THREAT AND VULNERABILITY LEAD jobs in UNITED KINGDOM, United Kingdom #3

other words: our values. Whatever we do, wherever we are in the world, we lead the way, serve with integrity, take care... of each other, foster inclusion, and collaborate for measurable impact. These five shared values lead every decision we make and action...

Deloitte

, etc.). Excellent understanding of risk management, threat assessment, and vulnerability management. Demonstrated ability to lead... the organization’s cybersecurity and privacy strategy in alignment with business goals and regulatory requirements. Lead...

Portwest UC

-related incidents Collaborate with GS and C&IS teams to provide threat and vulnerability monitoring from our technology...&IS. Provides guidance to others as necessary. Solves complex issues and works independently. May lead projects...

Northern Trust

Responsibilities: Threat Hunting & Detection: Continuously monitor and analyse security alerts and logs using advanced SIEM, IDS/IPS..., and firewall systems. Conduct proactive threat hunting to identify and mitigate potential vulnerabilities before...

iO Associates

KPIs. Lead the cybersecurity technical assurance team, ensuring high-quality and timely services and deliverables... a comprehensive red and purple team penetration testing program, aligning it with major threat information and industry cybersecurity...

Morson Talent

organizations throughout the company. Support broader security team projects such as threat modeling, vulnerability scanning.... As a member of this team, you'll lead projects and be responsible for key deliverables of the security program while collaborating...

Circle Internet Financial

. You will be evaluated based on metrics such as reduced attacks, shorter response times, and compliance. Your efforts lead to a secure Tech... in root cause analysis. Create and improve incident playbooks and runbooks. Stay up to date with the threat landscape...

Boohoo

HMG, UKSV and IPSA requirements. Review and manage security risk and threat assessments including regular practical... exercises to assure effectiveness of measures to meet FSC and IPSA requirements, proactively managing threat detection...

Raytheon Technologies

. You will be evaluated based on metrics such as reduced attacks, shorter response times, and compliance. Your efforts lead to a secure Tech... in root cause analysis. Create and improve incident playbooks and runbooks. Stay up to date with the threat landscape...

Boohoo

and ISO27001 accreditations Providing Cyber related training to staff members Threat Intelligence and hunting Vulnerability...My client are seeking a mid-level Cyber Security Analyst to join their team. The role will eventually lead to having...

Hunter Bond

Managment In this role, the Vulnerability & Patch Management Engineer will lead high priority projects and day-to-day... Vulnerability & Patch Management Engineer acts as a threat and vulnerability resource assisting with daily operations, specifically...

Iron Mountain

which will initially Provide Managed Detection & Response, Cloud Security & Vulnerability Management as a Service, & which is anticipated... relevant. The SOC Team will be responsible for Managing Major Incidents, Triaging & Resolving Events while Managing Threat...

Secure Recruitment

of enhancing Secure Software Development, DevSecOps, Threat Modeling, Secure Coding Practices, and Vulnerability Management. Key...: Proficient in DevSecOps, threat modeling, secure coding practices, and vulnerability management. Leadership: Experience...

Smiths Detection

and methodologies, such as threat modeling and vulnerability management. Proficiency in automation and scripting using Python, Shell... framework. Lead the implementation of security measures across different platforms by collaborating with technology...

Eames Consulting

will join our team and take the lead on developing, implementing, and maintaining our security strategy within our Service Provider... solutions to stay ahead of emerging threats. You will conduct risk assessments and threat modeling to identify and prioritize...

Kyndryl

level or equivalent. To this role you will bring a strong understanding of advanced threat detections, continuous... vulnerability assessment, response and mitigation strategies used in Cyber Security operations along with the ability to define the...

Gowling WLG

incidents. Vulnerability Management, Threat Management, Change Management, Access Management and Compliance are core products.... You will lead the overall product vision and strategy, overseeing multiple engineering teams and working closely with your product...

Wise