identified information security risks Supports security incident response team in resolution and close of investigations of security incidents, takes responsibility of postmortem and remediation plans Trains and consults PSI staff on information security awareness and procedures Qualifications Minimum of 7 years' experience in IT 5 years+ experience in More ❯
Collaborate with the Security Operations team to respond effectively to cybersecurity incidents. Develop and present metrics for network security coverage and create actionable remediation plans. Maintain strong vendor partnerships to ensure continuous support for network security tooling. Establish procedures to validate the design, deployment, and management of security More ❯
Azure), leveraging IaC tools like Terraform with a security first approach. Perform regular automated security assessments, including vulnerability scans, assist penetration testing, and remediation planning. Automate security testing processes, including SAST, DAST, and IAST tools, to identify and remediate vulnerabilities earlier in the SDLC. Work closely with Development More ❯
Collaborate with the Security Operations team to respond effectively to cybersecurity incidents. Develop and present metrics for network security coverage and create actionable remediation plans. Maintain strong vendor partnerships to ensure continuous support for network security tooling. Establish procedures to validate the design, deployment, and management of security More ❯
Security incidents per severity. Low average of response time on Information Security incidents per severity. High accuracy of threat and vulnerability analysis. Effective remediation plans and controls for identified vulnerabilities. Qualifications, skills and experience: Required Bachelor/Masters degree and/or significant experience in IT and IT More ❯
up. Your day-to-day will involve assisting in threat hunting, risk assessments, and vulnerability management including running scans, analyzing findings, and supporting remediation plans. You'll actively monitor and respond to security alerts using tools like SIEM, IDS/IPS, and endpoint protection platforms. You'll also More ❯
track record of delivering mission-critical cybersecurity solutions, we are experienced in working quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients’ security posture Our Commitment We’re problem solvers that take risks More ❯
track record of delivering mission-critical cybersecurity solutions, we are experienced in working quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients’ security posture Our Commitment We’re problem solvers that take risks More ❯
Research industry trends and regulatory requirements. Own the Security Architecture evaluation of risks identified in systems, including reviewing and proposing tactical and strategic remediation plans, and evaluation the cost/risk benefits of remediations. Consult, and champion the adoption of security design, with technical delivery teams for both More ❯
environments Conduct risk assessments and gap analyses using frameworks such as NIST and IEC 62443 Translate technical findings into business-focused reporting and remediation plans Guide delivery teams and oversee project execution Stay current on OT-specific threats, vulnerabilities, and mitigations Support international teams and attend client sites More ❯
environments Conduct risk assessments and gap analyses using frameworks such as NIST and IEC 62443 Translate technical findings into business-focused reporting and remediation plans Guide delivery teams and oversee project execution Stay current on OT-specific threats, vulnerabilities, and mitigations Support international teams and attend client sites More ❯
environments Conduct risk assessments and gap analyses using frameworks such as NIST and IEC 62443 Translate technical findings into business-focused reporting and remediation plans Guide delivery teams and oversee project execution Stay current on OT-specific threats, vulnerabilities, and mitigations Support international teams and attend client sites More ❯
environments Conduct risk assessments and gap analyses using frameworks such as NIST and IEC 62443 Translate technical findings into business-focused reporting and remediation plans Guide delivery teams and oversee project execution Stay current on OT-specific threats, vulnerabilities, and mitigations Support international teams and attend client sites More ❯
environments. Conduct risk assessments and gap analyses using frameworks such as NIST and IEC 62443. Translate technical findings into business-focused reporting and remediation plans. Guide delivery teams and oversee project execution. Stay current on OT-specific threats, vulnerabilities, and mitigations. Support international teams and attend client sites More ❯
track record of delivering mission-critical cybersecurity solutions, we are experienced in working quickly to provide an effective incident response, attack readiness, and remediation plans with a focus on providing long-term support to improve our clients’ security posture. Our Commitment We’re problem solvers that take risks More ❯
Hatfield, Hertfordshire, United Kingdom Hybrid / WFH Options
Michael Page
Ensuring compliance with relevant industry regulations and standards. Conducting regular audits and risk assessments to identify potential security threats. Develop risk remediationplan Developing and implementing information security policies and procedures. Providing training and awareness programs to staff on information security matters. Reporting to senior management on More ❯
internal Privacy by Design process, including conducting privacy risk assessments of Sportradar's products and services, identification of privacy risks and creation of remediation plans. Maintain the privacy risk register in OneTrust to ensure that identified risks related to Sportradar's products and services are remediated on time More ❯
the threat landscape can affect our business. Penetration Testing Pro: You've got experience in scoping penetration tests, conducting risk assessments, and overseeing remediation plans. Influential Communicator: You're skilled at influencing, communicating, and collaborating with senior management and stakeholders. Cloud Connoisseur: You're well-versed in Cloud More ❯
organization's security posture. Create and build Workday reports as needed. Participate in requirements gathering and review, create and execute test plans, test remediation plans, test scenarios/scripts with expected outcomes; and system configurations for half yearly cloud releases. Job Requirements Bachelor's degree in Computer Science More ❯
reports that are understandable to both technical and non-technical stakeholders. Work with internal teams and clients to communicate vulnerabilities, testing results, and remediation plans. Ensure compliance with industry best practices and frameworks for penetration testing. Maintain up-to-date knowledge of emerging security threats and trends. Required More ❯
of data error is highest, documentation and reporting of identified control weaknesses. Record data quality issues, support root cause analysis and development of remediation plans. Produce standard and custom reports for stakeholders and regulators based on the records in the data governance tool. What you'll need to More ❯
of data error is highest, documentation and reporting of identified control weaknesses. Record data quality issues, support root cause analysis and development of remediation plans. Produce standard and custom reports for stakeholders and regulators based on the records in the data governance tool. What you’ll need to More ❯
status for assigned systems in liaison with accreditor/s Responsible for the scoping, planning and conduct of IT Security Health Checks (ITSHC), remediationplanning, and the tracking and resolution of findings Maintenance of risk registers, risk escalation, and mitigation of information security risk to within organisational acceptable More ❯
status for assigned systems in liaison with accreditor/s Responsible for the scoping, planning and conduct of IT Security Health Checks (ITSHC), remediationplanning, and the tracking and resolution of findings Maintenance of risk registers, risk escalation, and mitigation of information security risk to within organisational acceptable More ❯
status for assigned systems in liaison with accreditor/s Responsible for the scoping, planning and conduct of IT Security Health Checks (ITSHC), remediationplanning, and the tracking and resolution of findings Maintenance of risk registers, risk escalation, and mitigation of information security risk to within organisational acceptable More ❯