Remote Vulnerability Management Jobs in Sheffield

2 of 2 Remote Vulnerability Management Jobs in Sheffield

Design Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
Experis
experts and consultants related programmes. Principal Preferred Requirements: Cybersecurity Expertise: Significant experience and proven technical depth within one of the following domains of cybersecurity; security operations & incident response, threat & vulnerability management, identity & access management, cryptography, infrastructure, network, application, data, cloud Broad background across information technology with the ability to communicate clearly with non-security technical SMEs at … a comfortable level Excellent command of cybersecurity organisation practices, operations risk management processes, principles, architectural requirements, engineering threats and vulnerabilities, including incident response methodologies Keen understanding of national and international laws, regulations, policies and ethics related to financial industry cybersecurity Experience and understanding of both the roles and interlock between enterprise & solution architecture Experience in both operational and transformation … cybersecurity roles or a clear working understanding of both perspectives Experience working in large-scale IT transformation programmes Identity & Access Management: Secrets Management: Experience of designing solutions using SM tools such as HashiCorp Vault Experience of developing secrets management patterns and championing designs through architecture governance forums Experience of designing or implementing Workload Identity Frameworks within large More ❯
Employment Type: Contract
Posted:

Design Engineer

Sheffield, South Yorkshire, Yorkshire, United Kingdom
Hybrid / WFH Options
VANLOQ LIMITED
requirements. Contribute to the development of new architecture patterns and strategies, particularly within cybersecurity. Essential Skills & Experience Proven expertise in at least one domain of cybersecurity: security operations, threat & vulnerability management, identity & access management, cryptography, infrastructure, networks, applications, data, or cloud. Strong understanding of enterprise and solution architecture principles. Experience delivering solutions within large-scale IT transformation … programmes. Skilled in Identity & Access Management (IAM), including secrets management (e.g., HashiCorp Vault), workload identity frameworks, privileged access management, and authentication protocols (Kerberos, OAuth, SAML). Proficiency with architecture tools such as BizzDesign, Archi, UML, and collaboration platforms (Jira, Confluence). Excellent communication skills, with the ability to engage both technical and non-technical stakeholders. Preferred Qualifications More ❯
Employment Type: Contract, Work From Home
Posted: