Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusion detection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with regulatory standards. Proactively identify potential threats and design strategies to minimize security More ❯
making processes. Hands-On Security Experience: Take an active role in the day-to-day management of security operations, including incident response, threat hunting, vulnerability management, and other proactive measures. Provide expertise in implementing technical security solutions and ensuring they align with organisational goals. Assist with the management of … operational goals and Legal/regulatory requirements. Contribute to the development of training programs to raise awareness about information security within the organisation. Risk Assessment & Mitigation: Conduct risk assessments of business processes and applications to identify security gaps and recommend solutions. Track, manage, and mitigate risks identified through internal … and external audits, vulnerability assessments, and other review processes. Reporting & Documentation: Prepare regular reports for the CISO and senior management, summarising security incidents, trends, and the effectiveness of security policies and controls. Document all security policies, procedures, and standards, ensuring they are updated regularly to reflect evolving threats and More ❯
of the product which effects thousands of employees and large enterprise clients. You will use technology such as AWS, Splunk, End Point Protection and Vulnerabilityassessment software. If this sounds like the start of something you want to know more about, then apply. More ❯