security role, preferably within a healthcare environment. Extensive experience working on IT security-related issues. Management or supervisory experience. Experience in managing and motivating technical teams Ability to understand vulnerability scans and penetration tests and develop remediation plans. Experience developing and implementing cyber security policies, processes, and procedures. Experience managing phishing simulation & training and awareness campaigns. Experience with vulnerabilityscanning, incident response, and third-party risk management. Experience in monitoring and configuring warning and security systems. Desirable Cloud Security experience (e.g. Azure, AWS, GCP). Experience with firewalls, intrusion detection/prevention systems, and network design. Experience with Microsoft Windows Server and IP networking. Experience of working within ITIL-based change management processes. Ability to evaluate and … security role, preferably within a healthcare environment. oExtensive experience working on IT security-related issues. oManagement or supervisory experience. oExperience in managing and motivating technical teams oAbility to understand vulnerability scans and penetration tests and develop remediation plans. oExperience developing and implementing cyber security policies, processes, and procedures. oExperience managing phishing simulation & training and awareness campaigns. oExperience with vulnerabilityMore ❯
is embedded within the Software Development Life Cycle, while ensuring that all security requirements have been applied before product or function release. Analyse and interpret security scan results and vulnerability reports to develop prioritized remediation strategies, working closely with IT, Development and Hosting teams to address vulnerabilities effectively Engineer and implement security controls based on industry standards while continuously … ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetration testing and vulnerabilityscanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment with Airbus Security Organization Education: Bachelor … influencing individuals at all levels of the organization to drive and implement change while identifying and minimizing the impact of risks Technical Systems Proficiency: Security Management Tools (email filtering, vulnerabilityscanning tools, security dashboards, etc.) Cloud security management tools like CNAPP, CSPM, CWPP, and CIEM. Security risk assessment methodology (EBIOS RM) Security Requirement Definition and Review Travel Required More ❯
and compliance with relevant laws, regulations, and industry best practices. Additionally, the role encompasses continuous monitoring, threat detection, and incident investigation to protect organisational assets, as well as leading vulnerability management activities such as scanning, assessment, remediation coordination, and tracking of security weaknesses. About us We are Public Health Wales - the national public health agency in Wales. Our … oDemonstrated experience in cyber security role(s). oGood understanding and experience with application and network security. oHands-on experience with SIEM (Security Information and Event Management) systems and vulnerabilityscanning tools oInvolvement in creating training materials, including phishing simulation exercises. . oExperience in providing technical/security support. Desirable oCloud Security experience (e.g Azure, AWS, GCP) oRelevant More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerability management In-depth knowledge of asset discovery tools, vulnerabilityscanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯