Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
to security events across a complex, multi-departmental IT environment. You'll maintain and use key security tools such as SIEM, IDS, EDR, and vulnerability management platforms. You will work closely with system owners and users to assess configurations, analyse logs, and improve security controls and procedures. In addition … career experience in a relative field Hands-on experience with security monitoring and incident response technologies such as SIEM, IDS and EDR. Experience with vulnerabilityassessment including practical assessments for risk analysis. A strong working knowledge of at least one major operating system (Windows, Linux, or MacOS). More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯