5 of 5 Permanent Vulnerability Management Jobs in West Sussex

Cyber Security Analyst

Hiring Organisation
Milestone Technologies, Inc
Location
Crawley, West Sussex, UK
Employment Type
Full-time
responsible for ensuring continuous infrastructure reliability for multiple revenue-generating services. How You Will Make an Impact: Provide support through security operations incident management processes to protect and/or restore service operations as quickly as possible and minimize impact on customers. What You Will Need to Succeed: Minimum … different aspects such as source/destination addresses, usernames, and process names) Demonstrable comprehension of Information Security including malware, emerging threats, attacks, and vulnerability management A sound understanding of TCP/IP and networking concepts Understanding of network design principles with and knowledge of the OSI model. Flexibility ...

Product Owner - Cloud & SaaS Platform & Security SPOC

Hiring Organisation
Ipsotek, an Eviden business
Location
Crawley, West Sussex, UK
Employment Type
Full-time
scaling secure cloud-native/SaaS platforms. Strong understanding of: Cloud architectures (AWS, Azure, GCP) Microservices, containers, CI/CD pipelines Secure SDLC and vulnerability management Experience coordinating penetration tests and working with CISOs/security leadership. Familiarity with compliance frameworks (ISO 27001, SOC2, GDPR). Preferred Skills … Excellent communication and stakeholder management skills. Ability to translate technical concepts for non-technical audiences. Strong organizational skills to manage multiple streams (product, security, compliance). Agile mindset with experience in scrum or kanban delivery. Key Attributes Visionary & pragmatic: Sets bold goals while delivering incremental value. Customer-focused: Prioritizes ...

Data Scientist

Hiring Organisation
Thales
Location
Chichester, West Sussex, UK
Employment Type
Full-time
architects on data acquisition strategies, labelling/annotation approaches, integration of third-party data, and data quality management. Participate in agile threat modelling and vulnerability management for analytics solutions; adopt best practices for secure handling of sensitive data. Horizon scan for data science and analytics trends; run trials … Matplotlib/Seaborn/Plotly; experience with BI tools (Power BI/Tableau) is desirable. Experiment tracking and reproducibility: MLflow, Weights & Biases, DVC; environment management (conda/poetry) and notebook best practices. Awareness of MLOps and data engineering: feature stores, workflow orchestration (Airflow/Prefect), API-based scoring (FastAPI ...

Data Scientist

Hiring Organisation
Thales
Location
Crawley, England, United Kingdom
architects on data acquisition strategies, labelling/annotation approaches, integration of third-party data, and data quality management. Participate in agile threat modelling and vulnerability management for analytics solutions; adopt best practices for secure handling of sensitive data. Horizon scan for data science and analytics trends; run trials … Matplotlib/Seaborn/Plotly; experience with BI tools (Power BI/Tableau) is desirable. Experiment tracking and reproducibility: MLflow, Weights & Biases, DVC; environment management (conda/poetry) and notebook best practices. Awareness of MLOps and data engineering: feature stores, workflow orchestration (Airflow/Prefect), API-based scoring (FastAPI ...

Red Hat OpenShift Security Engineer

Hiring Organisation
Synergize Consulting
Location
Crawley, West Sussex, UK
Employment Type
Full-time
including: Role-Based Access Control (RBAC) Security Context Constraints (SCCs) Network Policies Pod and container security configurations Integrate OpenShift with enterprise identity and access management (IAM) solutions (eg LDAP, Active Directory, SSO). Implement and support container image security, including image scanning, registries, and trusted pipelines. Work closely with … understanding of container and Kubernetes security concepts. Experience with RBAC, SCCs, Network Policies, and secure workload configuration. Familiarity with container registries, image scanning, and vulnerability management. Strong Linux background (Red Hat/RHEL preferred). Desirable Skills Experience with OpenShift Service Mesh, Operators, or GitOps tooling. Knowledge of enterprise ...