capacity planning and scaling to accommodate growing workloads and ensure resource efficiency. Security and Compliance: Collaborate with security teams to implement security best practices, vulnerability assessments, and compliance requirements for LLM and Machine Learning systems. Continuous Improvement: Continuously evaluate and improve system reliability, performance, and efficiency through automation and more »
vendors, including MSP & SOC. 5+ years of experience in cybersecurity or incident response. Strong technical background in cybersecurity, including intrusion detection, malware analysis, and vulnerability assessment. Experience in developing and implementing incident response plans. Excellent communication, project management, and leadership skills. Relevant certifications such as CISSP, CISM, or GIAC more »
Clerkenwell, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs * Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. * Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. * Participate in the technical support of the PKI more »
Holborn, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
Lambeth, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
City of Westminster, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
West End of London, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
City of London, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
documentation, collaborate on IT projects to ensure that security issues are addressed throughout the project life cycle and work with the team to perform vulnerability assessments to identify weaknesses and recommend remedial action As the Information Security Technical Lead you are required so show demonstrable knowledge and appreciation of more »
Employment Type: Permanent
Salary: £72000 - £78000/annum 10% bonus, hybrid, great benefits
issues, continuously improving incident detection and risk mitigation. Policy Updates and Audits: Participate in updating security policies, internal and external audits, penetration tests, and vulnerability assessments, contributing to a secure environment. Subject Matter Expertise: Be a recognized subject matter expert on cloud infrastructure security, sharing knowledge and insights across more »
Northampton, Northamptonshire, East Midlands, United Kingdom
Viqu Limited
analyse, mitigate and remediate and recover from threats Consult clients on systems, services and controls in security Manage and monitor alerts Run security reports Vulnerability assessments Essential Experience required of a Cyber Security Analyst 3+ years' experience in a similar role (i.e. SOC Analyst, Security Analyst). Exposure to more »
s data and systems. Stay updated on legal and regulatory requirements related to data security and privacy, ensuring compliance. Conduct regular security audits and vulnerability assessments. Plan, coordinate, and execute IT projects, including system upgrades, new implementations, and process improvements. Work closely with other departments to understand their technology more »
West Midlands, Stafford, Staffordshire, United Kingdom
VIQU Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
industries and understanding how technology impacts the operation and growth of organizations is what we do best. We are seeking individuals skilled at performing vulnerability assessments, penetration testing, and secure architecture reviews of a variety of operating systems, network devices, wireless solutions, and their related infrastructure. Examples of candidate … as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Familiar with security testing techniques such as threat modeling, network discovery, port and service identification, vulnerability scanning more »
environment Relevant certifications in IT support are a plus Experience in data protection and management Knowledge of security protection and disaster recovery Understanding of vulnerabilityassessment and patch management Familiarity with device as a service and penetration testing If you are interested in this role, please email your more »
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
Remote work, Kidderminster, Worcestershire, United Kingdom Hybrid / WFH Options
Network IT
including containment, eradication, and recovery actions. Conduct initial investigations and document findings. Collaborate with other teams to develop and implement effective security measures. Perform vulnerability assessments and recommend remediation actions. Maintain and update SOC processes and procedures. Participate in the development and tuning of security monitoring and detection strategies. more »
will work on both infrastructure and applications, conduct IT Health Checks, and review IT configurations to identify gaps. About the Role Perform pen tests, vulnerability assessments and build reviews both remotely and at client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile more »
South East London, England, United Kingdom Hybrid / WFH Options
Sky
do Author High Level and Low Level Design Documents to support Sky’s network Own software/hardware selection perform bug scrubs and security vulnerability assessments and work with Test and Delivery engineers to review test plans, defects, test reports, MOP and change tickets. Drive platform improvements enable automation more »
Privacy & Risk team. This individual can possess a variety of skill sets such as performing and overseeing governance assessments (HIPAA, NIST, ISO, FISMA, etc.), vulnerability assessments, penetration testing, incident response, Payment Card Industry (PCI) assessments, as well as experience in managing or deploying SIEM, DLP, and Identity Management solutions. … as the Open Web Application Security Project (OWASP), Open Source Security Testing Methodology Manual (OSSTMM), the Penetration Testing Execution Standard (PTES), Information Systems Security Assessment Framework (ISSAF), and NIST SP800-115 Experience with discovering and demonstrating web application vulnerabilities such as Cross Site Scripting (XSS), Cross Site Request Forgery … CSRF), Injection Flaws, Remote file inclusion (RFI) and SQL Injection Familiar with security testing techniques such as network discovery, port and service identification, vulnerability scanning, network sniffing, penetration testing, configuration reviews, firewall rule reviews, social engineering, wireless penetration testing, fuzzing, and password cracking and can perform these techniques from more »
person who wants to develop their Cyber career and work within an environment where they can grow and learn. Responsibilities Include: - Penetration Testing and Vulnerability Assessments - Completing Cyber Esse... more »
Stoke-On-Trent, Staffordshire, West Midlands, United Kingdom
Profectus
person who wants to develop their Cyber career and work within an environment where they can grow and learn. Responsibilities Include: - Penetration Testing and Vulnerability Assessments - Completing Cyber Essentials and Cyber Essentials Plus Accreditations - Liaising with customers and clients daily - Give advice, reports and explanations on Cyber threats to more »
standards, and regulatory requirements. Develop the company's Security Operations and Engineering function, providing shared service capability around Incident Response, Threat Hunting, Security Monitoring, Vulnerability Assessments, Endpoint Detection & Response, Email Security & Web Content Filtering. Develop and implement Security KPIs aligned to industry best practices and to Publicis Groupe Information … maintain relationships with external partners, industry peers, and regulatory bodies to stay informed about emerging security threats, trends, and best practices. Oversee the identification, assessment, and management of security risks within the company, ensuring appropriate controls are in place to mitigate risks effectively. Working in collaboration with the Global more »
you're passionate about cloud security and have the technical acumen to thrive in this dynamic field, read on! Responsibilities Develop Approach to Security Assessment & Authorization (SA&A): Collaborate with cross-functional teams to conduct security assessments for FedRAMP-approved cloud service providers. Ensure compliance with security standards and … architecture, cloud service models (IaaS, PaaS, SaaS), and security controls within cloud environments. Risk Management: Identify, assess, and mitigate risks through regular security audits, vulnerability assessments, and disaster recovery planning. Automation: Proficiency in automating security tasks to ensure elasticity and efficiency across cloud platforms. Encryption and Authentication: Knowledge of more »