Description Position at Tokio Marine HCC Job Title: Threat and Vulnerability Lead Reporting to: Business... International, the Threat and Vulnerability Lead is part of the BISO function established within in the CIO organisation of the...
Tokio MarineManager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging... vulnerabilities provided by threat intelligence sources and penetration testing. The vulnerability manager will collaborate...
Starling BankManager to lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging... vulnerabilities provided by threat intelligence sources and penetration testing. The vulnerability manager will collaborate...
Starling Bankand infrastructures evolution strategy and roadmap; lead the execution based on the company's business, industry trends and technology... stack. - Lead highly motivated software engineers; interpret architectural design and goals into executable engineering...
testing yourself in this role, you will be conducting penetration testing technical reviews and threat and vulnerability... writing Familiar with vulnerability scanning, application security, penetration testing, encryption, threat modeling...
Kyndrylto and recover fast from security incidents. Vulnerability Management, Threat Management, Change Management, Access Management... evolution of our Security Squad. You will lead the overall product vision and strategy, overseeing multiple engineering teams...
Wiseincidents. Vulnerability Management, Threat Management, Change Management, Access Management and Compliance are core products.... You will lead the overall product vision and strategy, overseeing multiple engineering teams and working closely with your product...
Wiseincidents. Vulnerability Management, Threat Management, Change Management, Access Management and Compliance are core products.... You will lead the overall product vision and strategy, overseeing multiple engineering teams and working closely with your product...
Wisemonitoring, scanning, cyber threat reporting, and development/implementation of vulnerability mitigation strategies. Assist in... and existing security designs, and with support from the Security Architecture Lead, emerging security technologies and systems...
CognismSecurity Professional (CISSP), Certified Information Security Manager (CISM), or Security Plus - ISO27001 Lead Implementer... solutions covering areas such as data leakage prevention, Security Information and Event Management, anti-malware, vulnerability...
European Bank for Reconstruction and Development. You will lead the design, development, and implementation of secure DevOps pipelines, integrating security measures seamlessly... globally. What You'll Do Lead the design, development, and implementation of DevOps pipelines with a focus on security...
AristocratSecurity Professional (CISSP), Certified Information Security Manager (CISM), or Security Plus ISO27001 Lead Implementer... solutions covering areas such as data leakage prevention, Security Information and Event Management, anti-malware, vulnerability...
European Bank for Reconstruction and Developmentteam composed of multiple sub streams. The main purpose of the team is to lead the digital strategy and transformation... accordance with PMI IT Policy Framework. Perform threat modelling on technology systems and establish processes to identify...
Philip Morris International's and our customers ICT infrastructure, systems and data. Perform risk assessment and vulnerability analysis. You will provide guidance... programmes. Lead, motivate and develop the team. Foster a culture of pride, teamwork and passion. Provide communication...
Gentrackwill join our team and take the lead on developing, implementing, and maintaining our security strategy within our Service Provider... solutions to stay ahead of emerging threats. You will conduct risk assessments and threat modeling to identify and prioritize...
Kyndrylsecurity protection domains including cloud, IAM, network, host, data, threat and vulnerability, and incident response. Broad... within the security technology stack. This role will focus primarily on Network Security domain. Lead high-level design...
FISprotection domains including IAM, network, host, data, threat and vulnerability, and incident response. Experience consulting... across security disciplines, architects, engineers to resolve and address solution weaknesses and issues. Lead the assessment...
FIS