security, including security groups, network ACLs and load balancers in cloud environments Strong knowledge of IAM solutions with desired experience in Microsoft Entra ID Strong application and Network security riskassessment skills to identify gaps in security configuration and design Expert-level problem-solving and analytical skills Strong written and oral English communication skills, and ability to convey More ❯
learner support records in the Maytas system, adhering to compliance and audit procedures. Coordinate learner planning and profiling with managers to ensure timely completion of Essential Skills, reducing the risk of learners going out of funding. Conduct exam invigilation following established procedures. Perform internal verification of Essential Skills assessments in line with the IQA strategy. Develop sampling plans based … on riskassessment and quality assurance standards. Ensure all supporting verification records comply with Inspiro Quality Assurance Procedures. Provide clear, accurate, and timely feedback to trainers via Maytas and monthly C403 reports. More ❯
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
learner support records in the Maytas system , adhering to compliance and audit procedures. Coordinate learner planning and profiling with managers to ensure timely completion of Essential Skills, reducing the risk of learners going out of funding. Conduct exam invigilation following established procedures. Perform internal verification of Essential Skills assessments in line with the IQA strategy . Develop sampling plans … based on riskassessment and quality assurance standards. Ensure all supporting verification records comply with Inspiro Quality Assurance Procedures . Provide clear, accurate, and timely feedback to trainers via Maytas and monthly C403 reports . More ❯
5pm but flexible) Contract: Permanent Overview We are on the lookout for an IT Security Manager to join our public sector client to assist with the reviewing, analysis and riskassessment of new and existing IT Systems, in addition to responding to queries raised to the IT Security and Governance team in relation to IT systems and services. … a good understanding of IT Systems, Cloud and Security Technology, including firewalls, you won't be in a solely hands-on technical role, nor in a pure governance and risk role, more a bridge between the two. The core of the role will be technical assessment, incident management and reporting. What's in it for you … various sites across NI About you IT Degree Experience of developing, implementing and managing policies/procedures to ensure services certified to ISO 27001 standards. Experience of IT Security riskassessment with a firm understanding of riskassessment principles. Friendly and positive morale with strong customer service skills. Flexible to take on a variety of work More ❯
help our customers go about their daily job of protecting their communities and saving lives. You will refine our application design and protection using offensive security techniques like design assessment, research, threat intelligence, threat modelling, and controls optimization. You will conduct security assessments of our applications, identify issues, and help address them early in the development cycle. You'll … applications. Conduct internal security assessments of APIs and Cloud infrastructure, validate controls, design across our estate, and lead remediation activities prioritization. Enhance Secure Development by contributing to threat modelling, riskassessment, evolving Secure Coding Guidelines, and maintaining core security controls like SAST and DAST deployments. Provide technical support with risk assessments on PHI, and steering improvements to … penetration testing or pure product or application security Strong expertise in offensive security techniques and methodologies, including ethical security testing Deep understanding of secure coding practices, common vulnerabilities and risk scoring methodologies (OWASP Top 10, CWE, CVSS scoring etc.) Strong experience communicating to stakeholders of varying technical skill levels Your experience should include: Using offensive security tooling, including tools More ❯