Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
Burton Upon Trent, England, United Kingdom Hybrid / WFH Options
Clinigen
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
informed about emerging threats and technologies. 2. Incident Response and Security Operations: Develop incident response plans and coordinate security incident handling. Oversee security monitoring, vulnerability assessments, and penetration testing. Manage security incidents and coordinate with relevant teams. 3. Security Awareness and Training: Promote security awareness across the SGS. Conduct more »
Gloucester, England, United Kingdom Hybrid / WFH Options
Lockheed Martin Corporation
the following: Network Security - Understanding network configurations, including firewalls, VPNs, IDS/IPS systems, and network segmentation strategies. Ethical Hacking - Practicing penetration testing and vulnerability assessments to identify security vulnerabilities in systems. Incident Response - Managing and mitigating cyber attacks or breaches efficiently, understanding how to contain the breach and more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
london (city of london), south east england, United Kingdom Hybrid / WFH Options
i3
common security frameworks and compliance standards, such as NIST, ISO 27001, and SOC 2. Familiarity with security testing methodologies, such as penetration testing and vulnerability assessments. Experience with SIEM tools, such as Splunk, ELK stack, or Azure Sentinel. Understanding of secure coding practices and experience with static code analysis more »
as needed. Role Your duties will include: Write a clear and concise test strategy covering both functional and non-functional requirements (e.g. security/vulnerabilityassessment, load/performance and usability), applying automated and manual methods as appropriate Testing requirements and user stories to ensure they are well … result in teams agreeing on the understanding of requirements Plan, execute and report exploratory testing sessions for risks and features Use a balanced risk assessment to identify the most valuable ways to apply testing and improvement activities Determination and tenacity to expose the true behaviour of a system and more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
leiston, east anglia, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
preferred. Extensive experience in designing, implementing, and managing security solutions within the Microsoft Azure ecosystem. Proficiency in deploying and configuring DAST & SAST tools for vulnerabilityassessment and code analysis. Familiarity with EASM platforms and methodologies for securing enterprise applications. Strong understanding of networking concepts, cloud architecture, and security more »
e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incident response plans, forensic capabilities, and regulation compliance). Conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. Lead collaboration efforts with other cybersecurity more »