make well-considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches and … to fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber Security, Computer Science … a robust and trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorized access and potential threats. Substantial experience of testing and reviewing security solutions. Practical experience of effectively managing cyber incidents. Strong reasoning and advisory skills, with the ability to effectively engage with and influence senior management. Able to More ❯
mitigate potential threats and vulnerabilities ️ Configuring and managing firewalls, intrusion detection/prevention systems (IDS/IPS), VPNs, and other network security tools ️ Conducting regular network security assessments and penetrationtesting to ensure optimal security ️ Collaborating with IT and security teams to ensure proper network access controls, policies, and encryption standards are in place What We're Looking More ❯
Science, Cyber Security, or related is preferred. Relevant experience must be in information systems design, development, programming, information/computer/cyber/network security, vulnerability analysis, system auditing, penetrationtesting, computer forensics, computer systems research, and/or systems engineering (i.e., requirements analysis, design, implementation, testing, integration, deployment/installation, and maintenance). Experience in the More ❯
and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerability assessment tools, penetrationtesting methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements such as GDPR More ❯
and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerability assessment tools, penetrationtesting methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements such as GDPR More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
received reports. Proactively identify and solve issues, and respond quickly to delegated work. Communicate, document, and share your findings. Stay updated on the latest malware and security threats. Perform penetration tests and security validation on computer systems, networks, and applications. Create new testing methods to identify vulnerabilities. What you'll bring Knowledge/skills/experience: Outstanding interpersonal … abilities, and strong written and verbal communication skills. Fluent in English, both written and spoken. At least 2 years of experience in pen testing, security testing, or vulnerability assessments. Stress resistant & able to maintain focus during incidents. A strong understanding of the (Ethical) Hacker culture. Attention to detail, analytical, and problem-solving skills. Able to independently find solutions More ❯
extend it across cloud providers Collaborate with onshore and offshore teams to promote DevSecOps and security practices Configure AWS and third-party security tools, working with managed SOC and penetrationtesting providers Lead AWS security projects, ensuring correct design and delivery of security requirements Continuously improve security using automated scanning and monitoring tools Stay updated on cloud infrastructure More ❯
extend it across cloud providers Collaborate with onshore and offshore teams to promote DevSecOps and security practices Configure AWS and third-party security tools, working with managed SOC and penetrationtesting providers Lead AWS security projects, ensuring correct design and delivery of security requirements Continuously improve security using automated scanning and monitoring tools Stay updated on cloud infrastructure More ❯
extend it across cloud providers Collaborate with onshore and offshore teams to promote DevSecOps and security practices Configure AWS and third-party security tools, working with managed SOC and penetrationtesting providers Lead AWS security projects, ensuring correct design and delivery of security requirements Continuously improve security using automated scanning and monitoring tools Stay updated on cloud infrastructure More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Responsible for … risk management, intrusion detection, contingency planning, incident handling, configuration control, change management, auditing, security authorization process, principles of Cybersecurity (confidentiality, integrity, non-repudiation, availability, access control), and security testing Bachelor's Degree in Computer Science or IT Engineering or a related technical degree from an accredited college or university. In lieu of a Bachelor's degree, an additional More ❯
Terraform, Ansible, Infrastructure as Code (IaC), DevOps, Kubernetes, Docker, Pen Testing, Splunk, Nutanix, Linux, Windows Due to federal contract requirements, United States citizenship and an active TS/SCI security clearance and polygraph are required for the position. Required: Must be a US Citizen. Must have TS/SCI clearance w/active polygraph. At least eight (08) years … customer requirements. These Qualifications Would be Nice to Have: Experience operating in an agile development environment and DevOps. Experience with container technologies such as Kubernetes and Docker. Knowledge of penetrationtesting or red team operations. Experience utilizing and development with Splunk. Experience with Nutanix. Defensive Cyber Security Operations. $175,000 - $200,000 a year The pay range for More ❯
IPS, and SIEM systems to detect and respond to security threats. Analyze logs and alerts to identify unusual activity and assist in incident response and resolution. Support vulnerability assessments, penetrationtesting, and apply patches to mitigate risks. Configure network switches and endpoints as part of NAC upgrade projects. Install, configure, and support Cisco IP phones and IPC services. More ❯
IPS, and SIEM systems to detect and respond to security threats. Analyze logs and alerts to identify unusual activity and assist in incident response and resolution. Support vulnerability assessments, penetrationtesting, and apply patches to mitigate risks. Configure network switches and endpoints as part of NAC upgrade projects. Install, configure, and support Cisco IP phones and IPC services. More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide a More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide a More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: We are More ❯
controls to secure systems, applications, network, or infrastructure services Hands-on experience with security tools and devices such as network firewalls, web proxy, intrusion prevention system, vulnerability scanner, and penetrationtesting tools. Demonstrated understanding of TCP/IP networking concepts and DNS. 3+ years of related Identity Management tools engineering experience, including installing, configuring and troubleshooting experience with More ❯