will work on both infrastructure and applications, conduct IT Health Checks, and review IT configurations to identify gaps. About the Role Perform pen tests, vulnerability assessments and build reviews both remotely and at client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
Security principles are being upheld. Advanced knowledge of layer 7 firewall technologies and capabilities (e.g., Application awareness, user identities, advanced threat detection, etc.) Provides vulnerabilityassessment of cloud assets, delivers remediation recommendations, and provides knowledgeable assistance in resolving identified vulnerabilities. Develop and implement security measures, policies, and procedures … Cyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability scanning tools. (preferably Crowdstrike Falcon, Wiz, Datadog) Up-to-date understanding of testing the security of software and infrastructure using appropriate security tools including … disability or age. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
proactive, diligent, comprehensive engineering, completer-finisher Project management experience across multiple clients with concurrent requirements Strong Security and administration tools knowledge : patching, antivirus, backup, vulnerabilityassessment : monitoring, reporting and remediation Extensive knowledge of Microsoft s technology?products, including Azure, Microsoft/Office 365, Windows Server, Active Directory and more »
Clerkenwell, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
capacity planning and scaling to accommodate growing workloads and ensure resource efficiency. Security and Compliance: Collaborate with security teams to implement security best practices, vulnerability assessments, and compliance requirements for LLM and Machine Learning systems. Continuous Improvement: Continuously evaluate and improve system reliability, performance, and efficiency through automation and more »
Clerkenwell, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs * Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. * Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. * Participate in the technical support of the PKI more »
Remote work, Kidderminster, Worcestershire, United Kingdom Hybrid / WFH Options
Network IT
including containment, eradication, and recovery actions. Conduct initial investigations and document findings. Collaborate with other teams to develop and implement effective security measures. Perform vulnerability assessments and recommend remediation actions. Maintain and update SOC processes and procedures. Participate in the development and tuning of security monitoring and detection strategies. more »
and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and … performing vulnerability assessments Participate in efforts that shape the company’s security policies, procedures and standards for use in Cloud environments Create technical and managerial level security reports for Cloud-based applications and infrastructure Implement and tests network and security Disaster Recovery procedures to ensure business continuity Monitor use more »
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Confidential
supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical … analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerabilityassessment techniques such as fuzzing and code injection Researchers undertaking experimental development … experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverse engineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research more »
Lambeth, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
Holborn, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
City of Westminster, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
City of London, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
West End of London, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
Holborn, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
Lambeth, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
West End of London, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
City of London, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
City of Westminster, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
South East London, England, United Kingdom Hybrid / WFH Options
Sky
do Author High Level and Low Level Design Documents to support Sky’s network Own software/hardware selection perform bug scrubs and security vulnerability assessments and work with Test and Delivery engineers to review test plans, defects, test reports, MOP and change tickets. Drive platform improvements enable automation more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »