Cockburnspath, Berwickshire, Scotland, United Kingdom Hybrid / WFH Options
Risktec Solutions Ltd
Administer computer based security and monitoring systems. Carry out software or configuration backups of IT and OT equipment ranging in age. Participate in cyber incidentresponse planning, exercising and digital forensic investigation. Ensure station documentation and network diagrams are maintained and accurately reflect design and configuration changes for more »
Barnsley, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Ancala Water Services (Defence) Limited
data and act on discrepancies to ensure data accuracy. Engage with colleagues to ensure accurate and timely communication of changes to information. Supporting with incidentresponse and contingency planning. Take ownership of documentation management. Work with colleagues to identify and communicate environmental efficiency opportunities (e.g. waste management). more »
Somerset, South West, United Kingdom Hybrid / WFH Options
TALENT INTERNATIONAL UK LTD
and managing the technical controls required to ensure the organisations technology estate is protected against risk from cyber-attack. You will also lead the response procedures and investigations of security events or incidents, remediating those incidents, identify potential process improvements, and maintain organisational readiness. As the Security Analyst, you … security alerts on protective monitoring platforms to identify security incidents. Review high-priority or high-complexity analysis of security event data to manage security incidentresponse, making key decisions on reporting or escalations for monitoring Guide and direct specialist activities of others, actively promoting development in the applicable … a set of assets, providing tailored specialist or complex advice on ways to improve control mechanisms and mitigate risks Oversee the planning, testing, and response to security and emergency incidents or concerns, and providing informed recommendations on Technical Security issues to internal and external stakeholders. Lead multi-team assessment more »
to protect against web-based attacks. Ensure optimal performance and security of web applications through proper configuration and tuning of security controls. Monitoring and IncidentResponse: Establish and maintain monitoring and alerting mechanisms for web application security. Investigate and respond to security incidents, including coordinating with relevant teams … WAF technologies, providing training and knowledge sharing across the organization. Documentation and Reporting: Create and maintain detailed documentation of security architectures, configurations, processes, and incident reports. Prepare and present security metrics and reports to management and stakeholders. Continuous Improvement: Stay up-to-date with the latest security trends, vulnerabilities … In-depth understanding of security principles, protocols, and technologies (e.g., SSL/TLS, OWASP Top Ten, DDoS mitigation). Experience with security monitoring and incidentresponse tools. Relevant security certifications (e.g., CISSP, CEH, GIAC) are highly desirable. Excellent problem-solving skills and the ability to work independently and more »
analysis. - Conduct penetration tests to identify vulnerabilities in applications and infrastructure. - Develop and execute offensive security strategies to simulate real-world attacks. Threat Analysis & IncidentResponse: - Monitor and analyze security threats using advanced threat intelligence tools. - Lead incidentresponse efforts to mitigate and resolve security breaches. … frameworks such as NIST, ISO 27001, CIS, PCI-DSS. - Expertise in application security, penetration testing, and offensive security tactics. - Strong understanding of threat analysis, incidentresponse, and root cause analysis. - Extensive experience with AWS cloud security, including IAM, VPC, and security groups. - Proficient in vulnerability scanning tools such more »