mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
IS programmes and ensure compliance with identified standards and maintain data security. Key Responsibilities: Collaborate with internal and global teams to manage and reduce vulnerability assessments and remediation across server and end-user computing estates. Manage and update the OneTrust platform, including new assessments, asset reviews, and vendor onboarding. more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Persistent Systems
the work with the offshore team. Candidate should have effective communication skills with excellent customer handling capabilities. Experience required: 1. Experience on Infrastructure & Application Vulnerability Assessments and Management. Validate and triage identified vulnerabilities. 2. Experience in vulnerability remediation. 3. Hands-on experience on SAST, DAST, SCA, Container scanning … issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent development with quarterly assessment cycles and company-sponsored certifications. Working with cutting-edge technologies. Engagement initiatives such as project parties, flexible work hours, Persistent Business Run. Private medical and more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Intaso
Interviews available immediately Intaso’s long standing client are seeking a dynamic individual to join their Security Operations team as the Security Vulnerability Manager, a pivotal role within their organization. This position will focus on identifying, monitoring, analysing, and facilitating the remediation of vulnerabilities across their systems. Key Responsibilities … Develop and document a comprehensive vulnerability management strategy aligned with stakeholder and business need Create intuitive reporting and dashboarding mechanisms to convey threat and risk profiles associated with vulnerabilities to stakeholders Ensure regular vulnerability scans cover all IT and OT assets, maintaining up-to-date coverage. Collaborate with … IT and OT asset owners to execute vulnerability and compliance scans in a controlled manner. Partner with both technical and non-technical stakeholders to devise effective mitigation plans for identified vulnerabilities. Lead cross-functional teams in responding to high-risk or complex vulnerabilities, leveraging technical expertise. Stay informed about more »
Stafford, Staffordshire, West Midlands, United Kingdom Hybrid / WFH Options
Viqu Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Leidos Innovations UK Limited
ensure that our cloud infrastructure is secure and compliant with industry standards and regulations. You will also monitor and respond to security incidents, perform vulnerability assessments and penetration testing, and develop and maintain security policies and procedures. Responsibilities: Support the LCST Security Working Groups which require close co-operation … AWS architecture best practices and best-in-class security standards Review relevant Cyber Risk alerts/notifications and MODCERT notices, assess impact on and vulnerability of our solution, define actions to take and work with the technical teams to design, and implement mitigating solutions within required timeframes Duties may … monitoring and operating intrusion detection systems Act as IS focal point for cyber incidents and lead IS response to security incidents and alerts Conduct vulnerability assessments and support penetration testing. Develop and maintain security policies and procedures Collaborate with development and operations teams to ensure security best practices are more »
with a broad knowledge of Security Operations, Access Management, and Policy Development. Understanding of security frameworks such as NIST or ISO 27001 Knowledge of vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Analytical mindset and problem-solving abilities to assess security risks and propose appropriate mitigation more »
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerabilityassessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
My client is a leading and technology-driven company in the financial industry. I’m currently seeking a skilled Threat and Vulnerability Engineer to join their cybersecurity team. As a Threat and Vulnerability Engineer, you will play a crucial role in safeguarding our systems and data from potential … threats and vulnerabilities. To be successful in this role, you should have proven experience as a Threat and Vulnerability Engineer in a high performing environment or team and possess In-depth knowledge of threat landscape, vulnerabilityassessment, and penetration testing techniques. You will need to be skilled more »
processes and adhering to best practices. Knowledge of penetration testing methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerabilityassessment tools. Extensive switching, routing and firewall experience. Experience in producing implementation documents (e.g. new office setup). Extensive VPN and Global network more »
London, England, United Kingdom Hybrid / WFH Options
Sky
environments. Analyse current use of certificates by individual Sky business and infrastructure teams. Assist onboarding new teams into the PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management. Work with App Service managed certificates, private and public certificates, and certificates from Key more »
work, ensuring the security integrity of software applications throughout the development lifecycle. Responsibilities: - Design, implement, and maintain application security measures - Conduct code reviews and vulnerability assessments - Collaborate with development teams to integrate security practices - Develop and enforce application security policies and procedures - Stay abreast of emerging security threats and more »
London, England, United Kingdom Hybrid / WFH Options
Sky
and automation and Thales HSMs Understand details of existing certificate use-cases and prepare onboarding roadmaps to the new PKI service. Work with Cyber vulnerabilityassessment teams to prioritise onboarding to automated certificate management by bringing in your technology understanding. Participate in the technical support of the PKI more »
Weymouth, England, United Kingdom Hybrid / WFH Options
Cogito
and fine tune existing network & security infrastructure: Endpoint Security, Next Generation Firewall, encryption, email and network proxy gateways, Microsoft 365, DLP etc. comprehensive reports, assessment-based findings, outcomes, and propositions for further system security enhancement. relevant projects, initiatives, and security activities such as the security awareness program and security … emerging technologies. Good problem solving and analytical skills. in security architecture, security solution, security project implementation, security operation, security education, network penetration testing, application vulnerability assessments, risk analysis and compliance testing. driven, with a continuous improvement mind-set acumen. A proven track record as an Information Security Analyst, contributing more »
Author High Level and Low Level Design Documents to support Carrier Grade Mobile Services Own software/hardware selection perform bug scrubs and security vulnerability assessments and work with Test and Delivery engineers to review test plans, defects, test reports, MOP and change tickets. Drive platform improvements enable automation more »
Greater London, England, United Kingdom Hybrid / WFH Options
Franklin Fitch
are looking for an enthusiastic and innovative IT Security Engineer. Security Engineer main responsibilities will include, but are not necessarily limited to, the following: Vulnerability Management o Take lead on the daily vulnerability management activities, including but not limited to application vulnerability and infrastructure vulnerability assessments. … Manage prioritisation of vulnerabilities through a risk-based approach, to meet patch management policies, regulatory compliance, and audit findings. o Management and configuration of vulnerability management tools (Microsoft Azure and Qualys) o Support the InfoSec function in proactively identifying and leveraging threat intelligence sources to inform strategic vulnerabilitymore »
SE1, Blackfriars, Greater London, United Kingdom Hybrid / WFH Options
Profile 29
upgrades. Implement and maintain backup and recovery strategies for Servers. Implement and enforce security measures to safeguard server infrastructure. Conduct regular security audits and vulnerability assessments. Ensure compliance with industry regulations and best practices. Other stuff; £’s: flexible – in the region of £300 per day (direct contract between you more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Requirement Description Duties and Role Senior Online VulnerabilityAssessment (OVA) Analyst Location: Mons, Belgium Contract role Until end of Dec 2024 Under the direction of the NCSC Security Compliance (OVA) Cell Head/Service Delivery Manager, the incumbent shall execute following tasks: • Configure and maintain the following modules … Daily: verify that the OVA scans are configured correctly and that the information collected is accurate. • Weekly: after analysing the data, deliver a comprehensive vulnerability reports to each stakeholder/CIS personnel under you area of responsibility taking into account all vulnerabilities posing a security risk, remediation actions recommended … report is due if that week does not include any working day (for instance: long official holidays such as Christmas break). • Monthly: deliver vulnerability report to the stakeholders/CIS personnel, with an overview of the critical/high vulnerabilities identified, the status of the recommended actions to more »
skills within a dedicated security advisory team? This role exists within Aviva’s CISO team and is responsible for carrying out consultancy and risk assessment activities across multiple geographical areas, business areas and change disciplines. If you feel this is something to which you could bring benefit to, or … each other. This is accomplished through knowledge sharing and maintaining an enjoyable working environment. Skills and experience we’re looking for: Experience utilising Risk Assessment methods and frameworks (IRAM2, OCTAVE, NIST, ISO 27005 etc). Exposure to Information Security Management System frameworks and standards and their application. Partnered with … management, application security & cloud security and associated compliance frameworks such as SOX, PCI-DSS etc. Previous use of security technologies (firewalls, WAFs, DLP, cryptography, vulnerability scanning, identity and access management, etc). The ability to carry out threat modelling, vulnerabilityassessment, control effectiveness review and risk assessmentmore »
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in … threat management, vulnerabilityassessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive more »
City & Guilds. In this role you will lead and act as subject matter expert for computer and network threat intelligence, incident responses, investigations and vulnerability assessments that pertain to different types of cyber threats, including malware, data theft, denial of service, and data breaches. You will collaborate with a … infrastructure and systems. You will have extensive experience of technologies including but not limited to Firewalls, IPS & IDS, Active Directory, Windows Server, Linux, AWS, Vulnerability management and SIEM, DRM. We would expect you to have a familiarity with industry security standards such as NIST, Cyber Essentials, ISO27001 and GDPR. more »
London, England, United Kingdom Hybrid / WFH Options
Infused Solutions
discuss the clients needs. SKILLS: 1 year+ commercial experience as a penetration tester or similar Experience with Red Teaming exercises such as simulated attacks Vulnerability Assessments and Scans Infrastructure and Web Applications Stakeholder experience Team player and good collaborator Good communication skills Salary: £40,000-70,000 This is more »
backend, and Cloud infrastructure developers to ensure secure development practices. Design and implement a robust test strategy encompassing static code analysis, secrets management, and vulnerability assessments. Champion the adoption of security controls and strategies for runtime monitoring and defence. Evaluate and optimize cryptography algorithms and container security measures. Conduct more »
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityassessment and a penetration test more »