applications and the appropriate risks to present to business management are key ingredients to this position. To that effect, you should be a CISSP or be able to obtain the same certification within two More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetrationtesting and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate will … Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & PenetrationTesting: Review PenetrationTesting, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory … contract continuity. Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetrationtesting, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines More ❯
Loughton, Essex, England, United Kingdom Hybrid / WFH Options
Profile 29
role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetrationtesting and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate will … Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & PenetrationTesting: Review PenetrationTesting, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory … contract continuity. Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetrationtesting, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Plan, lead the response to security incidents and breaches, providing expertise in root cause analysis, containment, and remediation. Vulnerability Management: Conduct regular security assessments, including vulnerability scanning and writing penetrationtesting Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as … IA Technical Risk Assessments and the management of these Assessments Good understanding and appreciation of the Engineering development lifecycles and how the Product Security specialism aligns Ability to interpret Penetration Test Reports and write Remediation Action Plans An appreciation of the wider UK Government Assurance Processes (such as the legacy JSP 604 Assurance or the CAF GovAssure processes). More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
remediation with system owners. •Serve on the IT Security Team and actively contribute to shared goals and initiatives. •Support business continuity and disaster recovery planning, including annual updates and testing of the IT Disaster Recovery Plan (ITDRP), coordinating with system owners. •Research and evaluate emerging IT security trends, tools, solutions and best practices to continuously improve the college's … enterprise systems, security tools, and best practices in risk mitigation. •Knowledge in areas including firewalls, IDS/IPS, VPN, remote access, security logging, vulnerability management, security incident response, and penetration testing. •Preferred qualifications include relevant Information Security Certifications, and experience with NIST 800-171, and HECVAT. •A demonstrated ability to analyze and respond to security incidents, incident evaluation, and More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
The Bridge (IT Recruitment) Limited
security initiatives across their development teams. You'll be at the heart of ensuring their platforms remain secure by leading the execution of vital security initiatives, managing tooling, coordinating testing efforts, and embedding security best practices into the fabric of our development processes. What you'll be doing: Leading cybersecurity initiative delivery across game and platform development teams. Managing … third-party penetrationtesting, red teaming, and security assessments. Driving the integration of secure development practices and automation within CI/CD workflows. Supporting compliance and audit activities through structured documentation and reporting. Coordinating vulnerability management and helping teams meet security SLAs. Collaborating with cross-functional stakeholders to embed security into engineering culture and processes. Owning and improving … . Strong examples of cross-functional stakeholder management, being a knowledgeable bridge between technical cyber security teams and non-cyber security colleagues. Proven track record of leading third-party testing efforts, red teaming and security tool implementations. Strong knowledge and experience of integrating security into agile development environments and workflows. Experience with tools like Jira, Confluence, SharePoint or similar More ❯