Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to More ❯
Alexander Mann Solutions - Public Sector Resourcing
secure by design processes. . Experience of cloud security architectures and cloud platforms such as AWS, Azure, or Google Cloud. . Experience with security testing tools and methodologies (eg, static and dynamic analysis, fuzzing, penetrationtesting). . Familiarity with programming languages such as Java, Python, or More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security More ❯
be responsible for conducting security reviews, threat modeling, developing tooling that will help detect security issues at scale, and hands-on security evaluations (pen-testing). The successful candidate must be comfortable diving into complex engineering discussions and leveraging deep security expertise to ensure proper risk assessment and threat … opportunities as you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetrationtesting & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS … ROM, microcode, custom ASIC/FPGA) - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe) - Physical security testing at the machine level. Security testing of compute platforms (Server, PC or Mobile). Working with diverse physical tamper resistance and/or More ❯
detect potential threats or breaches. Respond to security incidents, conduct root cause analysis, and implement corrective actions. Vulnerability Management: Perform regular security assessments, including penetrationtesting and vulnerability scanning. Collaborate with development teams to address vulnerabilities and enforce remediation timelines. Compliance and Governance: Ensure compliance with industry standards More ❯
threats Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetrationtesting Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer More ❯
security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaboration: Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. More ❯
provide 24x7x365 operations/Familiar with networking fundamentals, protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetrationtesting and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable/ More ❯
vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerability scanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business unit stakeholders to assist with the remediation of More ❯
security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate More ❯
Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetrationtesting, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead incident More ❯
in the delivery of their Cloud security solutions. Cybersecurity architecture design and implementation experience, including Cloud. Security assessments qualifications related to threat, vulnerability and penetration testing. What We Look For We look for candidates with experience in the industry, who can prove their knowledge of Cyber regulations and frameworks More ❯
vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerability scanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business unit stakeholders to assist with the remediation of More ❯
and DevOps to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security … COO & Co-Founder) covering your technical skills and experience. 3. A short task demonstrating how you'd approach a risk assessment, compliance, governance, and penetrationtesting, presented to Kuvera, Ashish (CTO), and Anil (Senior Project Manager). More ❯
hygiene and quality control Support business and commercial activities including Statements of Work (SoW) and proposals Oversee and manage outcomes of internal and client penetrationtesting reports Provide security training to staff and clients as required Manage security tooling and training, ensuring compliance with policies, assurance, and technical More ❯
Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions More ❯
project management. Self-motivated, very detail-oriented and organized. Comprehensive understanding of customer/server technologies. Understanding of cyber security concepts (e.g. phishing tests, penetrationtesting, vulnerability scanning, SIEM, email security, endpoint Protection, MDM, etc.). Some technical proficiency in the following areas are required: Understanding public vs More ❯
Ruby, Go, Swift, Java, .Net, C++ or similar object-oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions More ❯
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security PenetrationTesting Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management More ❯
strategy, risk assessments, policies, training, and expert support. Services span governance, incident response, 62443 assessments, and tailored offerings like managed services, SOC, DFIR, Pen Testing, and cyber transformation. The OT division role is ideal for experienced cyber professionals looking to deliver impactful solutions and build lasting client partnerships. Your More ❯