resolve issues Collaborate with 1st and 2nd line engineers for optimal service delivery Conduct Cyber Security tasks including Cyber Essentials Accreditations, Penetration Testing, and Vulnerability Assessments Support Cloud-based telephony/SIP trunks configuration Conduct client site visits as necessary Develop operating procedures, knowledge base, and documentation Install and more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
tactics, techniques, and procedures used by threat actors. •Security Incident Handling: Assisting with the containment, eradication, and recovery process in response to security incidents. •VulnerabilityAssessment: Participating in vulnerabilityassessment and management activities to identify and remediate security weaknesses. •Security Tool Management: Managing and configuring security more »
of emerging threats. Key Responsibilities: Monitor and analyze network traffic for unusual or suspicious activity. Investigate security breaches and other cyber security incidents. Conduct vulnerability assessments and penetration testing. Develop and implement security measures to protect information systems. Maintain and update security systems and tools. Collaborate with IT and more »
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerabilityassessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
and best practices. - Deep understanding of cloud security controls, tools (Azure Security Center), and services. - Familiarity with security testing methodologies like penetration testing and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incident response/forensics. - Knowledge of security frameworks (NIST, ISO 27001, SOC 2) and more »
prevent further spread across the organization. Document incident details, response actions, and lessons learned to improve incident response procedures and enhance endpoint security posture. Vulnerability Management: Conduct vulnerability assessments and scans on endpoints to identify software vulnerabilities, misconfigurations, and security weaknesses. Prioritize vulnerabilities based on risk assessment … a strong understanding of security principles, technologies, and best practices. Proficiency in using security tools such as SIEM, IDS/IPS, antivirus, firewalls, and vulnerability scanners. Hands-on experience with Microsoft Defender Security & Compliance Suite, Exchange Online Protection, CASB, Mimecast, Inutne Policy Deployment, Microsoft Entra ID etc… Hands-on more »
the technology division to ensure policies are followed and support business continuity. Technology Testing: Manage technology testing activities, including scenario testing and response plans. VulnerabilityAssessment: Assess and prioritise vulnerabilities, define remedial actions, and track implementation. Regulatory Compliance: Support the creation of the annual regulatory self-assessmentmore »
environment Relevant certifications in IT support are a plus Experience in data protection and management Knowledge of security protection and disaster recovery Understanding of vulnerabilityassessment and patch management Familiarity with device as a service and penetration testing If you are interested in this role, please email your more »
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
London, England, United Kingdom Hybrid / WFH Options
Mobica
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
the patching process. Monitoring security systems (IDS, Firewall, Anti-Virus) and event logs. Reporting IT KRIs/KPIs. Conduct periodic internal penetration testing and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and followed. Document standard and … Firewall (Cisco), IDS, and log monitoring software. Understanding of ITIL practices, ISO 27001 standards. (Preferred) Knowledge of EDR software, privileged access management, penetration and vulnerability tools, Change Auditor, ServiceNow. Ability to understand business processes and work effectively in cross-functional teams. Degree in Technology. 3-5 years of experience … in developing and monitoring IT infrastructure system standards. Experience in firewall/IDS monitoring. (Preferred) Certifications: CISM, CISSP, CEH. (Preferred) Experience in penetration and vulnerability testing. (Optional) Experience in patch monitoring. more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
IPS, VPNs, endpoint protection, and encryption systems. Ensure security architecture aligns with industry best practices and compliance requirements (e.g., GDPR, HIPAA, PCI-DSS) Risk Assessment and Management: Conduct security risk assessments and vulnerability assessments to identify and mitigate security risks. Develop and enforce security policies, standards, and guidelines. more »
option for you! Main responsibilities: Conduct detailed Cyber Essentials Plus assessments for a variety of clients, ensuring compliance with the standard’s requirements. Perform vulnerability assessments, penetration tests, and security audits as part of the certification process. Evaluate clients' infrastructure, policies, and practices to identify potential security risks and … areas for improvement. Provide clear and concise reports outlining assessment findings, recommended actions, and compliance status. Work closely with clients to guide them through the remediation process, offering expert advice and support to address identified vulnerabilities. Stay up-to-date with the latest cybersecurity trends, threats, and best practices … to ensure assessments are thorough and current. Collaborate with internal teams to develop and improve assessment methodologies and tools. Maintain accurate records of assessments, client interactions, and certification statuses. Participate in training and professional development activities to enhance your knowledge and skills in cybersecurity. To be considered for this more »
a keen interest in cybersecurity, we would love to hear from you. In this role, you will manage our organisation's security infrastructure, conduct vulnerability assessments, and develop cyber incident response plans. You will work with cross-functional teams to identify security risks and stay current with cybersecurity developments. … the company, working with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetration testing to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with more »
CIFs) within Corporate Functions and HR. Manage the process to monitor resilience of Important Business Services (IBS) and Critical/Important Functions (CIFs), including vulnerability assessments and remedial actions. Coordinate testing activities and facilitate scenario testing workshops. Support the creation of the Regulatory Self-Assessment and ensure internal more »
Our client, a critical national infrastructure organisation in the energy sector, are looking for Vulnerability Management Analysts to join their Security Team and lead the charge in building a robust cyber testing team to fortify their national infrastructure. As a vital member of our team, you will: Conduct regular … vulnerability assessments, utilising cutting-edge tools and techniques, to identify vulnerabilities in their systems and networks. Manage the entire lifecycle of vulnerabilities, from discovery to remediation, ensuring prompt and effective resolution. Analyse risks associated with identified vulnerabilities and collaborate with stakeholders to develop comprehensive remediation plans. Work closely with … IT teams to ensure timely application of security patches and updates. Generate detailed vulnerabilityassessment reports to communicate status and recommendations to management. Foster a culture of security awareness by providing guidance and training to employees. Essential skills and qualifications: Strong analytical and investigative skills. Knowledge of cybersecurity more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
informed about emerging threats and technologies. 2. Incident Response and Security Operations: Develop incident response plans and coordinate security incident handling. Oversee security monitoring, vulnerability assessments, and penetration testing. Manage security incidents and coordinate with relevant teams. 3. Security Awareness and Training: Promote security awareness across the SGS. Conduct more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »