3 of 3 Permanent Vulnerability Scanning Jobs in Hampshire

Cyber Security Engineer

Hiring Organisation
Leidos Innovations UK Limited
Location
Aldershot, Hampshire, South East, United Kingdom
Employment Type
Permanent
Cyber Security Engineering Lead. Key Responsibilities: COTS Application Updates: Support the update process for Commercial Off-The-Shelf (COTS) applications, ensuring compatibility and security. Vulnerability Scanning: Conduct regular assessments of environments to identify vulnerabilities. Security Definition Updates: Manage and update security definitions across our platforms to protect against … emerging threats. Vulnerability Analysis: Analyse vulnerability assessment reports and implement necessary changes. Security Daily Checks: Perform thorough daily checks of security components to ensure operational integrity. System Health Checks: Conduct daily system health checks to ensure servers are functioning optimally. Capacity Checks & Reporting: Monitor and report on local ...

Cyber Security Apprentice

Hiring Organisation
QA
Location
Chandler's Ford, Eastleigh, Hampshire, England, United Kingdom
Employment Type
Full-Time
Salary
£25,000 per annum
dabbled in things like: Networking basics (TCP/IP, DNS, DHCP). Windows/Linux systems or firewalls. Security tools (SIEM, antivirus, vulnerability scanners). Scripting (PowerShell, Python). Cloud platforms (Azure, AWS). Entry requirements: an A-Level in ICT OR an International Baccalaureate at Level ...

Cyber Security Analyst

Hiring Organisation
Mexa Solutions LTD
Location
Portsmouth, Hampshire, England, United Kingdom
Employment Type
Full-Time
Salary
£30,000 - £34,000 per annum
certification support provided Growth : Build on your 2nd line support experience and step confidently into cyber Variety : Get hands-on with patching, threat prevention, vulnerability scanning, phishing protection, and more Stability : Join a respected organisation with excellent benefits, including 26% pension and 43 days holiday What … Microsoft Defender and Endpoint Protection tools Running phishing simulations and awareness training for staff Implementing data loss protection controls and securing Microsoft 365 Conducting vulnerability scans and acting on results Supporting continuous improvements in the business’s cyber security posture What we’re looking for: Experience in 2nd line ...