strategies. Provide expert solution architecture expertise and ownership throughout all stages of the solutions design engagement life cycle. Undertake installation site surveys, inspections, and vulnerability assessments. Identify, document, and escalate risks or non-conformance to project owners and provide resolution advice. Produce vulnerabilityassessment documentation. Required Skills … Working knowledge and hands-on experience of Penetration Testing. Working knowledge and hands-on experience of techniques and tools in conducting vulnerability scanning and assessments (such as Nessus, Nmap, Nipper). Working understanding and hands-on experience of Information Communication Technologies in at least two of the following: Enterprise more »
strategies. Provide expert solution architecture expertise and ownership throughout all stages of the solutions design engagement life cycle. Undertake installation site surveys, inspections, and vulnerability assessments. Identify, document, and escalate risks or non-conformance to project owners and provide resolution advice. Produce vulnerabilityassessment documentation. Required Skills … Working knowledge and hands-on experience of Penetration Testing. Working knowledge and hands-on experience of techniques and tools in conducting vulnerability scanning and assessments (such as Nessus, Nmap, Nipper). Working understanding and hands-on experience of Information Communication Technologies in at least two of the following: Enterprise more »
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
phishing attacks, and network intrusions. Perform detailed forensic analysis to determine the root cause and impact of security incidents. Security Assessments & Hardening: Execute regular vulnerability assessments and penetration tests to identify and address security weaknesses. Implement and manage security controls to harden systems against attacks. Policy Development & Compliance: Collaborate … lateral movement. Solid grasp of network fundamentals (OSI Stack, TCP/IP, DNS, HTTP(S), SMTP). Experience with security monitoring, incident response, and vulnerability management. Excellent problem-solving and analytical skills. Strong communication and interpersonal skills. Ability to thrive in a fast-paced, dynamic environment. Experience with cloud more »
as needed. Role Your duties will include: Write a clear and concise test strategy covering both functional and non-functional requirements (e.g. security/vulnerabilityassessment, load/performance and usability), applying automated and manual methods as appropriate Testing requirements and user stories to ensure they are well … result in teams agreeing on the understanding of requirements Plan, execute and report exploratory testing sessions for risks and features Use a balanced risk assessment to identify the most valuable ways to apply testing and improvement activities Determination and tenacity to expose the true behaviour of a system and more »
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
brighton, south east england, United Kingdom Hybrid / WFH Options
Hays
other teams in the organisation, and the ability to build strong internal relationships with other members in the business. You will be experienced with vulnerability assessments and Cyber Assurance. 4+ years of experience in cyber security, with a proven track record of progressively increasing responsibilities. Strong technical expertise in … areas such as network security, intrusion detection/prevention, endpoint security, encryption, and vulnerability management. Experience with leading or mentoring cyber security professionals. Strong knowledge and experience with recognised Cyber Security frameworks (e.g., NIST, ISO 27001, CIS Controls). Excellent communication skills, with the ability to effectively convey complex more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
computer science, management information systems or other related disciplines Qualifications Knowledge of electronics theory, information technology, telecommunications and supervisory and control systems including cryptography, vulnerabilityassessment and exploitation techniques Completion of Undergraduate Cyberspace training and mission qualification training in specialty area Completion of a current Single Scoped Background more »
for hidden threats and vulnerabilities within the organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate with … IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about more »
the work with the offshore team. Candidate should have effective communication skills with excellent customer handling capabilities. Experience required: 1. Experience on Infrastructure & Application Vulnerability Assessments and Management. Validate and triage identified vulnerabilities. 2. Experience in vulnerability remediation. 3. Hands-on experience on SAST, DAST, SCA, Container scanning … issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent development with quarterly assessment cycles and company-sponsored certifications. Working with cutting-edge technologies. Engagement initiatives such as project parties, flexible work hours, Persistent Business Run. Private medical and more »