updates and undertake administration duties of the WAND system working closely with colleagues in IT. You will ensure any future updates requested by regulators, management or operatives regarding the riskassessment process are appropriate and deliverable. You will also be required to assist and support your team and colleagues in water planning and engineering team during periods of … process of repeated poor performance or noncompliance from authors or approvers as determined by the audit. Youll also deliver training (where required) to authors and approvers of the WAND riskassessment database in line with protocol as well as (where required) refresher training for authors and approvers failing an audit. Youll drive the relevant processes for exceptional circumstances … methods are ineffective whilst considering all associated risks including SI, CML, DG3, WQ and Leakage. What skills & qualifications you will need: Knowledge and understanding/experience of the WAND riskassessment system. Ability to create a WAND document of exemplary quality in accordance to protocol and best practice. Knowledge and understanding of the WAND protocol. Knowledge and understanding More ❯
Wotton-Under-Edge, Gloucestershire, South West, United Kingdom Hybrid/Remote Options
Renishaw PLC
regulations, including the Cyber Resilience Act. Responsibilities Assess, establish and maintain clear guidelines and best practices for secure coding, vulnerability management, and incident response Develop and maintain product security riskassessment processes, providing support and guidance to project teams Develop scanning and review processes to discover security vulnerabilities and devise mitigation strategies, as well as report and resolve …/Masters degree or equivalent work experience in Computer Science, Information Security, Business, or a related field circa 3 years of work experience in cybersecurity, especially in an information risk analysis, security engineering or security architecture role Key requirements Experience in performing penetration testing, secure code review, software composition analysis, static, dynamic and manual code review Experience identifying and … remediating common vulnerabilities, such as OWASP Top 10 Hands-on experience with security scanning tools Proven experience in secure coding practices and vulnerability assessment Experience securing hardware products controlled by software would be an advantage Experience applying AI to security and development use cases Familiar with threat modelling frameworks, and having experience with automated tools Knowledge and skills Excellent More ❯
Bournemouth, Dorset, South West, United Kingdom Hybrid/Remote Options
Hays
charts, ArgoCD, and GitOps practices. Monitoring, Security & Networking * Experience designing advanced monitoring and alerting systems. * Solid grasp of networking concepts (TCP/IP, DNS, HTTPS, etc.) and information security riskassessment in cloud environments. Software & Database Knowledge * Familiarity with Nginx, PHP, MySQL, and NoSQL technologies like RabbitMQ, SOLR, Couchbase. Leadership & Collaboration * Strong communication skills and ability to lead More ❯