Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Proftech Talent
Threat Intelligence . Provide guidance on proactive threat identification, analysis, and mitigation. Skilled in actionable intelligence, industry sources, and general awareness of threat landscape. Vulnerability Assessment. Identifying and classifying security vulnerabilities in networks, systems and applications and mitigating or eliminating their impact. Risk Management . Ability to identify IT … of the Security Operations, establishing and delivering methods and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management. Maintain operational security processes and ensure that all requests for support are dealt with, investigating security breaches where necessary. Support monitoring on external … security environment, gathering information on emerging threats to the business and presenting them to leaders where required. Plan vulnerabilityassessment and penetration testing activities within IT, providing expert advice where necessary in the review of vulnerabilityassessment tools and techniques. Contribute to risk management initiatives by More ❯
who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as … IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. This is a contract to hire model on Inside IR35 and is onsite in Birmingham 5x More ❯
who wants to play a role in audit execution which focuses on the review of technology processes, the analysis of risks involved, and the assessment of the design and operating effectiveness of the controls implemented to mitigate the risk. Audits may include the assessment of areas such as … IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerabilityassessment and penetration testing, and operational resilience. This is a contract to hire model on Inside IR35 and is onsite in Birmingham 5x More ❯
In this role you would be developing robust security controls to maintain and improve security capabilities within the organisation. Experience Knowledge within Risk management, vulnerabilityassessment and threat intelligence Knowledge of IT frameworks such as ITIL and Agile Experience partnering with supplier teams If you are an experienced More ❯
Identity function in Birmingham. This is a critical hands-on position focused on improving the organisation's security posture through proactive monitoring, incident response, vulnerability management, and supplier collaboration. The role will be part of a wider security team and reports to the Lead IT Security Manager. Key Responsibilities … Lead day-to-day Security Operations activities including incident response and threat detection. Plan and support vulnerability assessments and penetration testing. Support live cyber incident investigations and remediation actions. Provide risk mitigation recommendations and technical input on audit actions. Help manage a third-party Security Operations Centre and escalate More ❯
Identity function in Birmingham. This is a critical hands-on position focused on improving the organisation's security posture through proactive monitoring, incident response, vulnerability management, and supplier collaboration. The role will be part of a wider security team and reports to the Lead IT Security Manager. Key Responsibilities … Lead day-to-day Security Operations activities including incident response and threat detection. Plan and support vulnerability assessments and penetration testing. Support live cyber incident investigations and remediation actions. Provide risk mitigation recommendations and technical input on audit actions. Help manage a third-party Security Operations Centre and escalate More ❯