Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
and staying updated on industry trends and emerging technologies. Knowledge of security tools and technologies, such as SIEM (Splunk), SOAR, DLP, endpoint protection, and vulnerabilityassessment tools. About the role... Develop, implement, and maintain comprehensive cybersecurity strategies to protect organizational assets against cyber threats. Conduct regular risk assessments … and vulnerability scans to identify potential security gaps and mitigate risks effectively. Contribute to a robust security architecture, including firewalls, intrusion detection systems, and encryption mechanisms, to safeguard network infrastructure and data. Monitor security infrastructure for suspicious activities, investigate incidents, and implement incident response procedures to minimize impact and More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
The MRJ Group
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
a culture of security by engaging meaningfully with engineering and security teams. Continuous Monitoring: Identify threats and vulnerabilities through ongoing monitoring, penetration testing, and vulnerability assessments, audits, and compliance checks. Security Awareness & Best Practices : Provide technical guidance and training to stakeholders, promoting security best practices and risk mitigation strategies. … problem-solving abilities to translate business requirements into technical solutions. Collaboration and Influence: Effective communicator capable of navigating organizational complexities and influencing without authority. Vulnerability Management: Expertise in managing vulnerabilities across diverse assets and implementing application security in cloud environments. Security tooling: experience in any of the following; (Wiz More ❯
integrating security measures throughout the lifecycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modeling, vulnerabilityassessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
security measures throughout the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerabilityassessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Tunstall Healthcare (UK) Ltd
Collaborate with security teams to implement and maintain robust protections, including firewalls, VPNs, intrusion detection/prevention systems, and access control protocols. Conduct periodic vulnerability assessments, applying patches and updates to mitigate risks while maintaining compliance with regulatory standards. Proactively identify potential threats and design strategies to minimize security More ❯
practices for cloud infrastructure. Ensure compliance with industry standards and regulations (e.g., GDPR, PCI DSS, relevant aviation regulations). Conduct regular security audits and vulnerability assessments. Performance Monitoring and Troubleshooting: Monitor system performance and identify potential bottlenecks. Troubleshoot and resolve infrastructure-related issues. Implement proactive monitoring and alerting systems. More ❯
practices for cloud infrastructure. Ensure compliance with industry standards and regulations (e.g., GDPR, PCI DSS, relevant aviation regulations). Conduct regular security audits and vulnerability assessments. Performance Monitoring and Troubleshooting: Monitor system performance and identify potential bottlenecks. Troubleshoot and resolve infrastructure-related issues. Implement proactive monitoring and alerting systems. More ❯
practices for cloud infrastructure. Ensure compliance with industry standards and regulations (e.g., GDPR, PCI DSS, relevant aviation regulations). Conduct regular security audits and vulnerability assessments. Performance Monitoring and Troubleshooting: Monitor system performance and identify potential bottlenecks. Troubleshoot and resolve infrastructure-related issues. Implement proactive monitoring and alerting systems. More ❯