SECURITY OPERATIONS THREAT VULNERABILITY jobs in United Kingdom #5

, conducting Red Team operations, application security assessments, and network exploitation operations. Candidate should have the... and software vulnerability and exploitation techniques; commercial or open-source offensive security tools for reconnaissance...

JPMorgan Chase

security monitoring, threat analysis, threat hunting, vulnerability management and security testing to improve the manage the... and defend systems and networks against cybersecurity threats. Leading threat exposure management including vulnerability...

Bupa

Perform analytical duties to include security monitoring, host and network based log analysis, correlation of network threat... cyber-threat hunting, vulnerability scanning, and penetration testing (as needed) Generate custom scripting and coding...

Northrop Grumman

with DevSecOps in threat modelling, vulnerability testing, and incident management. · Experience in security tolling and techniques... digital, cloud, data, advanced computing and security, it brings deep expertise for all industries in more than 47 countries...

Atos

Firm's technology estate can maintain effective operations and support the ongoing, critical functioning of Essential... Business Services in the face of today's evolving threat landscape. The FTR team partners across all JPMC Lines of Business...

JPMorgan Chase

Position Role Type: Unspecified Job Title: Security Operations Centre, (SOC) Engineer Location: Harlow or Glenrothes... partners. You will also be a subject matter expert for these tools, providing guidance to our Security Operations Centre...

Raytheon Technologies

safety and security assessment, forecast, and vulnerability reports. Conduct site and travel vulnerability assessments...Control Risks’ Embedded Consulting team is hiring a Junior Security Intelligence Analyst to join our team supporting...

Control Risks

major event safety and security assessment, forecast, and vulnerability reports. Conduct site and travel vulnerability...Job Description: Control Risks' Embedded Consulting team is hiring a Junior Security Intelligence Analyst...

Control Risks

Provide seamless collaboration between information security and the IT Operations teams, providing expertise... Proactively monitor security solutions (SIEM, threat detection and data security (Varonis), endpoint protection, network analytics...

Michael Page

mindset and a comprehensive understanding of cyber security practices. Familiarity with security infrastructure and operations... and breaches. Conducting routine security assessments, vulnerability scans, and assurance reviews to detect and address potential...

iFAST Global Bank Ltd

Operations (Mandatory) Cloud Security Network Security Vulnerability and Threat Management Identity and Access Management... * Working knowledge of the following Information Security domains, 4 required, security operations mandatory Security...

McDermott

Proactive threat and vulnerability analyses that ensure the above activities are grounded in the current risk landscape... with ensuring the Firm's technology estate can maintain effective operations and support the ongoing, critical functioning...

JPMorgan Chase

, threat/vulnerability management and incident response Collaborating with engineering and development teams to evaluate... and Azure DevOps Experience in AWS Experience with IaaC utilizing C# Experience of a security operations function...

Willis Towers Watson

related areas such as Vulnerability and Risk Management, Security Operations or Incident Response Data Loss Prevention (DLP... You will become an expert in Email Security, Advanced Persistent Threats, Attack Protection, Threat Response, Data Loss Prevention (DLP...

Proofpoint

of our software development lifecycle. You will work closely with development, operations, and security teams to automate security... as required. Contribute to the development of security standards, threat modelling and security awareness and training. Requirements 4...

ComplyAdvantage

), Infrastructure as Code (IaC), Security Automation, Vulnerability Management, Threat Intelligence, Secure Software Development... Lifecycle (SSDLC), Compliance as Code, Security Orchestration, Container Security, Microservices Security, Threat Modelling...

mecscomms