for providing an uncompromised technology and application environment for employees, customers, clients, and shareholders through continuous comprehensive cyber security testing. CSA consists of multiple assessment teams that focuses on different technology, platform, and stakeholders.As a Manual Ethical Hacking Specialist, you will join a dynamic team of world class security … able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and more »
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
troubleshooting application software and operating systems to meet cyber security requirements as defined by the Cyber Security Design Authority, including hardening, lockdown, and running vulnerability assessments. Write and perform tests to verify, validate, and qualify the software load. Key Skills Extensive experience in authoring and reviewing technical documents. Experience more »
Southampton, England, United Kingdom Hybrid / WFH Options
LexisNexis Risk Solutions
able to analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threat analysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security … risk assessment Be excellent in oral and written communication skills and interpersonal skills Relevant certifications such as - Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), or equivalent. Be able to respond to security incidents, conducting thorough forensic investigations and meticulously preparing incident reports for management review more »
innovation and delivers better business results. Title and Summary Application Security Lead Overview This is an exciting opportunity to be part of an expanding Vulnerability Management function at Vocalink Limited, a company that enables the payments of 90% of salaries, 70% of utility bills, most ATM transactions and every … and breaches related to applications. All About You • Proven experience in application security, including hands-on experience with secure coding practices, code review, and vulnerabilityassessment tools. • Strong understanding of software development methodologies, programming languages, and web technologies. • Experience leading or managing a team of security professionals. • Excellent more »
tactics, techniques, and procedures used by threat actors. •Security Incident Handling: Assisting with the containment, eradication, and recovery process in response to security incidents. •VulnerabilityAssessment: Participating in vulnerabilityassessment and management activities to identify and remediate security weaknesses. •Security Tool Management: Managing and configuring security more »
of emerging threats. Key Responsibilities: Monitor and analyze network traffic for unusual or suspicious activity. Investigate security breaches and other cyber security incidents. Conduct vulnerability assessments and penetration testing. Develop and implement security measures to protect information systems. Maintain and update security systems and tools. Collaborate with IT and more »
Service Desk and Change Management Systems (ManageEngine) Maintain, monitor, and support the bank’s network, applications and infrastructure. Carry out regular system health checks, vulnerabilityassessment and patching. Integrate solutions with other applications and platforms based on business requirements. Perform routine maintenance tasks for infrastructure systems such as more »
and best practices. - Deep understanding of cloud security controls, tools (Azure Security Center), and services. - Familiarity with security testing methodologies like penetration testing and vulnerability assessments. - Experience with SIEM tools (Splunk, ELK, Azure Sentinel) and incident response/forensics. - Knowledge of security frameworks (NIST, ISO 27001, SOC 2) and more »
regulations.You will have a thorough understanding of regulatory obligations within the region.You will implement and oversee security measures, such as access controls, encryption, and vulnerability assessments, to safeguard sensitive financial data.Team Leadership:You will lead and mentor a team of cloud operations professionals, fostering a collaborative and high-performance more »
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
the technology division to ensure policies are followed and support business continuity. Technology Testing: Manage technology testing activities, including scenario testing and response plans. VulnerabilityAssessment: Assess and prioritise vulnerabilities, define remedial actions, and track implementation. Regulatory Compliance: Support the creation of the annual regulatory self-assessmentmore »
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
London, England, United Kingdom Hybrid / WFH Options
Mobica
/C++ High-level linux experience on users/kernel space (or on Android platforms) Knowledge of Linux build systems and system components Security VulnerabilityAssessment experience Knowledge of Bootloaders Good experience with Git and branch integration Good solid Python skills for tools automation Nice to have skills more »
the patching process. Monitoring security systems (IDS, Firewall, Anti-Virus) and event logs. Reporting IT KRIs/KPIs. Conduct periodic internal penetration testing and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and followed. Document standard and … Firewall (Cisco), IDS, and log monitoring software. Understanding of ITIL practices, ISO 27001 standards. (Preferred) Knowledge of EDR software, privileged access management, penetration and vulnerability tools, Change Auditor, ServiceNow. Ability to understand business processes and work effectively in cross-functional teams. Degree in Technology. 3-5 years of experience … in developing and monitoring IT infrastructure system standards. Experience in firewall/IDS monitoring. (Preferred) Certifications: CISM, CISSP, CEH. (Preferred) Experience in penetration and vulnerability testing. (Optional) Experience in patch monitoring. more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
IPS, VPNs, endpoint protection, and encryption systems. Ensure security architecture aligns with industry best practices and compliance requirements (e.g., GDPR, HIPAA, PCI-DSS) Risk Assessment and Management: Conduct security risk assessments and vulnerability assessments to identify and mitigate security risks. Develop and enforce security policies, standards, and guidelines. more »
a keen interest in cybersecurity, we would love to hear from you. In this role, you will manage our organisation's security infrastructure, conduct vulnerability assessments, and develop cyber incident response plans. You will work with cross-functional teams to identify security risks and stay current with cybersecurity developments. … the company, working with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetration testing to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with more »
CIFs) within Corporate Functions and HR. Manage the process to monitor resilience of Important Business Services (IBS) and Critical/Important Functions (CIFs), including vulnerability assessments and remedial actions. Coordinate testing activities and facilitate scenario testing workshops. Support the creation of the Regulatory Self-Assessment and ensure internal more »
threat detection processes, leveraging security information and event management (SIEM) and other security tools to proactively identify and address potential security threats.Vulnerability Management: Coordinate vulnerability assessments and penetration testing activities. Work with relevant teams to prioritize and remediate identified vulnerabilities.Security Policies and Procedures: Establish and maintain security policies, standards … incident response and security incident management.Strong knowledge of security technologies, including SIEM, intrusion detection/prevention systems, endpoint protection, and security analytics tools.Experience with vulnerabilityassessment tools and vulnerability management processes.Understanding of security best practices, standards, and frameworks.Knowledge of relevant regulatory requirements and data protection laws.Excellent leadership more »
Our client, a critical national infrastructure organisation in the energy sector, are looking for Vulnerability Management Analysts to join their Security Team and lead the charge in building a robust cyber testing team to fortify their national infrastructure. As a vital member of our team, you will: Conduct regular … vulnerability assessments, utilising cutting-edge tools and techniques, to identify vulnerabilities in their systems and networks. Manage the entire lifecycle of vulnerabilities, from discovery to remediation, ensuring prompt and effective resolution. Analyse risks associated with identified vulnerabilities and collaborate with stakeholders to develop comprehensive remediation plans. Work closely with … IT teams to ensure timely application of security patches and updates. Generate detailed vulnerabilityassessment reports to communicate status and recommendations to management. Foster a culture of security awareness by providing guidance and training to employees. Essential skills and qualifications: Strong analytical and investigative skills. Knowledge of cybersecurity more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
Burton Upon Trent, England, United Kingdom Hybrid / WFH Options
Clinigen
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
Engineer to join their established but expanding cyber security function! In this newly developed role, you will be responsible for implementing security measures, conducting vulnerability assessments, and responding to security incidents, in addition to participating in strategy development as a key leader within our clients security function. This would more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
development teams to take ownership of the security and privacy of their service by collaborating to set requirements and standards, performing design reviews and vulnerability assessments, and helping build security controls. You will also work closely with the dedicated Security Operations and Security Engineering teams. You will be someone … of security throughout the software development lifecycle Automating and continually improving business services and products through development of tooling and proceduresPerforming various types of vulnerabilityassessment (including configuration, source code, and documentation reviews) and security testingWhat excites us A university degree in Computer Science or similarExperience in cloud more »