Birmingham, West Midlands, West Midlands (County), United Kingdom
ARM
technology and Security Operations Centre management. Key focus areas for this role, the ideal candidate will have experience in each of the below; Threat & Vulnerability Management Security Operations Centre - 24/7 Outsourced Web & Content Filtering - ProofPoint, Zscaler, etc. Endpoint Security Infrastructure Security Accountabilities * Lead the Security Operations pillar … determining and delivering requirements, methods, and tools to provide value and reduce risk across proactive monitoring, incident response, threat management and vulnerability management (among other activity) . * Lead the creation and maintenance of Security Operations policy, standards procedures, and documentation (including playbooks and guidance). * Manage the application and … Provide expert advice on threat intelligence activities, identifying which threat categories are most dangerous to the organization and how to defend against them. * Manage vulnerabilityassessment activities within company IT, providing expert advice where necessary in the review of vulnerabilityassessment tools and techniques. * Develop, maintain more »
requirements Conduct periodic internal assessments to evaluate adherence to Information Security Frameworks and compliance standards, driving continuous improvement and implement corrective actions based on assessment findings Stay updated with industry trends, best practices, regulatory standards and amendments in Information Security Frameworks Develop strategic plans outlining security objectives and domain … knowledge sharing and cooperation to leverage expertise from external entities Develop a comprehensive framework for assessing the security posture of Material IT Suppliers, outlining assessment criteria, methodologies, and evaluation metrics Working with the Head of IT Service, establish mechanisms to verify and validate the compliance of material IT suppliers … potential risks and threats to the organisation's assets and operations Develop and implement risk mitigation strategies based on the findings from risk assessments, vulnerability testing, and penetration testing reports Organise and oversee regular vulnerability assessments and penetration testing activities to identify weaknesses and potential entry points for more »
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. Responsibilities: Thoroughly evaluate proposed and current solutions to ensure compliance with established … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityassessment and a penetration test more »
ensuring the safety and integrity of digital assets and data. You will complete apprenticeship training to enable you to develop into the below responsibilities: VulnerabilityAssessment: Assist in regular vulnerability assessments to identify weaknesses in systems and applications Incident Response: Collaborate with senior engineers to respond to … and alerts for signs of unauthorized access or suspicious activity Security Awareness Training: Participate in educating employees about security protocols and safe practices Risk Assessment: Evaluate risks associated with new technologies or system changes Network Security: Advise in the configuration and maintenance of firewalls, intrusion detection/prevention systems more »
Job Overview: Join a dynamic and high-performing team as a Senior Analyst in Vulnerability Management & Security Testing. This role offers the unique opportunity to enhance a best-in-class Threat Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in … threat management, vulnerabilityassessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and devices. Analyze risks associated with vulnerabilities, provide detailed reporting, and recommend actionable remediation strategies. Work collaboratively … across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely and effective resolution of security vulnerabilities. Requirements: Extensive experience in vulnerability management and remediation, including hands-on experience with vulnerability scanning tools. Good knowledge of Exabeam, Tenable.io and Tenable.sc would be considered a positive more »
maintain security controls, policies, and procedures to protect internal and client environments. Implement and maintain cybersecurity products to safeguard internal and client infrastructures. Perform vulnerability assessments and penetration testing to identify security weaknesses and recommend remedial actions. Collaborate with internal teams and clients to address security needs or concerns more »
the organization's network and systems. Utilize various security tools and methodologies to identify and address potential vulnerabilities before they are exploited. Assist in vulnerability assessments and penetration testing activities. Evaluate and prioritize identified vulnerabilities for remediation by collaborating with IT and system administrators. Create detailed reports on security more »
with a broad knowledge of Security Operations, Access Management, and Policy Development. Understanding of security frameworks such as NIST or ISO 27001 Knowledge of vulnerabilityassessment tools, incident response frameworks, and risk management methodologies. Analytical mindset and problem-solving abilities to assess security risks and propose appropriate mitigation more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
informed about emerging threats and technologies. 2. Incident Response and Security Operations: Develop incident response plans and coordinate security incident handling. Oversee security monitoring, vulnerability assessments, and penetration testing. Manage security incidents and coordinate with relevant teams. 3. Security Awareness and Training: Promote security awareness across the SGS. Conduct more »
Burton Upon Trent, England, United Kingdom Hybrid / WFH Options
Clinigen
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
implement solutions, and ensure compliance with standards. Responsibilities: Monitor networks for security issues. Investigate breaches and incidents. Install security measures and document incidents. Conduct vulnerability assessments and testing. Implement patches and updates. Collaborate with vendors and maintain documentation. Stay informed about security standards. Skills and Experience: Bachelor's degree more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Idox plc
Kubernetes clusters, Docker containers, S3 buckets, and RDS databases. Respond promptly to security incidents and conduct thorough post-incident analysis to prevent future occurrences. Vulnerability Management: Conduct regular vulnerability assessments and penetration testing on AWS resources, identifying and remediating vulnerabilities in a timely manner. Implement and manage automated more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
strategies.On day one you will bring:experience in a penetration testing or security consulting role, a minimum of 3 years.in delivering penetration tests and vulnerability assessments for applications, network infrastructure and cloud services.professional certification is highly desirable, such as OSCP or CREST CRT.with commercial security tools such as Nessus more »
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Hays Technology
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Employment Type: Permanent
Salary: £54421 - £61228/annum £54,000 - 61,000 per annum
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Hays
but not be limited to): Perform comprehensive security control reviews and collaborate with external experts. Analyse IT security posture, manage OS patches, and conduct vulnerability scans; advise on risk mitigation. Investigate security breaches, preserve evidence, and maintain a Cybersecurity Incident Response Plan. Develop IT security training for users and … of cyber security Extensive practical experience in managing Microsoft server systems, NGAV, Amazon Cloud services, AD, ADFS, M365, security, public clouds, Azure services, SIEM, vulnerabilityassessment, patch management, DLP, and endpoint protection. Substantial proven expertise in supporting large corporate systems and applications within a large enterprise networked environment. more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
pipelines, Infrastructure as code, and automation to enhance software development and deployment efficiency for automotive (Motion Control) software delivery. Implement security best practices, perform vulnerability assessments, and ensure compliance with industry standards and regulations. The Senior DevOps Engineer will have: Relevant certifications (e.g., AWS/Azure Certified DevOps Engineer more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Hireful
Thorough understanding of data security principles and best practices, ideally in a regulated environment. Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. Great Opportunity Interested? Please send you cv for a swift response more »
Employment Type: Permanent, Work From Home
Salary: 65K + 5% Pension + Private Health 25 days etc
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
Hatfield, Hertfordshire, South East, United Kingdom Hybrid / WFH Options
Reed Technology
monitoring of security systems for potential threats and efficient incident management. - Establishing technical standards aligned with corporate security policies and regulatory compliance. - Conducting thorough vulnerability assessments and driving effective remediation strategies. - Engaging in security architecture reviews to identify and rectify gaps. - Playing an active role in the Change Advisory more »
South East London, England, United Kingdom Hybrid / WFH Options
Intaso
incidents, analyse root causes, and implement necessary remediation actions. - Develop and maintain incident response procedures to ensure timely and effective handling of security breaches.2. Vulnerability Management: - Conduct regular vulnerability assessments and penetration tests to identify weaknesses in our systems and infrastructure. - Collaborate with system administrators and developers to more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
and performance Implement and maintain automated testing frameworks, continuous integration, and deployment pipelines Ensure web applications are secure by following security best practices, conducting vulnerability assessments, and implementing appropriate security measures Research and evaluate new technologies, frameworks, and development tools to improve development processes and enhance application capabilities Participate more »