As the OT Cyber Security Lead, you will lead and drive project delivery with one other senior individual. It would suit someone with a Vulnerability Analysis, PLC’s and Risk background to drive projects. You will be leading and driving OT Cyber practices from scratch allowing autonomy for you … to address critical security risks such as antivirus software, encryption, patch management, insider threat protection, incident response plans, forensic capabilities, and regulatory compliance. Performing vulnerability assessments and administrative audits on client computer systems and network devices, particularly focusing on the nuances of Operational Technology testing. Key skills: Experience with more »
West Midlands, Stafford, Staffordshire, United Kingdom
VIQU Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and more »