Basingstoke, England, United Kingdom Hybrid / WFH Options
Matrix
Understanding the needs of stakeholders and implementing this into the DevOps process. • Working on ways to automate and improve development and release processes. • Building, testing and deploying automated Infrastructure As Code Pipelines • Deploying new software releases via CICD pipelines. • Administering and maintaining all production and development environments • Create detailed … protocols, firewalls (Network Virtual Appliances) and routing Experience of hardening IT infrastructure based on security audits, standards and industry best practice (e.g. vulnerability scanning, Penetrationtesting and ISO27001/17/18). more »
Energus, Blackwood Road, Lillyhall Industrial Estate, Lillyhall, Workington, England
ENERGUS
how these relate to each other and lead to risk and harm Security assurance concepts and how assurance may be achieved in practice (e.g. penetrationtesting and extrinsic assurance methods) Building a security case - deriving security objectives with reasoned justification in a representative business scenario Cyber security concepts …/Successful completion of this apprenticeship will open a wide range of professional cyber security opportunities to you, including: Cyber Operations Manager Security Architect Penetration Tester Security Analyst Risk Analyst Intelligence Researcher Cyber Security Specialist Information Security Analyst Governance & Compliance Analyst Apprenticeship Standard Cyber security technologist (2021) (level more »
to safeguard data transmitted over O-RAN and 5G Core interfaces. JOTS Compliant solutions in both O-RAN and 3GPP environments for commercial deployment. penetrationtesting to identify vulnerabilities on RAN and Core network and recommend remediation measures. Requirements: 3 years' working experience within enterprise networking technical understanding more »
implementation in GCP In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetrationtesting tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/CD pipelines more »
Mitre Attack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetrationtesting, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors more »
we help to protect our customers from current and emerging security threats. We provide a full spectrum of cyber security services including CREST-certified penetrationtesting, 24/7 threat monitoring, compliance support and security training to help organisations protect against today’s evolving threat landscape. Interested? If more »
to ensure they are engaged for any integrations to existing Tech managed products for example Single Sign on.Lead on and with facilitating and coordinating penetrationtesting for business owned products. Ensure tests are scoped and vulnerabilities are remediated in line with SLA. Work with business and external suppliers.Track more »
their improvement. • Training and development of direct reports. • Upkeep of Comms rooms and services securing their power. • Overseeing associated security services. (Firewalls/Pen testing/compliance updates) • Planning and running team meetings and workshops. • Participating in and being an escalation point of Out of Hours support. • Ensuring that more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
essential. Key Responsibilities Responsible for educating the workforce on information security through training and building awareness. Threat modelling, mitigation, validation, including software and hardware penetration testing. Work with all functions of the IT department to design security into the system and drive security reviews. Develop tools to assist in more »
integrity and stability of the network. Responsible for network security, including the support of internal governance meeting as well as external third-party pen testing and applicable audits. Develop a culture of continuous improvement, specifically around tooling, capabilities and efficiency (Automation, Monitoring, Systems, Skills). Stay up-to-date more »
Company Description CyberCrowd is a market leader in the realm of cyber security, offering a comprehensive range of services including Assessment Services, Pen Testing, CISOaaS, Certification Readiness, DPO services, Training and Awareness, Incident response, and a 24/7 x 365 Managed Security Operations Centre. We work with both … utilisation reports. This role requires strong analytical skills and the ability to work effectively in a dynamic environment. Key responsibilities Coordinate security projects including penetrationtesting, consultancy, and managed security operations Develop and maintain project plans, schedules, and budgets. Track project progress and ensure timely completion of project more »
Manchester, England, United Kingdom Hybrid / WFH Options
Henderson Scott
design and approach achieve the desired security outcomes and are operationally viable. Supporting change initiatives in utilising central security services, such as security monitoring, penetrationtesting, and access management. Ensuring security control requirements are met throughout the project life cycle, in collaboration with our Application Security Testingmore »
Responsibilities: Manage the Security Operations and Engineering team Oversee security products, solutions, and services Ensure security controls meet regulatory standards and operate effectively Manage penetrationtesting activities Monitor infrastructure, including Cloud, for potential weaknesses and breaches Work with external partners to maintain an excellent level of service Assess more »
GL20, Mitton, Gloucestershire, United Kingdom Hybrid / WFH Options
Four Squared Recruitment Ltd
a Technical Pre-Sales Consultant, you'll play a crucial role in supporting pre-sales activities across the core services, focusing on technical assurance, penetrationtesting, and incident response. Your duties will include responding to inbound sales enquiries, managing leads and opportunities in the CRM, arranging technical scoping more »
lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerability management processes, penetrationtesting and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. Working across the more »
a focus on exceptional customer service and operational excellence. ------------------------------------------------------------------------------------- Skills and experience Minimum of 5 years’ experience in endpoint security, malware analysis, threat hunting, penetrationtesting, incident response, reverse engineering, or digital forensics. Must have strong experience in the operational side. Comprehensive knowledge of AWS cloud infrastructure, including more »
perspective to ensure suppliers and products are fit for purpose and comply with minimum security requirements Lead and support the execution of 3rd party penetrationtesting across the business enterprise Respond to and support internal and external audit exercises by articulating architectures, describing operational security processes and collecting more »
have a solid development experience with various languages, e.g. Java, Python and Go;You have worked with or experienced various security exercises for example, penetrationtesting, security researching, red teaming or bug bounty programs;You have experience with security tooling such as SAST, DAST and SCA;Great communication more »
environmentYou have previous software development experience and a good understanding of modern programming approachesYou have worked with or lead various security exercises for example, penetrationtesting, security researching, red teaming or bug bounty programs;You have experience in architectural design of complex engineering solutions, in particular to security more »
to the team’s ways of workingYou’ll be part of a broader Enterprise Vulnerability Management team, working among people skilled in scanning, pen testing, data analytics and driving security improvements with other teams. You’ll be part of defining and implementing on the strategic direction of the function more »
and maximise process efficiencies to drive exciting product launches. ⚙️💡🔧✅ Responsibilities: Build, retain, and motivate a growing engineering team with diverse skillsets (software development, SRE, testing, project management). Own the product roadmap, ensuring timely delivery of high-quality, innovative medical devices. Oversee the entire product lifecycle, from strategy and … Implement a robust software development process compliant with medical device regulations (ISO 13485, ISO-IEC 62304). Champion information security (ISO 27001) through design, penetrationtesting, and secure coding practices. Lead product management, managing backlog prioritization and stakeholder inputs for frequent releases. Drive the adoption of best practices … scalable and robust engineering processes to support company expansion. Communicate engineering strategy to stakeholders and the board. Oversee the AWS cloud infrastructure for development, testing, production, and continuous integration/deployment. Experience Requirements: Over 7 years experience in Leadership in Medical Imaging Deep understanding of one medical imaging modality more »
Security Analyst - SC - IT Health Check - Milton Keynes - £400-450/Day Outside Security Analyst - IT Health Check - penetrationtesting - vulnerability scanning The successful Security Analyst will need to demonstrate commercial experience in the following areas: Vulnerability scanning and manual analysis of internal network Desktop and server build more »
with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetrationtesting to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with the IT more »