The Role As a Penetration Tester with expertise in IoT security, you will play a crucial role in identifying and addressing potential vulnerabilities in IoT projects. The ideal candidate will have a minimum of 2 years of hands-on experience in penetrationtesting and a background in … penetrationtesting IoT devices specifically. You will be required to conduct comprehensive penetration tests on different types of system and technologies, with a specific emphasis on IoT devices. You will have the ability to identify and exploit security vulnerabilities. Assessing the security of embedded systems, firmware, and … with the latest cybersecurity trends and threat landscapes, particularly in the rapidly evolving IoT domain. Responsibilities Minimum of 2 years of proven experience in penetration testing. In-depth knowledge of IoT security protocols, standards, and best practices. Hands-on experience with Penetrationtesting on IoT devices, including more »
opportunities in the evolving world of cloud, digital and platforms. Role Description: * 8-10+ years hands-on experience doing infra & OAT(operational acceptance testing) testing I,e. Alert & monitoring, failover, transaction reconciliation, zero data lose, Adaptability, Interoperability ,Maintainability, Security, Resilience, Recoverability, Installation & Deployment, Service Continuity, availability testing … combination of strong hands-on technical skills and excellent communication skills. * Should able to do Non-functional test requirement gathering for Infra and OAT testing, provide technical estimates and solution to test the requirement * E2E test delivery management for OAT & Infra testing. * Good experience in IBM TIVOLI or APPDYNAMICs … knowledge of -SOLARIS/AIX/UNIX/LINUX/WINDOWS * Should have very good experience in DB - SQL/Oracle/DB2 failover testing * Should have very good experience in JBOSS/IBM WAS/IIS/MQ/F5 load balancer testing. * Very good experience in Infra more »
Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetrationtesting to identify potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams … Participate in incident response and provide guidance in the event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerability assessment, penetrationtesting, and remediation. Strong knowledge of vulnerability scanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
technical risks. - Recommend and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetrationtesting and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
technical risks. - Recommend and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetrationtesting and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring more »
Employment Type: Contract
Rate: £500 - £550/day £500-£550 Per Day Inside IR35
Mitre Attack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetrationtesting, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors more »
experience in ICT Infrastructure roles, including IP network management Design and implement technology solutions, considering future requirements Address security vulnerabilities identified through scanning and penetrationtesting To be considered: Please either apply by clicking online or emailing me directly to . For further information please call me on more »
end assurance Strong experience performing threat modelling High level/Low level design, identifying security risks Third party security posture Scope and organise pen testing Security requirements for RFP's This is a 6 month rolling contract paying £540 p/d Outside IR-35 The client is based more »