for providing an uncompromised technology and application environment for employees, customers, clients, and shareholders through continuous comprehensive cyber security testing. CSA consists of multiple assessment teams that focuses on different technology, platform, and stakeholders.As a Manual Ethical Hacking Specialist, you will join a dynamic team of world class security … able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and more »
Crawley, England, United Kingdom Hybrid / WFH Options
Thales
troubleshooting application software and operating systems to meet cyber security requirements as defined by the Cyber Security Design Authority, including hardening, lockdown, and running vulnerability assessments. Write and perform tests to verify, validate, and qualify the software load. Key Skills Extensive experience in authoring and reviewing technical documents. Experience more »
Southampton, England, United Kingdom Hybrid / WFH Options
LexisNexis Risk Solutions
able to analyze security events for anomalous activity Be able to identify emerging security threats and develop/implement security programs Able to conduct vulnerability assessments, threat analysis, and reporting. Experience/understanding of Cloud PlatformsAWS/GCP and Firewalls Possess a related credential for ethical hacking and security … risk assessment Be excellent in oral and written communication skills and interpersonal skills Relevant certifications such as - Certified Information Systems Security Professional (CISSP), Certified Cloud Security Professional (CCSP), or equivalent. Be able to respond to security incidents, conducting thorough forensic investigations and meticulously preparing incident reports for management review more »
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
various stakeholders. You will also have a demonstrable background of enhancing Software Product Security (Secure Software Development), DevSecOps, threat modeling, secure coding practices, and vulnerability management. Key Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in … depth security assessments, penetration testing, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for product cyber security initiatives across the organization. Collaborate with senior management to establish product cyber security goals, policies, and procedures aligned with … leadership roles, particularly in product security within IoT or Operational Technology (OT) companies. Technical Expertise: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership : Experience leading cross-cultural and geographically distributed teams. Regulatory Knowledge: Familiar with industry standards such as ISO 27001, NIST, and GDPR. Certifications more »
a keen interest in cybersecurity, we would love to hear from you. In this role, you will manage our organisation's security infrastructure, conduct vulnerability assessments, and develop cyber incident response plans. You will work with cross-functional teams to identify security risks and stay current with cybersecurity developments. … the company, working with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetration testing to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with more »
Leiston, England, United Kingdom Hybrid / WFH Options
G4S
Experience of working with IP Video Surveillance Systems Experience of working with asset management and monitoring software i.e. SolarWinds,Tripwire, GFI Knowledge of Cyber VulnerabilityAssessment tools and principles. In Return Excellent salary Car or Allowance 25 days holiday Pension/Life assurance Employee Discount Schemes Workplace pension more »
informed about emerging threats and technologies. 2. Incident Response and Security Operations: Develop incident response plans and coordinate security incident handling. Oversee security monitoring, vulnerability assessments, and penetration testing. Manage security incidents and coordinate with relevant teams. 3. Security Awareness and Training: Promote security awareness across the SGS. Conduct more »
Burton Upon Trent, England, United Kingdom Hybrid / WFH Options
Clinigen
hardware solutions that may affect decisions on systems building or enhancements Role Requirements: ITIL Foundation-level knowledge. Experience in the following security domain areas; VulnerabilityAssessment and Management, Security Risk and Compliance, Cloud Security Architecture, Application Security, Security Operations Centre and Investigations, Incident Management and Security Engineering. Good more »
ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetration testing, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data across various sectors. more »
As the OT Cyber Security Lead, you will lead and drive project delivery with one other senior individual. It would suit someone with a Vulnerability Analysis, PLC's and Risk background to drive projects. You will be leading and driving OT Cyber practices from scratch allowing autonomy for you … to address critical security risks such as antivirus software, encryption, patch management, insider threat protection, incident response plans, forensic capabilities, and regulatory compliance. Performing vulnerability assessments and administrative audits on client computer systems and network devices, particularly focusing on the nuances of Operational Technology testing. Key skills: Experience with more »
management, prerequisite alignment, and paperwork facilitation. Review and interpret penetration test reports, address any issues, and communicate findings to project teams. Conduct infrastructure reviews, vulnerability assessments, and compliance checks. Perform checks to ensure proper patching and maintenance procedures. Utilize a comprehensive security checklist, addressing both simple and complex security more »
Stafford, Staffordshire, West Midlands, United Kingdom
Viqu Limited
delivery of upcoming live projects. Responsibilities: Designing technical solutions that meet the clients requirements and implement appropriate technologies and tools to mitigate risks. Conduct Vulnerability assessments on customers computer systems and networks. Design secure operational technology networks across a range of industries. Must be prepared to travel to client more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud datacentre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical certifications. more »
and will report to the Secure Project Lifecycle Team Lead. The responsibilities of the role will include the following: · Review submission of IS Criticality Assessment (ISCA) questionnaire (ISCA Dashboard) · Determine high level security requirements and project criticality, based on standard project activities and data classification from DP pre-screening … from QualysGuard o Obtain Cloud Permit from Enterprise Architecture o Obtain Code Review and Analysis – in house solutions only from SCD o Self-serve vulnerabilityassessment compliance report of assets in scope o Liaise with Cyber Assurance on penetration testing of solution and obtain sign off o Obtain … Digital Hub registration for external facing solutions from Cyber Assurance o Produce Project Security Assessment closure report · Perform a final review of all open security requirements and their status before any stage gate approval can be provided (effectively the Production Go/No-go decision). Ensure AXA XL more »
Manchester, North West, United Kingdom Hybrid / WFH Options
Ascent People
Thorough understanding of data security principles and best practices, ideally in a regulated environment. - Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. **Preferred Qualifications:** - Experience in private and public cloud data centre management. - Level 3 Service Management Framework qualification and knowledge of ITIL. - Relevant technical more »
for providing an uncompromised technology and application environment for employees, customers, clients, and shareholders through continuous comprehensive cyber security testing. CSA consists of multiple assessment teams that focuses on different technology, platform, and stakeholders.As a Manual Ethical Hacking Specialist, you will join a dynamic team of world class security … able to effectively communicate security vulnerabilities to application developers and/or senior managers who may have little to no experience with application security vulnerability specifics.The Team:Understanding the requirements of the applications and how to use themTesting applications using a variety of tools to identify vulnerabilities that could … expose the Bank to riskMonitoring existing and proposed security standard setting groupsConducting meetings to communicate the findings and implications to stakeholdersPerforming vulnerability fix verification testing in support of the remediationProviding technical support to clients, management and staff throughout risk assessments and the implementation of appropriate data security procedures and more »
mitigations and solutions to risk and vulnerabilities. Experience of maintaining compliance with CPNI requirements and adopting the Operational Requirements process and conducting Threat and Vulnerability Assessments. Capable of maintaining relevant UK National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF more »
e.g., system and mobile antivirus software, encryption modules, patch management programs, insider threat protection, incident response plans, forensic capabilities, and regulation compliance). Conduct vulnerability assessments and administrative audits on client computer systems and network devices considering the sensitivity of Operational Technology testing. Lead collaboration efforts with other cybersecurity more »
Brighton, England, United Kingdom Hybrid / WFH Options
Hays
other teams in the organisation, and the ability to build strong internal relationships with other members in the business. You will be experienced with vulnerability assessments and Cyber Assurance. 4+ years of experience in cyber security, with a proven track record of progressively increasing responsibilities. Strong technical expertise in … areas such as network security, intrusion detection/prevention, endpoint security, encryption, and vulnerability management. Experience with leading or mentoring cyber security professionals. Strong knowledge and experience with recognised Cyber Security frameworks (e.g., NIST, ISO 27001, CIS Controls). Excellent communication skills, with the ability to effectively convey complex more »
as needed. Role Your duties will include: Write a clear and concise test strategy covering both functional and non-functional requirements (e.g. security/vulnerabilityassessment, load/performance and usability), applying automated and manual methods as appropriate Testing requirements and user stories to ensure they are well … result in teams agreeing on the understanding of requirements Plan, execute and report exploratory testing sessions for risks and features Use a balanced risk assessment to identify the most valuable ways to apply testing and improvement activities Determination and tenacity to expose the true behaviour of a system and more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
SDL Solutions Limited
Documentation and Reporting: Monitor cloud security events and alerts. Investigate and respond to security incidents. Implement and maintain security measures on cloud platforms. Perform vulnerability assessments and address weaknesses. Manage user access and permissions in cloud services. Implement multi-factor authentication and monitoring. Support compliance efforts and audits. Stay more »
Central Mancheter, Manchester, United Kingdom Hybrid / WFH Options
hireful
Thorough understanding of data security principles and best practices, ideally in a regulated environment. Experience managing cyber security estates, overseeing external penetration assessments and vulnerability assessments. Great Opportunity Interested? Please send you cv for a swift response more »
implement solutions, and ensure compliance with standards. Responsibilities: Monitor networks for security issues. Investigate breaches and incidents. Install security measures and document incidents. Conduct vulnerability assessments and testing. Implement patches and updates. Collaborate with vendors and maintain documentation. Stay informed about security standards. Skills and Experience: Bachelor's degree more »