with security aspects of critical technologies (e.g., Linux, Windows, Cloud, Web, Network, Firewalls, Application Firewalls, IDS/IPS, Authentication, Authorization, DNS, Load Balancers and VulnerabilityAssessment Tools. Proficient understanding of system and security development lifecycles and Agile methodologies Knowledge and comprehension of scripting languages preferred for automation tasks more »
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
San Antonio, Texas, United States Hybrid / WFH Options
Leidos
C2E members and teams, delegated authorizing officials and other government security representatives. Adherence to all aspects of the Information Assurance (IA) program, Preparation of Assessment and Authorization (A&A) documents, procedures, and policies to ensure the organization is secure. A Hybrid work plan is in place and the mission … related experience. DoD 8570 IAT-II or above Knowledge of various security concepts: enterprise cloud architecture, infrastructure security and compliance, data encryption, continuous monitoring, vulnerabilityassessment, security control validation, etc. Supports secure systems operations and maintenance Effectively communicate, conduct meetings, and brief executive leadership, key stakeholders and customers more »
with a broad knowledge of Security Operations, Access Management, and Policy Development. Understanding of security frameworks such as NIST or ISO 27001 Knowledge of vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Analytical mindset and problem-solving abilities to assess security risks and propose appropriate mitigation more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
identifying vulnerabilities, enhancing security measures, and ensuring the safety of our clients’ digital environments. Your responsibilities will span a wide range of tasks, from vulnerability scanning to technical content creation. Responsibilities: Vulnerability Detection and Automation: Collaborate with our security team to scan customer systems for critical vulnerabilities. Develop … new vulnerability checks using tools like Nuclei. Curate crowd-sourced checks for inclusion in our Intruder platform. Automate penetration testing processes to scale across multiple clients simultaneously. Rapid Response and Custom Scanning: Conduct custom scans on customer targets to identify emerging critical weaknesses. Provide rapid response solutions to address … Occasionally participate in industry events and conferences. Qualifications and Experience: Industry Experience: Minimum of 2 years in offensive security roles. Proven track record in vulnerabilityassessment and penetration testing. Educational Background: Technical academic background in software engineering or cyber security. Certifications (One or More): OSCP OSWE OSEP CRT more »
and support of application security tools (ie. IAST/MAST/DAST/SAST) Has advanced in-depth knowledge of security protocols and standards, vulnerabilityassessment tools, security application suites, penetration testing tools and advanced understanding of countermeasures/mitigation techniques. About Walgreens Boots Alliance Walgreens () is included more »
Burton Upon Trent, England, United Kingdom Hybrid / WFH Options
Clinigen
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
implement solutions, and ensure compliance with standards. Responsibilities: Monitor networks for security issues. Investigate breaches and incidents. Install security measures and document incidents. Conduct vulnerability assessments and testing. Implement patches and updates. Collaborate with vendors and maintain documentation. Stay informed about security standards. Skills and Experience: Bachelor's degree more »
Assist in the deployment and configuration of security technologies, such as firewalls, intrusion detection systems, and security information and event management (SIEM) solutions. Conduct vulnerability assessments and penetration tests to identify potential weaknesses in OT environments. Participate in incident response activities, including monitoring and analysis of security events. Stay more »
environments and the seamless integration of new code into production. Security Compliance : Maintain and enforce security standards required by regulatory bodies; manage access controls, vulnerability assessments, and security audits. Performance Optimization : Optimize system configurations to manage load and latency to meet the demands of high-speed trading. Disaster Recovery more »
security compliance regulations and standards such as HIPAA, HITECH, PCI DSS and/or ISO27000 required. Excellent presentation and communication skills preferred. Experience with vulnerability assessments, risk analysis, contingency planning and auditing required. Vendor negotiation experience preferred. ADA ESSENTIAL FUNCTIONS: Hearing: within normal limits with or without use of more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
and coordination. Security Operations & Monitoring: Collaborate with the SOC to analyse and respond to security events. Regulatory Compliance: Ensure compliance through assessments and reporting. Vulnerability Management: Conduct vulnerability assessments and remediation (Qualys or similar vulnerability management tools). Incident Investigation & Forensics: Conduct forensic investigations following incidents to more »
Diploma/GED and at least 9 years experience in IT security. At least 4 years of experience working with security protocols and standards, vulnerabilityassessment tools, packet analyzers, scripting languages and security management suites, penetration testing tools and countermeasures and mitigation techniques applied to web applications. Experience more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
the MSSP's contacts through status tracking, informal comms, review sessions with the MSSP functionality to analyse value delivered, SLAs, enhancements, review control and vulnerability assessments to identify control weaknesses and assess remedial action. Regarding Incident management you will ensure that Incident information is shared with all relevant stakeholders more »
day one you will bring: experience in a penetration testing or security consulting role, a minimum of 3 years. in delivering penetration tests and vulnerability assessments for applications, network infrastructure and cloud services. professional certification is highly desirable, such as OSCP or CREST CRT. with commercial security tools such more »
Renton, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Seattle, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Tacoma, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Redmond, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »