experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetration testing, and participating in cyber assessments while learning about standards such as the NIST Cybersecurity Framework (CSF) 2.0, NIST … as applicable to OT systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of cyber assessmentvulnerabilityassessment and penetration testing. Assist in detailed design documents for various cyber solutions. Participate in design discussions with end customers and More ❯
secure software development practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
The Nottingham
environments using SIEM and EDR tools. Incident Investigation: Investigate security incidents and support the full incident response lifecycle, including documentation and root cause analysis. Vulnerability Assessments: Conduct regular vulnerability assessments and collaborate with IT teams to ensure timely remediation. Regulatory Compliance: Support compliance with regulatory requirements (FCA, PRA … and regulatory changes affecting the financial sector. About you: Security Tools Expertise: Strong understanding of security tools (SIEM, EDR, firewalls, IDS/IPS) and vulnerability management processes. Technical Knowledge: Solid grasp of networking, system administration, and secure configurations. Standards Familiarity: Familiarity with standards and frameworks such as ISO More ❯
Strong communication and documentation skills. Knowledge of accessibility standards and compliance testing. Experience with API testing and integration testing. Knowledge of security testing and vulnerability assessment. As an equal opportunities' employer, we welcome applications from individuals of all backgrounds. However, for you to be eligible for this role, you More ❯
technical design and how information security best practices should be applied. Also be able to lead with incident management investigations and conduct risk and vulnerability assessments where appropriate. Key Accountabilities & Responsibilities Role Accountabilities Conduct risk and vulnerability assessments to identify and mitigate security risks Represent information security within More ❯
Lincoln, Lincolnshire, United Kingdom Hybrid / WFH Options
Michael Page
the appropriate security controls Manage, monitor and response to security incidents Participate in the change management process, ensuring that security is considered throughout Conduct vulnerability assessments Prepare comprehensive reports including assessment-based findings, outcomes and propositions for further system security enhancement Coordinate with different department heads and team … in IT server, cloud and network Experience in Microsoft environments Academic background in Information Technology, Computer Science or a related field Knowledge of risk assessment tools, technologies and methods Understanding of networking protocols and infrastructure Job Offer 25 days holiday allowance, plus Bank Holidays Free parking facilities Life assurance More ❯