Remote Vulnerability Assessment Jobs in Slough

3 of 3 Remote Vulnerability Assessment Jobs in Slough

Cyber Security Analyst

slough, south east england, united kingdom
Hybrid / WFH Options
Infinigate Group
relating to information security. Conducting security awareness training and education for staff and users on best practices and emerging trends in cyber security. Use vulnerability management to improve Infinigate’s security landscape. Performing risk assessments and vulnerability scans to identify and mitigate potential threats to the network, devices … Kill Chain, ATT&CK · Knowledge & experience of common program language e.g., Python, C++, PowerShell, JavaScript Being able to perform Root Cause Analysis Experience with vulnerability assessments Ability to discover, design and document security implementations. Strong networking skills. Good understanding of securing Cloud technologies through native and multi-cloud technologies. More ❯
Posted:

Penetration Tester / Outside IR35 / 500-550 pd / Remote

slough, south east england, united kingdom
Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
ethical hacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation Vulnerability assessments Ethical hacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party More ❯
Posted:

CISO / Cyber Security Assurance Lead (EUC / MDM Focus)

slough, south east england, united kingdom
Hybrid / WFH Options
Refreshing Recruitment Ltd
continuous threat models). Ensure alignment with assurance frameworks (Government Security Classifications (GSC), NCSC guidance, Cabinet Office requirements, GDPR, ISO27001). Conduct threat and vulnerability assessments for macOS devices, MDM platforms, developer tooling, remote access, and cloud-native infrastructure. Drive secure-by-design practices, working with the security architects … GDS Service Standards, and government accreditation processes. Hands-on experience producing RMADS, SyOps, DPIAs and equivalent artefacts. Security tooling for risk assessments, threat modelling & vulnerability scanning. Security Clearance Other preferred skills include experience in DevSecOps or agile environments, knowledge of Zero Trust architecture, IAM and cloud native security practices. More ❯
Posted: