5 of 5 Vulnerability Management Jobs in Gloucestershire

Head of Cyber, Band 8b

Hiring Organisation
Gloucestershire Hospitals NHS Foundation Trust
Location
Gloucester, United Kingdom
Employment Type
Permanent
Salary
£64455.00 - £74896.00 a year
January Main duties of the job The role combines governance, assurance and hands-on leadership of proactive and preventative tactics, threat intelligence, incident response, vulnerability management, strategy and cultural change to build cyber resilience across the Integrated Care System (ICS They will have a proven track record … organisation environments; ideally within the NHS or wider public sector. They will possess deep technical and governance expertise across areas such as threat detection, vulnerability management and incident response, with the ability to translate complex technical risk into clear, articulate, actionable information for senior executives and boards with ...

Engineer Analyst (Windows OS) Vulnerability Management

Hiring Organisation
Assurant
Location
Gloucester, Gloucestershire, UK
Employment Type
Full-time
Engineer Analyst (Windows OS) Vulnerability Management/Analyst Windows Server Vulnerability Engineer United Kingdom (Virtual) The Opportunity Reporting to the Global Director of Infrastructure and Products, the Analyst Windows Server Vulnerability Engineer, will be responsible for remediation and support of distributed computing systems with reference … vulnerabilities and patching. You will work closely with application management, application development, and other IT teams to support vulnerability reduction of Windows Server infrastructure (both physical and virtual). The successful candidate must have a solid work ethic, be detail oriented, and have strong troubleshooting and analytical skills. ...

Infrastructure Engineer

Hiring Organisation
Experis
Location
Cheltenham, Gloucestershire, United Kingdom
Employment Type
Permanent
Salary
£35000 - £41000/annum
support of deployed IT infrastructure Timely troubleshooting and resolution of reported IT Infrastructure issues Regular system health monitoring and maintenance, including backups, patch-management/vulnerability management, and software/hardware upgrades in line with lifecycle management Creation, development, and maintenance of comprehensive documentation … relation to this vacancy. People Source specialise in technology recruitment across niche markets including Information Technology, Digital TV, Digital Marketing, Project and Programme Management, SAP, Digital and Consumer Electronics, Air Traffic Management, Management Consultancy, Business Intelligence, Manufacturing, Telecoms, Public Sector, Healthcare, Finance and Oil & Gas. ...

Product Security Engineering Lead

Hiring Organisation
Renishaw PLC
Location
Wotton-Under-Edge, Gloucestershire, South West, United Kingdom
Employment Type
Permanent, Work From Home
Salary
£60,000
compliant with relevant standards and regulations, including the Cyber Resilience Act. Responsibilities Assess, establish and maintain clear guidelines and best practices for secure coding, vulnerability management, and incident response Develop and maintain product security risk assessment processes, providing support and guidance to project teams Develop scanning and review … identifying and remediating common vulnerabilities, such as OWASP Top 10 Hands-on experience with security scanning tools Proven experience in secure coding practices and vulnerability assessment Experience securing hardware products controlled by software would be an advantage Experience applying AI to security and development use cases Familiar with threat ...

Product Security Engineering Lead

Hiring Organisation
Renishaw PLC
Location
Bradley Green, Gloucestershire, UK
Employment Type
Full-time
compliant with relevant standards and regulations, including the Cyber Resilience Act. Responsibilities Assess, establish and maintain clear guidelines and best practices for secure coding, vulnerability management, and incident response Develop and maintain product security risk assessment processes, providing support and guidance to project teams Develop scanning and review … identifying and remediating common vulnerabilities, such as OWASP Top 10 Hands-on experience with security scanning tools Proven experience in secure coding practices and vulnerability assessment Experience securing hardware products controlled by software would be an advantage Experience applying AI to security and development use cases Familiar with threat ...