Auditor) are highly desirable. Strong knowledge of security frameworks (e.g., ISO 27001, COBIT), security technologies, tools, and best practices across EU, UK, and USA Proficiency in risk management processes, vulnerability assessments, and incident response strategies. Current technical and hands-on experience with security tools and technologies, including Rapid7, Rubrik, Sentinel, and endpoint protection solutions like Microsoft Defender. Excellent analytical More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
discussions. * Demonstrate proficiency with OWASP Top 10 and SANS Top 25 vulnerabilities, effectively communicating methodologies with development teams. * Utilise tools such as BurpSuite, Nessus, Nmap, Kali Linux, and other vulnerabilityassessment platforms. Essential Skills & Experience * Proficiency with penetration testing tools: Cobalt Strike, Caldera, Atomic Red Team, Pentera, Nessus, Burp, OSINT, etc. * Strong understanding of software testing methodologies and More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Stott & May Professional Search Limited
discussions. * Demonstrate proficiency with OWASP Top 10 and SANS Top 25 vulnerabilities, effectively communicating methodologies with development teams. * Utilise tools such as BurpSuite, Nessus, Nmap, Kali Linux, and other vulnerabilityassessment platforms. Essential Skills & Experience * Proficiency with penetration testing tools: Cobalt Strike, Caldera, Atomic Red Team, Pentera, Nessus, Burp, OSINT, etc. * Strong understanding of software testing methodologies and More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerabilityassessment and penetration testing. Your Profile Essential skills/knowledge/experience: (Up to 10, Avoid repetition) Proficient Pen Testing Tools - Cobalt Strike, Caldera, Atomic Red team, Pentera More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Devonshire Hayes
GDPR, etc.). Configure and monitor firewalls, intrusion detection/prevention systems, and endpoint security solutions. Support identity and access management, MFA, and secure network access policies. Conduct regular vulnerability assessments, patch management, and system hardening. Project Management & Delivery Lead infrastructure and network projects from scoping through delivery, ensuring quality, cost, and time objectives are met. Define technical requirements More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Searchability NS&D
identify and document vulnerabilities, support red team operations, and collaborate with development and infrastructure teams to ensure effective remediation and security improvements. Key responsibilities include: Conducting penetration tests and vulnerability assessments across multiple environments Performing red team and threat simulation exercises Producing detailed reports outlining findings, risks, and mitigation strategies Staying current with emerging attack vectors, tools, and exploits … subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Penetration Tester, Ethical Hacker, Red Team, Cyber Security, OWASP, MITRE ATT&CK, VulnerabilityAssessment, OSCP, GPEN, CEH, CRTP, SC Cleared, NSD More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Searchability NS&D
identify and document vulnerabilities, support red team operations, and collaborate with development and infrastructure teams to ensure effective remediation and security improvements. Key responsibilities include: Conducting penetration tests and vulnerability assessments across multiple environments Performing red team and threat simulation exercises Producing detailed reports outlining findings, risks, and mitigation strategies Staying current with emerging attack vectors, tools, and exploits … subject to required skills) your application to our client in conjunction with this vacancy only. KEY SKILLS: Penetration Tester, Ethical Hacker, Red Team, Cyber Security, OWASP, MITRE ATT&CK, VulnerabilityAssessment, OSCP, GPEN, CEH, CRTP, SC Cleared, NSD More ❯