Northampton, Northamptonshire, East Midlands, United Kingdom
Viqu Limited
and secure your clients' technology estates. Collaborating with the CISO, the Cyber Security Analyst will be involved in incident response, security consultations, project work, vulnerability assessments, and ensuring compliance with standards like ISO 27001 and Cyber Essentials. Requirements of the Cyber Security Analyst: - 3 years' experience in a comparable more »
will work on both infrastructure and applications, conduct IT Health Checks, and review IT configurations to identify gaps. About the Role Perform pen tests, vulnerability assessments and build reviews both remotely and at client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
risk management principles and practices. Strong knowledge of security administration and role-based security controls. Strong knowledge and use of GRC platforms. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of Privileged Access Management technologies Responsibilities Respond to security assessments, questionnaires and audits from clients and third more »
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Knowledge of Privileged Access Management technologies. Preferred Skills more »
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Certified Information Systems Security Professional (CISSP), Certified Information more »
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Knowledge of Privileged Access Management technologies. Preferred Skills more »
environment Relevant certifications in IT support are a plus Experience in data protection and management Knowledge of security protection and disaster recovery Understanding of vulnerabilityassessment and patch management Familiarity with device as a service and penetration testing If you are interested in this role, please email your more »
and best practices. - Deep understanding of cloud security controls, tools (Azure Security Center), and services. - Familiarity with security testing methodologies like penetration testing and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incident response/forensics. - Knowledge of security frameworks (NIST, ISO 27001, SOC 2) and more »
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank s network, applications and infrastructure. Carry out regular system health checks, vulnerabilityassessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
Privacy & Risk team. This individual can possess a variety of skill sets such as performing and overseeing governance assessments (HIPAA, NIST, ISO, FISMA, etc.), vulnerability assessments, penetration testing, incident response, Payment Card Industry (PCI) assessments, as well as experience in managing or deploying SIEM, DLP, and Identity Management solutions. … as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Experience with discovering and demonstrating web application vulnerabilities such as Cross Site Scripting (XSS), Cross Site Request Forgery … CSRF), Injection Flaws, Remote file inclusion (RFI) and SQL Injection Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from more »
industries and understanding how technology impacts the operation and growth of organizations is what we do best. We are seeking individuals skilled at performing vulnerability assessments, penetration testing, and secure architecture reviews of a variety of operating systems, network devices, wireless solutions, and their related infrastructure. Examples of candidate … as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning more »
deviate from acceptable configurations, enclave policy, or local policy. This is achieved through passive evaluations such as compliance audits and active evaluations such as vulnerability assessments. Establishes strict program control processes to ensure mitigation of risks and supports obtaining certification and accreditation of systems. Includes support of process, analysis … each government accrediting authority through pre-test preparations, participation in the tests, analysis of the results and preparation of required reports. Coordinate all associated Assessment and Authorization activities, which includes all RMF Body Of Evidence (BOE) documentation: System Security Plan (SSP), Security Controls Traceability Matrix (SCTM), Control Family Security more »
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. more »
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. Certified Information Systems Security Professional (CISSP), Certified Information more »
data encryption technologies. Strong knowledge of Intrusion Detection and Intrusion Prevention technical capabilities. Knowledge of web filtering and email SPAM prevention techniques. Knowledge of vulnerabilityassessment and forensic investigations tools. Knowledge of mobile device security and Mobile Device Management solutions. more »
you're passionate about cloud security and have the technical acumen to thrive in this dynamic field, read on! Responsibilities Develop Approach to Security Assessment & Authorization (SA&A): Collaborate with cross-functional teams to conduct security assessments for FedRAMP-approved cloud service providers. Ensure compliance with security standards and … architecture, cloud service models (IaaS, PaaS, SaaS), and security controls within cloud environments. Risk Management: Identify, assess, and mitigate risks through regular security audits, vulnerability assessments, and disaster recovery planning. Automation: Proficiency in automating security tasks to ensure elasticity and efficiency across cloud platforms. Encryption and Authentication: Knowledge of more »
Security principles are being upheld. Advanced knowledge of layer 7 firewall technologies and capabilities (e.g., Application awareness, user identities, advanced threat detection, etc.) Provides vulnerabilityassessment of cloud assets, delivers remediation recommendations, and provides knowledgeable assistance in resolving identified vulnerabilities. Develop and implement security measures, policies, and procedures … Cyber Principles, ISO27001, SoC, NIST, PCI, and GDPR. Hands-on experience with security technologies, SIEM , IDS/IPS, EDR, NDR, network forensics, antivirus, and vulnerability scanning tools. (preferably Crowdstrike Falcon, Wiz, Datadog) Up-to-date understanding of testing the security of software and infrastructure using appropriate security tools including … disability or age. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and products used - below. #J more »
mobile, web services, and client/server architectures Encryption schemes (symmetric, asymmetric, and hashing) and how they may be applied in an application architecture Vulnerabilityassessment and penetration testing methodologies and processes for web, thick-client and mobile applications Experience with Splunk and/or other SIEM platforms more »
lifecycle. Spearhead the integration of security within the SDLC, promoting secure coding practices and integrating security tools within CI/CD pipelines. Oversee designs, vulnerability assessments and code reviews, ensuring applications are free of critical security flaws. Guide the engineering teams in embracing security as an integral part of more »
proactive, diligent, comprehensive engineering, completer-finisher Project management experience across multiple clients with concurrent requirements Strong Security and administration tools knowledge : patching, antivirus, backup, vulnerabilityassessment : monitoring, reporting and remediation Extensive knowledge of Microsoft s technology?products, including Azure, Microsoft/Office 365, Windows Server, Active Directory and more »
Clerkenwell, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
capacity planning and scaling to accommodate growing workloads and ensure resource efficiency. Security and Compliance: Collaborate with security teams to implement security best practices, vulnerability assessments, and compliance requirements for LLM and Machine Learning systems. Continuous Improvement: Continuously evaluate and improve system reliability, performance, and efficiency through automation and more »