London, England, United Kingdom Hybrid / WFH Options
Onyx-Conseil
to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: • Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) • Knowledge and experience with Microsoft Office and Visio. • Knowledge of WAN technologies including MPLS, SD WAN. • Knowledge of cloud providers security (AWS, GCP or Azure). • Prior More ❯
to both technical and non-technical audiences including colleagues, senior management and to customers Certifications (Preferred) CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CEH (Certified Ethical Hacker) GIAC certifications (e.g., GSEC, GCIA, GPEN) Experience with SOC 2 or ISO 27001 audits is a plus About Cloud Gateway Cloud Gateway was founded in 2017 with a More ❯
s degree in Computer Science, Information Security, or a related field. A master's degree is a plus. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable. Scripting experience. FlexTrade Systems, Inc. is an equal opportunity employer and makes employment decisions without regard to race More ❯
effectively with a variety of stakeholders from different technology and business teams. Strong verbal and written communication skills. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). Strong knowledge of Operating System security and system hardening concepts such as CIS Benchmarks. Experience in working with information security More ❯
Senior Penetration Tester/Ethical Hacker (C++, C#, PowerShell) 1 day ago Be among the first 25 applicants Key Responsibilities : Conduct advanced penetration testing on web applications, networks, and systems to identify vulnerabilities. Simulate sophisticated cyberattacks using tools and custom scripts to exploit weaknesses. Develop and deploy custom tools, scripts, and exploits to test system resilience. Collaborate with development … date with the latest attack vectors, vulnerabilities, and penetration testing methodologies. Write detailed reports documenting findings, risks, and remediation recommendations. Mentor junior team members and share knowledge on advanced hacking techniques. Participate in red team/blue team exercises and incident response activities. Required Skills and Qualifications : Technical Expertise : Expert in C++ , C# , PowerShell , and other scripting/programming … network protocols, firewalls, and intrusion detection/prevention systems. Knowledge of cloud security (AWS, Azure, GCP) and containerization (Docker, Kubernetes). Experience : 5+ years of experience in penetration testing, ethicalhacking, or red teaming. Proven track record of identifying and exploiting critical vulnerabilities. Experience with web application security (OWASP Top 10, API security, etc.). Hands-on experience More ❯
in Computer Science, Cybersecurity, Information Technology, or a related field is often advantageous. Entry-level certifications (optional but beneficial) that demonstrate knowledge and commitment to cybersecurity: CompTIA Security+ Certified Ethical Hacker (CEH) CompTIA Network+ ISO 27001 Foundation or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs More ❯
technical stakeholders. Educational Requirements: Bachelor’s degree in Computer Science, Information Technology, Cybersecurity, or a related field, or equivalent work experience. Relevant certifications such as CompTIA Security+, CEH (Certified Ethical Hacker), CISSP (Certified Information Systems Security Professional), or GIAC certifications. Experience: 1-3 years of experience in cybersecurity or a related field. Experience in a SOC environment is a More ❯
to lead our cybersecurity and IT strategy. This role requires a leader who not only understands the nuances of traditional information security but is also a passionate advocate for ethicalhacking, innovative security approaches, and embedding security into the DNA of business operations. As a key member of the leadership team, you will be responsible for shaping our … advisor to senior leadership on technology risks and mitigation strategies. Cultivate a security-first mindset across the organization, integrating security into early stages of business and product development. Security & EthicalHacking Champion and implement ethicalhacking practices such as penetration testing, red-teaming, and bug bounty programs. Build relationships with the ethicalhacking community … and create internal safe hacking environments to continuously test and improve our systems. Oversee threat modeling, vulnerability assessments, and incident response frameworks. Hands-on expertise in probing for security vulnerabilities in medium to large-scale organizations. Technology Governance & Risk Develop and maintain a unified and flexible control framework, working to integrate the requirements of global laws, standards, and regulations. More ❯
Security Architecture Professional (ISSAP) Health Care Information Security and Privacy Practitioner (HCISPP) GIAC Certified Intrusion Analyst (GCIA) GIAC Security Leadership Certificate (GSLC) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information Assurance System Architecture and Engineer (IASAE) Certification in one of the listed DoD 8570 Certifications is prerequisite. INTERVIEW PROCESS: STAGE More ❯
hybrid networking, container/serverless security and DevSecOps tooling Demonstrable experience hardening corporate business platforms (ERP, CRM, HR, finance, M365, identity providers, SaaS) Working familiarity with offensive-security/ethical-hacking techniques; able to think like an attacker, interpret red-team reports and translate findings into architectural controls Strong grasp of OT protocols (Modbus/TCP, IEC … with Data Protection Officer, Risk and Compliance, Security Operations. CISSP, CISM, SABSA, TOGAF (Security), or Azure Security Speciality (desirable) ISA/IEC 62443 Cybersecurity Specialist or GIAC GICSP, demonstrating ethical-hacking capability (desirable) Experience navigating ISO 27001/27019 certification, NIS2 readiness, or TSO cybersecurity codes (desirable) The right to work in the UK. WHAT WE OFFER A More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
hybrid networking, container/serverless security and DevSecOps tooling Demonstrable experience hardening corporate business platforms (ERP, CRM, HR, finance, M365, identity providers, SaaS) Working familiarity with offensive-security/ethical-hacking techniques; able to think like an attacker, interpret red-team reports and translate findings into architectural controls Strong grasp of OT protocols (Modbus/TCP, IEC … with Data Protection Officer, Risk and Compliance, Security Operations. CISSP, CISM, SABSA, TOGAF (Security), or Azure Security Speciality (desirable) ISA/IEC 62443 Cybersecurity Specialist or GIAC GICSP, demonstrating ethical-hacking capability (desirable) Experience navigating ISO 27001/27019 certification, NIS2 readiness, or TSO cybersecurity codes (desirable) The right to work in the UK. WHAT WE OFFER A More ❯
London, England, United Kingdom Hybrid / WFH Options
Circle Group
This role is inside IR35 - Due to the service of the role, it will now be based on an Umbrella solution. Essential Skills/experience Required Experience penetration testing, ethicalhacking, or completing vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security … Developed Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to this vacancy. Earn yourself a referral More ❯
London, England, United Kingdom Hybrid / WFH Options
Finsbury Food Group
protection, usability, and compliance. Ideally this is you! CISSP (Certified Information Systems Security Professional) CISM (Certified Information Security Manager) CRISC (Certified in Risk and Information Systems Control) CEH (Certified Ethical Hacker) ISO 27001 Lead Auditor/Implementer Cyber Essentials Plus Assessor Certification Well organised with the ability to ‘multi-task’ and prioritise workload in order to achieve tight deadlines. More ❯
on cloud security (AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethicalhacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC More ❯
Health Care Information Security and Privacy Practitioner (HCISPP) . GIAC Certified Intrusion Analyst (GCIA) . GIAC Security Leadership Certificate (GSLC) . Information Systems Security Engineering Professional (ISSEP) . Certified Ethical Hacker (CEH) . Computer Hacking Forensics Investigator (CHFI) . It is a prerequisite to be certified in one of the listed DoD 8570 Certifications. INTERVIEW PROCESS: STAGE More ❯
or GCP) and DevSecOps tooling Ensure security compliance across the development lifecycle, aligned with NCSC and industry standards Required Experience: Proven track record in pen testing, vulnerability assessments, and ethicalhacking Hands-on with tools such as Burp Suite, ZAP, Nmap, Metasploit Deep understanding of secure cloud infrastructure (AWS/Azure) and scripting (Python, Bash) Familiarity with DevSecOps More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
SOAR Administrator Splunk Certified Cybersecurity Defence Analyst Implementing Microsoft Azure Infrastructure Solutions Developing Windows Azure and Web Services Security Information & Event Management (SIEM) JIRA, Confluence, Git Desirable Qualifications: CISSP EthicalHacking and Intrusion Prevention Information Security Management Systems (ISMS) Access and Management (IDAM) Public Key Infrastructure (PKI) We support Armed Forces Covenant and guarantee interviews for veterans or More ❯
attention to details. Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) Certified Information Security Manager (CISM) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information assurance system architecture and engineer (IASAE) It is prerequisite to be certified in one of the listed DoD 8570 Certifications. More ❯
technology related certifications At least 4 years of experience in information security or related technology role Strong knowledge of security policies, procedures, and best practices Understanding of network protocols, ethicalhacking, and security testing methodologies Experience in analysis and reporting on systems such as SAST, DAST, Pen testing and SDLC Experience in authentication management and API security requirements More ❯
or equivalent experience. Demonstrable skills and capability in Security leadership and 3rd party management experience. CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker. Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions. Understanding of common frameworks More ❯
tools and building security into existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication and presentation skills What we offer: At More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
London, England, United Kingdom Hybrid / WFH Options
Kroo Bank
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills Benefits What we offer More ❯