you're passionate about cloud security and have the technical acumen to thrive in this dynamic field, read on! Responsibilities Develop Approach to Security Assessment & Authorization (SA&A): Collaborate with cross-functional teams to conduct security assessments for FedRAMP-approved cloud service providers. Ensure compliance with security standards and … architecture, cloud service models (IaaS, PaaS, SaaS), and security controls within cloud environments. Risk Management: Identify, assess, and mitigate risks through regular security audits, vulnerability assessments, and disaster recovery planning. Automation: Proficiency in automating security tasks to ensure elasticity and efficiency across cloud platforms. Encryption and Authentication: Knowledge of more »
e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incident response plans, forensic capabilities, and regulation compliance). Conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. Lead collaboration efforts with other cybersecurity more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Lockheed Martin Corporation
the following: Network Security - Understanding network configurations, including firewalls, VPNs, IDS/IPS systems, and network segmentation strategies. Ethical Hacking - Practicing penetration testing and vulnerability assessments to identify security vulnerabilities in systems. Incident Response - Managing and mitigating cyber attacks or breaches efficiently, understanding how to contain the breach and more »
a keen interest in cybersecurity, we would love to hear from you. In this role, you will manage our organisation's security infrastructure, conduct vulnerability assessments, and develop cyber incident response plans. You will work with cross-functional teams to identify security risks and stay current with cybersecurity developments. … the company, working with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetration testing to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with more »
As the OT Cyber Security Lead, you will lead and drive project delivery with one other senior individual. It would suit someone with a Vulnerability Analysis, PLC's and Risk background to drive projects. You will be leading and driving OT Cyber practices from scratch allowing autonomy for you … to address critical security risks such as antivirus software, encryption, patch management, insider threat protection, incident response plans, forensic capabilities, and regulatory compliance. Performing vulnerability assessments and administrative audits on client computer systems and network devices, particularly focusing on the nuances of Operational Technology testing. Key skills: Experience with more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and more »