our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
our technology, wider organisation, and suppliers. Manage and prioritise the remediation of vulnerabilities in our SaaS platform using secure development practices. Implement and oversee vulnerability management programs. Communicate effectively with technical and non-technical stakeholders, influencing senior teams. Contribute to and own cyber security aspects of our ISO27001 Information … NIST Framework, OWASP top ten, SANS and NCSC Guidance) Technical knowledge of information systems, infrastructure, and networks Security monitoring and testing technologies such as vulnerabilityscanning, penetration testing, SIEM, IDS Experience with vulnerability management tools and processes (Rapid 7, Wiz etc.) Experience of operating with and to More ❯
Salford, Manchester, United Kingdom Hybrid / WFH Options
ENGINEERINGUK
identified any gaps in our monitoring capability. • Provide support to the Digital Forensics team where requested as part of formal investigations. Threat Intelligence and Vulnerability Management • Carry out research and produce reports to ensure the BBC is aware of the current threat landscape and we can best protect ourselves … against emerging threats. • Carry out vulnerabilityscanning to identify areas of risk in the BBC and work with the relevant teams to ensure these risks are quickly mitigated. Project/Roadmap support • Work with your Shift Lead to deliver projects within the SOC as part of the Information More ❯
recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerabilityscanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can More ❯