Vulnerability Assessment Jobs in Somerset

1 to 3 of 3 Vulnerability Assessment Jobs in Somerset

Cyber Security Engineer

Somerset, England, United Kingdom
Capula
e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incident response plans, forensic capabilities, and regulation compliance). Conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. Lead collaboration efforts with other cybersecurity more »
Posted:

OT Cyber Security Lead (Nuclear)

Somerset, South West, United Kingdom
Morson Talent
As the OT Cyber Security Lead, you will lead and drive project delivery with one other senior individual. It would suit someone with a Vulnerability Analysis, PLC's and Risk background to drive projects. You will be leading and driving OT Cyber practices from scratch allowing autonomy for you … to address critical security risks such as antivirus software, encryption, patch management, insider threat protection, incident response plans, forensic capabilities, and regulatory compliance. Performing vulnerability assessments and administrative audits on client computer systems and network devices, particularly focusing on the nuances of Operational Technology testing. Key skills: Experience with more »
Employment Type: Permanent
Posted:

Cyber Security Engineer

Highbridge, England, United Kingdom
Peaple Talent
a keen interest in cybersecurity, we would love to hear from you. In this role, you will manage our organisation's security infrastructure, conduct vulnerability assessments, and develop cyber incident response plans. You will work with cross-functional teams to identify security risks and stay current with cybersecurity developments. … the company, working with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetration testing to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with more »
Posted: