Engineer role will support the systems and applications that deliver enterprise security services for a global organisation. With a focus on identity and access management, the Security Engineer will provide expert knowledge to support the planning, design, development, and deployment of centralized IAM and PAM solutions and the delivery … of the enterprise-level Privileged Access Management program. The role will also support the implementation and management of all cyber security technologies and services in use at the company Role & Accountabilities KEY Identity access management, experience/involvement with Security services such as SIEM and Vulnerability … a subject matter expert on key principles of (IAM) with an in-depth knowledge in the areas of authentication and authorization systems, identity lifecycle management, and identity governance. Build the IAM strategy, and ensure its implementation is a success across the business. Staying up-to-date on current IAM more »
privacy controls are effectively implemented. Job Description Core Responsibilities Assesses and helps drive implementation of Cybersecurity controls and procedures related to Secure Development Lifecycle, VulnerabilityManagement and Privacy progra m s. Uses security skills and knowledge to provide remediation guidance . Applies system architecture, design and specification within … overall committed timelines are met. Qualifications, Skills & Experience s : Experience with assessing Cyber r isk s and i mpact analysis Experience with Vuln erability Management , Patch Management, CVE s Background with researching emerging threat s such as Malware, Ransomware, Data exfiltration, DDoS, etc Background with Threat Modeling or … Cloud and Containers Background with Network Protocol s at all layer , ability to troubleshoot network/connectivity issues Understands security concepts such as access management, security configurations, firewall , acls , endpoint protection, technology resiliency, etc. Experience with operations at scale, H/A architecture and strategies Experience with analyzing large more »
Atlanta, Georgia, United States Hybrid / WFH Options
Cognizant
V ulnerability REG Remediation Leader Location : Atlanta GA/Remote Roles and responsibilities :- • Business Acumen: Expert knowledge of vulnerabilitymanagement and the stakeholders engaged to deliver it • Best Practices: Proven track record of implementing FFIEC, NIST and CRI frameworks to assess gaps and deploy solutions • Business Outcomes: Experience … Prepares, orchestrates, and presents complex messages in simple terms to IT, business and regulatory leaders SNo Primary Skill Proficiency Level Rqrd./Dsrd. 1 VulnerabilityManagement PL1 Required 2 Networking PL4 Required 3 Qualys PL4 Required 4 Cyber Security & Cloud PL1 Required 5 Oracle Linux PL4 Desired Salary more »
monitoring, alerting, and metrics from log aggregators and data collectors. Provide a collaborative conduit between security focused and development focused teams. Provide configuration and vulnerabilitymanagement support for production applications and custom code. Minimum Requirements: Must be a U.S. citizen and be willing and able to obtain a … experience may be substituted for a degree. Experience automating, running and maintaining a variety of security tool types (some combination of i.e. monitoring, compliance, vulnerability detection, intrusion detection and prevention, change management and detection, code analysis, etc.) CompTIA Security+ or other DoDD 8140 certification Experience with custom source more »
secure asset builds, ensuring rigorous compliance monitoring. Collaborative Strategy Development: Work with stakeholders to craft cyber security strategies aligned with organizational goals. Documentation & Policy Management: Develop and upkeep cyber security engineering documentation, policies, and procedures. Integration & Assessment: Integrate cyber security solutions with existing systems and perform cloud security assessments. … Patching & VulnerabilityManagement: Coordinate with various teams to address cyber security patching and vulnerability management. Metric Dashboard Maintenance: Develop and manage dashboards with key cyber security engineering metrics. Technical Support: Provide support for Identity & Access Management, Privileged Access Management, and Network Appliance tooling. What We more »
Cyber Threat & Vulnerability Analyst – Reading/Hybrid up to £50k + Benefits An opportunity for a Cyber Threat & Vulnerability Analyst to join the team of a growing Cyber Security team at a large enterprise serving millions of customers! The business is making a big investment in Cyber and … impact and have your voice heard! In this role, you will be responsible for supporting the design, implementation, and maintenance of the Cyber Threat & VulnerabilityManagement solutions, controls, and processes across the business. Your responsibilities will be but not limited to: Support vulnerabilitymanagement across the … infrastructure Investigate newly identified Cyber Security vulnerabilities and provide appropriate mitigation actions Work closely with technology and business stakeholders about Cyber Security patching and vulnerabilitymanagement issues/actions Perform proactive threat hunting for new and emerging cyber threats Maintain dashboards with Cyber Security threat and vulnerabilitymore »
Tenable product suite (Security Centre, Nessus scan engines, Tenable.io) and peripherals with Engineering. Local and network credentials Tenable Security Centre and provisions access to vulnerability scanning systems. Integration of Nessus/Security Centre with other security and IT systems management tools (i.e. Splunk, ServiceNow) Developing and maintaining standard … processes and operating procedures, creating technical architecture diagrams and system build documentation. Operating the scanning tools and maintaining coverage along with supporting the vulnerabilitymanagement and remediation teams in understating how to remediate vulnerabilities (i.e. laptops, VMs, wireless devices) Experience of vulnerabilitymanagement team to build … relating to security tools/solutions. Improving customers' security deployments and integrate new technologies and services. Technical Skills & Competencies 5+ years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues 2+ years of experience with more »
Bath, England, United Kingdom Hybrid / WFH Options
Peaple Talent
as a System Administrator, Infrastructure Engineer, or similar role at a minimum of 2nd line level. MS Azure knowledge, with experience of: Entra ID Management Azure storage accounts Azure Virtual Desktop (AVD) Azure Virtual machine management MS Exchange Management (Ideally Exchange Online) On-premises infrastructure experience including … Building and configuration of MS Windows Servers Active Directory domain knowledge Hypervisor virtualisation management (ideally VMWare) Backup solutions (ideally VEEAM) Desirable: Knowledge and experience of: MS 365 applications e.g. SharePoint, Teams, OneDrive, etc. SSL certificate managementVulnerabilitymanagement SIEM experience (Ideally MS Sentinel) Infrastructure As Code more »
Greater Cheshire West and Chester Area, United Kingdom Hybrid / WFH Options
psd group
take ownership of identifying signs of compromise in cyber security services, IT systems, and related infrastructure. This will be a hands-on approach to vulnerabilitymanagement reduction across all IT Systems and you will work with the SOC to assist in the coordination and management of cyber … log storage are provided to the Cyber Security team. Working alongside the Cyber Security Team, take ownership and develop a hands-on approach to vulnerability and threat management reduction across all IT Systems. Monitor changes in cyber security threats, and appropriately respond to changes in threat profile. Identify … requests, use of new software or hardware facilities and report findings to the Cyber Security Team. Take ownership and a hands-on approach to vulnerabilitymanagement reduction across all IT Systems Essential Skills & Experience: Experience with analysing event logs and recognizing cyber intrusions or attacks. Experience using tools more »
cover all areas of security, covering support on projects that require security input (Design and concept) and BAU projects. Areas will cover things like vulnerabilitymanagement, network security, and general security support. Experience required: Security/Cyber Security Generalist Background in IT Support CISSP or an equivalent qualification … Strong understanding of Servers VulnerabilityManagement Network Security Desirable but not required: Qualis Zscaler DLP Access Management (IAM/PAM) Please apply directly and we will be in touch to provide further information more »
success of our security function. As such, you will provide the day-to-day technical expertise and guidance on security operations activities, such as vulnerabilitymanagement, major incident response, and security monitoring improvements. Perform requirements analysis following customer engagements. Design, architect, and deliver security projects. Document and transition … or vCISO, consulting to external clients (delivering workshops and reporting sessions). Experience in overseeing and leading remediation of security assessments, technical testing, and vulnerability analysis including Cyber Essentials, Cyber Essentials Plus, and NIST CSF. Hands-on experience in delivering security projects, including implementation and post-implementation support, providing … both leading the function and people. Technical knowledge and broad hands-on experience of working with security technologies such as the Microsoft XDR stack, vulnerabilitymanagement tools, SIEMs including Sentinel. more »
and critical thinking techniques. Solid understanding of IT security principles and practices (CyberEssentials, GDPR/DPA), including user access control, data encryption, authentication techniques, vulnerabilitymanagement, the importance of software patching and incident response. Ability to work collaboratively within a team and across departments; willingness to share knowledge … knowledge in the use and support of M365 suite particularly Excel, Word, Teams and SharePoint. Essential Criteria Significant experience in a leadership or technical management role is crucial - this includes all elements of managing and motivating technical teams. Significant experience of project management in a technical managementmore »
you. Join them by being a key player in their innovative and forward-thinking team! Responsibilities: Partner with key stakeholders from Global Technology, Risk Management, Data Protection Officer, and Information Security to ensure products and processes are compliant, resilient, and audit-ready Ensure products comply with GDPR, CFIUS, and … end ownership of Data Controls projects to achieve success with relevant stakeholders Manage current projects related to Cloud Secure Design and Data Access Rights Management improvement to proactively meet future strategic requirements, focusing on Process, People, and Technology Strong communication and negotiation skills are essential to ensure that key … Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetration testing, vulnerabilitymanagement, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security Penetration Testing Security Automation (SOAR) Qualifications: Knowledge and experience in the following: SIEM Tools VulnerabilityManagement EDR Software Intrusion Detection/Prevention Systems Web Proxies Network Security & Firewalls Programming – Nice to have! More details: Permanent role 2 days more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment
and related technologies. Familiarity with networking and network infrastructure. Experienced in designing, implementing, and managing Security services such as SIEM, Endpoint protection, EDR, and Vulnerabilitymanagement platforms. To be considered for this position, please apply today or contact Sophie on snorton@weareninetwenty.com more »
pension contributions, flexible working, in house L&D, 28 days holiday +BH Skills required for this role: - Experience working with SIEM solutions (ideally Sentinel) - Vulnerabilitymanagement (Nessus) - Incident Response - Implementing appropriate mediation Desirables: - SC Clearance - Large guideline expérience (ISO27001, Cyber Essentials, etc) This role gives the right candidate more »
innovation and delivers better business results. Title and Summary Application Security Lead Overview This is an exciting opportunity to be part of an expanding VulnerabilityManagement function at Vocalink Limited, a company that enables the payments of 90% of salaries, 70% of utility bills, most ATM transactions and … and breaches related to applications. All About You • Proven experience in application security, including hands-on experience with secure coding practices, code review, and vulnerability assessment tools. • Strong understanding of software development methodologies, programming languages, and web technologies. • Experience leading or managing a team of security professionals. • Excellent communication more »
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
undocumented network protocol or the grammar of a new programming language. Other responsibilities includes as below Scope and execute in-depth security assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic … achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and appropriate levels of urgency to management and engineering staff Excellent organizational, presentation, verbal, and written communication skills This role does not require access to a cleared work environment. Security clearances … analysis tools Hands-on experience in one or more of the following with an interest in doing full time research: cybersecurity consulting, security engineering, vulnerabilitymanagement, risk assessments, bug bounty hunting, malware analysis, forensics OSCP, OSWE certification, or interest in achieving certification Experience navigating and working with extremely more »
security risk for the whole project life cycle Perform security activities, including but not limited to, security design reviews, risk assessments, threat modelling, and vulnerabilitymanagement and risk mitigation on internally & externally developed software Embedding security within DevOps (eg CI/CD pipelines), developing security requirements On-demand more »
different data sources and tools for analysis. · Previous experience of mentoring or leading SOC analysts is desirable but not essential. · Experience of risk-based vulnerabilitymanagement is desirable. What do we offer? 25 days PTO + bank holidays Your birthday off Private Medical Insurance Electric Vehicle (EV) scheme more »
to the design and architecture of the front-office application. Understand CI/CD pipelines and deploy the UI into production. Familiarize yourself with vulnerability management. Qualifications and Skills: Strong experience in React development. Proficiency in TypeScript, JavaScript, and possibly Java. Familiarity with low-latency systems and financial markets more »
Portsmouth, England, United Kingdom Hybrid / WFH Options
TalentHawk
for a contract position. The ideal candidate will have experience in software, hardware, network, and Operational Technology (OT) . Key Projects: OT Asset Discovery & VulnerabilityManagement OT AD Audit Tool Both projects are currently at the high-level design stage. The successful candidate will be responsible for advancing more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
International The Pokémon Company International, a subsidiary of The Pokémon Company in Japan, manages the property outside of Asia and is responsible for brand management, licensing, marketing, the Pokémon Trading Card Game, the animated TV series, home entertainment, and the official Pokémon website. Pokémon was launched in Japan in … with internal and external stakeholders to resolve compliance issues. Maintain up-to-date knowledge of industry regulations and trends. Prepare and present reports to management on overall compliance status. Provide security expertise and consulting to partner teams in Tech and across the enterprise. Alongside the Information Security team, responsible … or similar enterprise applications. Experience with securing technology solutions relating to a company's supply chain. Strong knowledge in the application of Identity & Access Management, Segregation of Duties, and Least Privilege concepts. Familiarity with process improvement methodology. Up to date with security attacks and latest security research. Excellent analytical more »
Tenable Nessus VulnerabilityManagement Scanning Engineer GlobalLogic have a new role for an VulnerabilityManagement Scanning Enginee r with Tenable Nessus expertise. This role is working INSIDE IR35 for an initial 6 months and will be a Hybrid working pattern, 2 days per week onsite at … either Cheshire or Glasgow offices. Any Banking or financial services experience would be an advantage. The core skill is Tenable Nessus VulnerabilityManagement, and we are looking for someone who can be responsible for maintaining the Tenable product suite and ensure meeting scanning coverage across the organisation .The … ideal candidatehas the following skills and expertise: years of experience in Vulnerabilitymanagement domain and experience with working with web Proxy teams and working on vulnerability assessment operational issues years of experience with performing systems administration in Windows, Linux, VMware environments, including performing troubleshooting, installation or configuration more »