Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
Central Mancheter, Manchester, United Kingdom Hybrid / WFH Options
hireful
Thorough understanding of data security principles and best practices, ideally in a regulated environment. Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. Great Opportunity Interested? Please send you cv for a swift response more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »