vulnerability management program Strong technical expertise in implementing a Prioritizationformula to vulnerabilities and misconfigurations and translating these into risks Excellent knowledge of Vulnerability Management frameworks such as NIST/SANS The following general characteristics are required: A team player with the ability to work independently and unsupervised Ability to own delegated tasks and see them through to completion Ability More ❯
technologies to monitor and protect data and equipment from attacks.We're Looking for Teammates With: Bachelor's degree in computer science or a related field is required. CISSP, CISA, SANS GIAC, or relevant security certification(s) desired. Additional certifications such as CCNA/CCNP, AWS Security etc. desired. 10+ years of IT experience, ideally with some project management. Familiarity More ❯
be successful: Extensive experience in technical aspects of cyber security incidents, incident response, and preventative and detective capabilities Experience responding to incidents and mitigating on-going attacks Relevant accreditations; SANS, GIAC, CISSP, SC-200 Proven background and experience in similar positions or position prior to a Head of Role, such as SOC Lead, Principal SOC Analyst, SOC Specialist, with More ❯
on efficiency, automation, and continuous improvement. Strong documentation skills and experience working in cross-functional teams (e.g., HR, Legal, Risk). Relevant certifications preferred: ITPM, GCITP, PMP, CISSP, GCIH, SANS, GIAC Additional Information Our uniqueness is that we celebrate yours. Experian's culture and people are important differentiators. We take our people agenda very seriously and focus on what More ❯
Access technologies and networking products. Experience in assessing controls based on COBIT or other leading technology risk management and governance control framework. Experience in assessing controls based on NIST, SANS, ISO27000 or other leading cyber security framework. Very good presentation and report writing skills. Producing draft reports that require minimal changes. Qualifications: University degree in a technology related discipline More ❯
Experience in technology audit, infrastructure, or resilience risk areas. Degree in Computer Science, Engineering, IT, or related field. Relevant audit and technology certifications (e.g., CISA, CGEIT, CISSP, CISM, CompTIA, SANS, ISC2). Hold the right to work in the UK is mandatory. Robert Walters Operations Limited is an employment business and employment agency and welcomes applications from all candidates More ❯
more Cloud Service Providers (AWS, Azure, GCP, etc). Demonstrate the ability to multitask, adapt and thrive within a fast-paced environment. Have excellent communication skills and stakeholder management. SANS GCIH certification or equivalent. +4 years' experience working in a Security Operations role. Who we are: At Pearson, our purpose is simple: to help people realize the life they More ❯
leadership. PREFERRED QUALIFICATIONS - Technical depth in one or more specialties including: application security, infrastructure security, digital forensics, malware analysis, threat hunting or some combination thereof. - Relevant industry certifications from SANS, ISC2, etc. - Experience working as part of a Computer Security Incident Response Team (CSIRT) - Familiarity/experience with AWS services and security concepts. Amazon is an equal opportunities employer. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Copello
complex organisations -Some coding ability Beneficial -Splunk -Palo Alto (XDR/XSIAM) -Skills in Forensics -Experience or interest in Reverse Engineering, Malware Analysis, Vulnerability Research -Industry recognised qualifications (eg. SANS, OSCP, ISC2) Security Clearance Eligibility for UK SC will be sought but wont be required from the start. Remote Working This role can be performed remotely in the UK More ❯
should also have a proven experience and knowledge with any combination of the following: Threat modelling and risk assessments, Working knowledge of secure coding principles (OWASP and OWASP mobile, SANS ), Experience with designing and administering identity management (authentication and authorisation including policy enforcement points, token services, protocols such as OAuth2), Working knowledge of cryptography including encryption, signing and digital … and IAST tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we More ❯
The Vulnerability Management Manager is a global role within ION's central services division, supporting the Group Security strategy through the identification, mitigation, and remediation of information security vulnerabilities, misconfigurations, and risks. This role reports to the Global Head of More ❯