Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
team to keep the cogs turning. This is where you come in. Supporting our Security & Networking Manager, youll: Demonstrate your experience of managing a vulnerabilityassessment programme. Undertake internal testing to understand strengths and risks of NCCs IT security. Work with threat intelligence to identify risks and potential more »
the MSSP's contacts through status tracking, informal comms, review sessions with the MSSP functionality to analyse value delivered, SLAs, enhancements, review control and vulnerability assessments to identify control weaknesses and assess remedial action. Regarding Incident management you will ensure that Incident information is shared with all relevant stakeholders more »
day one you will bring: experience in a penetration testing or security consulting role, a minimum of 3 years. in delivering penetration tests and vulnerability assessments for applications, network infrastructure and cloud services. professional certification is highly desirable, such as OSCP or CREST CRT. with commercial security tools such more »
be responsible for the management of our IT security systems and applications, incident response, digital forensics, loss prevention, and eDiscovery actions, conducting risk and vulnerability assessments, and developing and implementing security controls. You'll research, evaluate, and recommend new security tools, techniques, and technologies in alignment with our IT more »
Bellevue, Washington, United States Hybrid / WFH Options
The Pokémon Company International
Performs cloud security audits and testing and evaluates system security configurations to ensure efficacy and compliance with policies and procedures. Oversees penetration testing and vulnerability assessments of applications, operating systems and/or networks. Alongside the Information Security team, responsible for responding to and remediating security events/incidents. more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
experience with the security aspects of critical technologies (e.g., Linux, UNIX, WAF, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication, Authorization, DNS, VulnerabilityAssessment Tools). A basic understanding of project management and system development lifecycle methodologies is preferred. A basic understanding of Application Security, Attacks more »
experience with the security aspects of critical technologies (e.g., Linux, UNIX, WAF, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication, Authorization, DNS, VulnerabilityAssessment Tools). A basic understanding of project management and system development lifecycle methodologies is preferred. A basic understanding of Application Security, Attacks more »
experience with the security aspects of critical technologies (e.g., Linux, UNIX, WAF, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication, Authorization, DNS, VulnerabilityAssessment Tools). A basic understanding of project management and system development lifecycle methodologies is preferred. A basic understanding of Application Security, Attacks more »
experience with the security aspects of critical technologies (e.g., Linux, UNIX, WAF, Windows, Web, LDAP, DBMS, Network, Firewalls, IDS/IPS, Authentication, Authorization, DNS, VulnerabilityAssessment Tools). A basic understanding of project management and system development lifecycle methodologies is preferred. A basic understanding of Application Security, Attacks more »
work, ensuring the security integrity of software applications throughout the development lifecycle. Responsibilities: - Design, implement, and maintain application security measures - Conduct code reviews and vulnerability assessments - Collaborate with development teams to integrate security practices - Develop and enforce application security policies and procedures - Stay abreast of emerging security threats and more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches. 2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers to more »
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
and performance Implement and maintain automated testing frameworks, continuous integration, and deployment pipelines Ensure web applications are secure by following security best practices, conducting vulnerability assessments, and implementing appropriate security measures Research and evaluate new technologies, frameworks, and development tools to improve development processes and enhance application capabilities Participate more »
Weymouth, England, United Kingdom Hybrid / WFH Options
Cogito
and fine tune existing network & security infrastructure: Endpoint Security, Next Generation Firewall, encryption, email and network proxy gateways, Microsoft 365, DLP etc. comprehensive reports, assessment-based findings, outcomes, and propositions for further system security enhancement. relevant projects, initiatives, and security activities such as the security awareness program and security … emerging technologies. Good problem solving and analytical skills. in security architecture, security solution, security project implementation, security operation, security education, network penetration testing, application vulnerability assessments, risk analysis and compliance testing. driven, with a continuous improvement mind-set acumen. A proven track record as an Information Security Analyst, contributing more »
or creating new processes for improvement and minimizing wastage. Encouraging and building automated processes wherever possible. Identifying and deploying cybersecurity measures by continuously performing vulnerabilityassessment and risk management. Incidence management and root cause analysis. Coordination and communication within the team and with customers. Selecting and deploying appropriate more »
Experience: Bonus points if you have experience with: Experience creating deployment pipelines with ArgoCD Technical exposure to Containerization, Kubernetes, Helm, Kibana, Elasticsearch, Grafana Security vulnerabilityassessment and resolution The Benefits: Joining our team comes with a host of benefits, including: Flexible working arrangements (fully remote or flexible hybrid more »
bilateral onboarding of offerings in both the product and services space between TTUK&I and other Telefonica entities globally. Designing, developing, and continuously improving vulnerabilityassessment, security testing, and risk analysis methods. Designing, developing, and continuously improving the security posture, effectiveness and efficiency of the company's products more »
GitLab and Jenkins to automate the deployment process, ensuring efficient and reliable releases. Ensure the security of systems and applications through best practices, regular vulnerability assessments, and compliance with industry standards. Use tools to manage server configurations and ensure consistency across environments. Create and maintain comprehensive documentation related to more »