ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
ll do Author High Level and Low Level Design Documents to support our network Own software/hardware selection perform bug scrubs and security vulnerability assessments and work with Test and Delivery engineers to review test plans, defects, test reports, MOP and change tickets. Drive platform improvements enable automation more »
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
troubleshooting application software and operating systems to meet cyber security requirements as defined by the Cyber Security Design Authority, including hardening, lockdown, and running vulnerability assessments. Write and perform tests to verify, validate, and qualify the software load. Key Skills Extensive experience in authoring and reviewing technical documents. Experience more »
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Stafford, Staffordshire, West Midlands, United Kingdom
Viqu Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
focus on penetration testing. At least 2 years of experience delivering CHECK penetration tests in large environments. SC clearance is required. Proficiency in conducting vulnerability assessments, red teaming, and advanced testing simulations. Strong understanding of network infrastructure penetration testing. Excellent report writing skills, with the ability to communicate technical more »
the technology division to ensure policies are followed and support business continuity. Technology Testing: Manage technology testing activities, including scenario testing and response plans. VulnerabilityAssessment: Assess and prioritise vulnerabilities, define remedial actions, and track implementation. Regulatory Compliance: Support the creation of the annual regulatory self-assessmentmore »
as needed. Role Your duties will include: Write a clear and concise test strategy covering both functional and non-functional requirements (e.g. security/vulnerabilityassessment, load/performance and usability), applying automated and manual methods as appropriate Testing requirements and user stories to ensure they are well … result in teams agreeing on the understanding of requirements Plan, execute and report exploratory testing sessions for risks and features Use a balanced risk assessment to identify the most valuable ways to apply testing and improvement activities Determination and tenacity to expose the true behaviour of a system and more »
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
London, England, United Kingdom Hybrid / WFH Options
Mobica
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
other teams in the organisation, and the ability to build strong internal relationships with other members in the business. You will be experienced with vulnerability assessments and Cyber Assurance. 4+ years of experience in cyber security, with a proven track record of progressively increasing responsibilities. Strong technical expertise in … areas such as network security, intrusion detection/prevention, endpoint security, encryption, and vulnerability management. Experience with leading or mentoring cyber security professionals. Strong knowledge and experience with recognised Cyber Security frameworks (e.g., NIST, ISO 27001, CIS Controls). Excellent communication skills, with the ability to effectively convey complex more »
the patching process. Monitoring security systems (IDS, Firewall, Anti-Virus) and event logs. Reporting IT KRIs/KPIs. Conduct periodic internal penetration testing and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and followed. Document standard and … Firewall (Cisco), IDS, and log monitoring software. Understanding of ITIL practices, ISO 27001 standards. (Preferred) Knowledge of EDR software, privileged access management, penetration and vulnerability tools, Change Auditor, ServiceNow. Ability to understand business processes and work effectively in cross-functional teams. Degree in Technology. 3-5 years of experience … in developing and monitoring IT infrastructure system standards. Experience in firewall/IDS monitoring. (Preferred) Certifications: CISM, CISSP, CEH. (Preferred) Experience in penetration and vulnerability testing. (Optional) Experience in patch monitoring. more »
you're passionate about cloud security and have the technical acumen to thrive in this dynamic field, read on! Responsibilities Develop Approach to Security Assessment & Authorization (SA&A): Collaborate with cross-functional teams to conduct security assessments for FedRAMP-approved cloud service providers. Ensure compliance with security standards and … architecture, cloud service models (IaaS, PaaS, SaaS), and security controls within cloud environments. Risk Management: Identify, assess, and mitigate risks through regular security audits, vulnerability assessments, and disaster recovery planning. Automation: Proficiency in automating security tasks to ensure elasticity and efficiency across cloud platforms. Encryption and Authentication: Knowledge of more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and … performing vulnerability assessments Participate in efforts that shape the company’s security policies, procedures and standards for use in Cloud environments Create technical and managerial level security reports for Cloud-based applications and infrastructure Implement and tests network and security Disaster Recovery procedures to ensure business continuity Monitor use more »
IPS, VPNs, endpoint protection, and encryption systems. Ensure security architecture aligns with industry best practices and compliance requirements (e.g., GDPR, HIPAA, PCI-DSS) Risk Assessment and Management: Conduct security risk assessments and vulnerability assessments to identify and mitigate security risks. Develop and enforce security policies, standards, and guidelines. more »
Southampton, England, United Kingdom Hybrid / WFH Options
LexisNexis Risk Solutions
able to analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threat analysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security … risk assessment Be excellent in oral and written communication skills and interpersonal skills Relevant certifications such as - Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), or equivalent. Be able to respond to security incidents, conducting thorough forensic investigations and meticulously preparing incident reports for management review more »
As the OT Cyber Security Lead, you will lead and drive project delivery with one other senior individual. It would suit someone with a Vulnerability Analysis, PLC's and Risk background to drive projects. You will be leading and driving OT Cyber practices from scratch allowing autonomy for you … to address critical security risks such as antivirus software, encryption, patch management, insider threat protection, incident response plans, forensic capabilities, and regulatory compliance. Performing vulnerability assessments and administrative audits on client computer systems and network devices, particularly focusing on the nuances of Operational Technology testing. Key skills: Experience with more »
Job title: Security Engineer (Threat/Vulnerability) Client: Fintech Salary: £90,000 - £160,000 + Market leading bonus Location: London Experience level : 5+ years My client is looking for a world class Security Engineer to bolster their high grade threat detection team. This individual will be given the opportunity … program to partner with the business to protect the Firm’s information and computer systems. Role: Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications and Cloud services to identify security vulnerabilities. Threat detection - Analyse/monitor security infrastructure and detect potential threats Analyse more »
a keen interest in cybersecurity, we would love to hear from you. In this role, you will manage our organisation's security infrastructure, conduct vulnerability assessments, and develop cyber incident response plans. You will work with cross-functional teams to identify security risks and stay current with cybersecurity developments. … the company, working with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetration testing to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with more »
CIFs) within Corporate Functions and HR. Manage the process to monitor resilience of Important Business Services (IBS) and Critical/Important Functions (CIFs), including vulnerability assessments and remedial actions. Coordinate testing activities and facilitate scenario testing workshops. Support the creation of the Regulatory Self-Assessment and ensure internal more »