South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threat modelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in Transit (confirm 100%) Social Engineering testing Spear Phishing Secure Code Training Pre-Release code … analysis IDS/IPS Application/Infrastructure Hardening Advanced Penetrationtesting Essential experience Previous experience in a senior security role at an API focused company. At least one industry certificate such as CISSP, OSCP, CEH. Understanding of security practices for cloud platforms such as GCP and AWS Certification more »
both achieve the desired security outcome and are operationally viable; Supporting change initiatives in navigating and utilising our central security services, including security monitoring, penetrationtesting and access management; Assuring that security control requirements are met, in conjunction with our Application Security Testing team, through the project more »
London, England, United Kingdom Hybrid / WFH Options
Client Server
a Red Brick/Russel Group, top tier university - Computer Science, Engineering, Physics or Mathematics; MSc or PhD advantageous You have commercial experience with Penetrationtesting, Offensive Security, Red Team testing You have a good understanding (and interest in) low level concepts including operating systems and networking more »
Spalding, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Bakkavor
Oracle JavaScript frameworks such as AngularJS, NodeJS REST/SOAP services Authentication methods such as OIDC/JWT Secure coding standards (OWASP, STRIDE) and penetrationtesting (Burp Suite) Software development principles and architecture patterns Knowledge of testing methodologies (unit, integration tests) and tools Knowledge of DevOps with … demonstratable experience in building automation (builds, deployments, testing, infrastructure as code) Experience working with Waterfall and Agile methodologies. What you'll receive. As an equal opportunity employer, we're committed to providing a safe and rewarding environment for you to thrive in. This is why we work hard to more »
Our client provides a disruptive SaaS platform for Attack Surface Management, and Penetrationtesting as a service. This vendor are new to market however have recently received an additional funding round as they have proven success in some major customers globally, backed by a proven, well known Executive … candidates with at least 5 years of relevant experience, demonstrating: Active participation in red-team exercises within large enterprises. Ability to strategize and execute penetration techniques without relying on known vulnerabilities or CVEs. Extensive engagement in the bug bounty arena, fostering a mindset of unbounded exploration. Proficiency in basic more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, PenetrationTesting,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards relevant to the SaaS industry, such as more »
West End, London, Oxford Circus, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
risk assessments, and ensure compliance (ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetrationtesting, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business Continuity : Design more »
Solihull, West Midlands, United Kingdom Hybrid / WFH Options
iDPP
Responsibilities: Design, implement, and manage security architectures in AWS. Develop and enforce security policies, procedures, and guidelines. Conduct regular security assessments, vulnerability scans, and penetration testing. Monitor and respond to security incidents and alerts. Implement and manage AWS security services such as IAM, KMS, CloudTrail, GuardDuty, and Security Hub. more »
Elevate your career with a prestigious boutique pentesting consultancy. They are seeking a seasoned Penetration Tester to fortify thedefences of a diverse client portfolio, ensuring the highest standards of security across web applications, infrastructure, cloud services, APIs, wireless, and mobile applications. You will engage in leading end-to-end … your expertise in red teaming and social engineering to identify and mitigate potential threats. Your daily activities will involve the adept use of leading penetrationtesting tools such as Kali Linux, Burp Suite, and Qualys, allowing you to craft and execute robust security strategies. The ideal candidate will more »
City of London, London, United Kingdom Hybrid / WFH Options
Akkodis
solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in PenetrationTesting and/or Security Monitoring Understanding of networking and infrastructure design Active or ability to obtain SC clearance Knowledge/experience of more »
Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
structures. Self-starter and capable of independent working Team player and adept at working in multi-disciplinary and diverse teams Desirable Software engineering experience Penetrationtesting skills Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in more »
Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security standards and regulations Maintain and more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
and using purple team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetrationtesting, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage more »
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
they are up to date and effectively protecting the organisations assets. Conduct regular system and network security assessments to identify vulnerabilities and mitigate them. Penetrationtesting analysis and remediation activities. Monitor security access and access control to prevent unauthorised access, data breaches, and cyber-attacks. Create technical documentation more »
Bath, England, United Kingdom Hybrid / WFH Options
Peaple Talent
ownership of incidents and problems, identifyingct with a security-first mindset, following best practices to maintain infrastructure integrity. Assist in disaster recovery planning and testing, including PEN testing. Keep relevant personnel informed of project progress and deviations from expected timelines. Ensure system documentation is accurate and up-to-date. more »
development life cycle (SDLC) processes and methodologies.Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH.Experience in developing and testing software using Python, C++, and Java.Excellent problem-solving skills and the ability to work well under pressure.Ability to communicate technical ideas and issues to … both technical and non-technical audiences.ResponsibilitiesCreating and implementing security protocols to ensure the security of IoT devices and applications.Developing and testing software to detect and prevent security breaches.Reviewing code and conducting risk assessments to identify vulnerabilities.Collaborating with cross-functional teams to ensure security and compliance are implemented throughout the … awareness programs to increase security awareness among employees.Leadership skills, ability to manage and develop a team.Identifying and managing threats and breaches to security infrastructure.Conducting penetrationtesting of IoT devices and applications to test security measures.Experience in developing and driving capability growth.Automotive cyber expertise would be desirable.Experience in securing more »
by the Alten Group in early 2022. Responsibilities Creating and implementing security protocols to ensure the security of IoT devices and applications. Developing and testing software to detect and prevent security breaches. Reviewing code and conducting risk assessments to identify vulnerabilities. Collaborating with cross-functional teams to ensure security … increase security awareness among employees. Leadership skills, ability to manage and develop a team. Identifying and managing threats and breaches to security infrastructure. Conducting penetrationtesting of IoT devices and applications to test security measures. Experience in developing and driving capability growth. Automotive cyber expertise would be desirable. … cycle (SDLC) processes and methodologies. Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH. Experience in developing and testing software using Python, C++, and Java. Excellent problem-solving skills and the ability to work well under pressure. Ability to communicate technical ideas and more »
Manchester, England, United Kingdom Hybrid / WFH Options
Henderson Scott
design and approach achieve the desired security outcomes and are operationally viable. Supporting change initiatives in utilising central security services, such as security monitoring, penetrationtesting, and access management. Ensuring security control requirements are met throughout the project life cycle, in collaboration with our Application Security Testingmore »
level with 3+ years experience in a similar role. Required: 3+ years' experience Experience with stakeholder management. Vulnerability management including incident priority. Incident management Penetrationtesting experience Knowledge of multiple technologies encompassing cloud Experience with Microsoft tech stack This client has a great company culture as well as more »
GL20, Mitton, Gloucestershire, United Kingdom Hybrid / WFH Options
Four Squared Recruitment Ltd
a Technical Pre-Sales Consultant, you'll play a crucial role in supporting pre-sales activities across the core services, focusing on technical assurance, penetrationtesting, and incident response. Your duties will include responding to inbound sales enquiries, managing leads and opportunities in the CRM, arranging technical scoping more »
Security Engineer will join a highly skilled team of engineers to ensure the security of software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threat modelling, and managing vulnerabilities using industry standards. You will … scheme What’s required of the Software Security Engineer? Extensive software security experience, covering applications, networks and system security Experience with security protocols and penetrationtesting, if this has been with tools such as Burp Suite then even better! Ideally a relevant certification such as CISSP, CEH, OSCP more »