Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
numerous people into careers there, with strong feedback. Your new role This is an interesting opportunity to help define and deliver a strategy which will enhance the organisation's vulnerabilitymanagement and improve the recording and identification of the vulnerabilities, at a good time when the company are expanding and investing in their IT and cyber security estate. … completeness of the register, including the correct classification of systems, key technical attributes, asset purpose, criticality, business and system owners and relationships with other assets. Define and implement the vulnerability identification, prioritisation and management processes required to ensure the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising … with colleagues performing related penetration testing and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the asset estate and its security posture. Stay informed about emerging cyber threats and vulnerabilities. What you'll need to succeed Experience in a similar role, ideally More ❯
SOC and Vulnerability Analyst Logiq Consulting is a fantastic place to work. Our ethos is based on our core values of innovation, collaboration, and quality delivery which has created a genuine "Yes" culture. Being a fast growing SME working alongside some of most prestigious clients in the UK we can offer not only a varied and interesting workload, but … and The Role: An increase in clients across our Managed Services, along with the maturing of our service offering as driven the requirement for this new role, SOC and Vulnerability Analyst. The role will be reporting to our Information Security Lead and sit within our Information Security Team. The ideal candidate will have current or recent experience working in … a SOC environment and/or have a strong focus on vulnerability management. Key Responsibilities: As SOC and Vulnerability Analyst you be responsible for: Monitoring the clients IT infrastructure. Monitoring Logiq IT security systems, applications and networks for irregularities and alerts which may indicate incidents, breaches and events. Investigation of alerts and incidents to ascertain the criticality and More ❯
Newport, Gwent, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment
into asset security while managing a small team of technical analysts and overseeing supplier relationships to drive successful outcomes. What You'll Bring: Proven experience in IT asset and vulnerabilitymanagement In-depth knowledge of asset discovery tools, vulnerability scanning and remediation techniques Solid understanding of the differences between IT and operational technology environments Awareness of attacker More ❯