focus on penetration testing. At least 2 years of experience delivering CHECK penetration tests in large environments. SC clearance is required. Proficiency in conducting vulnerability assessments, red teaming, and advanced testing simulations. Strong understanding of network infrastructure penetration testing. Excellent report writing skills, with the ability to communicate technical more »
City Of London, England, United Kingdom Hybrid / WFH Options
i3
common security frameworks and compliance standards, such as NIST, ISO 27001, and SOC 2. Familiarity with security testing methodologies, such as penetration testing and vulnerability assessments. Experience with SIEM tools, such as Splunk, ELK stack, or Azure Sentinel. Understanding of secure coding practices and experience with static code analysis more »
do Author High Level and Low Level Design Documents to support the business network Own software/hardware selection perform bug scrubs and security vulnerability assessments and work with Test and Delivery engineers to review test plans, defects, test reports, MOP and change tickets. Drive platform improvements enable automation more »
day one you will bring: experience in a penetration testing or security consulting role, a minimum of 3 years. in delivering penetration tests and vulnerability assessments for applications, network infrastructure and cloud services. professional certification is highly desirable, such as OSCP or CREST CRT. with commercial security tools such more »
West Midlands, Stafford, Staffordshire, United Kingdom
VIQU Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
Tenable Nessus Vulnerability Management Scanning Engineer GlobalLogic have a new role for an Vulnerability Management Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at either Cheshire … or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus Vulnerability Management, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The ideal candidatehas the … following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerabilityassessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration, monitoring system performance more »
Vulnerability Management (TVM) Installation and configuration Engineer GlobalLogic have a new role for an Installation and configuration Enginee r with Tenable Nessus expertise ideally. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at either … to someone with either CyberArk or Splunk and we are looking for someone who has the following skills and expertise: years of experience in Vulnerability management domain and experience with working with web Proxy teams and working on vulnerabilityassessment operational issues in the design and implementation … controls to secure systems, applications, network, or infrastructure services experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetration testing tools. understanding of TCP/IP networking concepts and DNS./Unix/Windows Operating systems experience years of related more »
mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incident response plans, forensic capabilities, and regulation compliance). Conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. Lead collaboration efforts with other cybersecurity more »
including the close cycles (month-end, quarter & year-end), support of all subledgers and the GL. Experience 5+ years of experience with threat and vulnerability management (TVM) program and operations 3+ years of experience working with threat intelligence feeds and IOCs Education High School Diploma w/10 years … of information security experience Additional 10 years of IT experience 7+ years in an information security role 5+ years of experience with threat and vulnerability management program and operations 3+ years of experience working with threat intelligence feeds and IOCs 3+ years of experience in a security engineer role … Functions Operate within the global Cybersecurity Team within the Information Technology department Ensure global alignment with Company’s best practices for patch, posture, and vulnerability management Maintain and improve the TVM program’s operational performance, processes, and technology Maintain awareness of cybersecurity threats, events, tactics, techniques, and procedures (TTPs more »
work, ensuring the security integrity of software applications throughout the development lifecycle. Responsibilities: - Design, implement, and maintain application security measures - Conduct code reviews and vulnerability assessments - Collaborate with development teams to integrate security practices - Develop and enforce application security policies and procedures - Stay abreast of emerging security threats and more »
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to more »
ll do Author High Level and Low Level Design Documents to support our network Own software/hardware selection perform bug scrubs and security vulnerability assessments and work with Test and Delivery engineers to review test plans, defects, test reports, MOP and change tickets. Drive platform improvements enable automation more »
strategies. Provide expert solution architecture expertise and ownership throughout all stages of the solutions design engagement life cycle. Undertake installation site surveys, inspections, and vulnerability assessments. Identify, document, and escalate risks or non-conformance to project owners and provide resolution advice. Produce vulnerabilityassessment documentation. Required Skills … Working knowledge and hands-on experience of Penetration Testing. Working knowledge and hands-on experience of techniques and tools in conducting vulnerability scanning and assessments (such as Nessus, Nmap, Nipper). Working understanding and hands-on experience of Information Communication Technologies in at least two of the following: Enterprise more »
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
other teams in the organisation, and the ability to build strong internal relationships with other members in the business. You will be experienced with vulnerability assessments and Cyber Assurance. 4+ years of experience in cyber security, with a proven track record of progressively increasing responsibilities. Strong technical expertise in … areas such as network security, intrusion detection/prevention, endpoint security, encryption, and vulnerability management. Experience with leading or mentoring cyber security professionals. Strong knowledge and experience with recognised Cyber Security frameworks (e.g., NIST, ISO 27001, CIS Controls). Excellent communication skills, with the ability to effectively convey complex more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
troubleshooting application software and operating systems to meet cyber security requirements as defined by the Cyber Security Design Authority, including hardening, lockdown, and running vulnerability assessments. Write and perform tests to verify, validate, and qualify the software load. Key Skills Extensive experience in authoring and reviewing technical documents. Experience more »
Southampton, England, United Kingdom Hybrid / WFH Options
LexisNexis Risk Solutions
able to analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threat analysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security … risk assessment Be excellent in oral and written communication skills and interpersonal skills Relevant certifications such as - Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), or equivalent. Be able to respond to security incidents, conducting thorough forensic investigations and meticulously preparing incident reports for management review more »
tactics, techniques, and procedures used by threat actors. •Security Incident Handling: Assisting with the containment, eradication, and recovery process in response to security incidents. •VulnerabilityAssessment: Participating in vulnerabilityassessment and management activities to identify and remediate security weaknesses. •Security Tool Management: Managing and configuring security more »
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerabilityassessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
preferred. Extensive experience in designing, implementing, and managing security solutions within the Microsoft Azure ecosystem. Proficiency in deploying and configuring DAST & SAST tools for vulnerabilityassessment and code analysis. Familiarity with EASM platforms and methodologies for securing enterprise applications. Strong understanding of networking concepts, cloud architecture, and security more »
the technology division to ensure policies are followed and support business continuity. Technology Testing: Manage technology testing activities, including scenario testing and response plans. VulnerabilityAssessment: Assess and prioritise vulnerabilities, define remedial actions, and track implementation. Regulatory Compliance: Support the creation of the annual regulatory self-assessmentmore »