client is an award-winning provider of Security Services, specializing in market-leading Cyber Security Services such as Vulnerability Management, Information Security, PCI-DSS, PenetrationTesting, Managed Security Services, and Security Consultancy. With their fully managed Security Operations Centre (SOC), they are committed to safeguarding their clients' digital … and analysing data within Azure Sentinel. - Collaborating with cross-functional teams to identify security vulnerabilities and develop appropriate solutions. - Conducting regular security assessments and penetrationtesting to identify and mitigate potential risks. - Staying updated on emerging cyber security threats and best practices and implementing necessary adjustments to security more »
Description In joining the Leidos Accredited Testing and Evaluation (AT&E, Common Criteria/FIPS) team, you will get an exciting opportunity to work in the growing IT Security field in support of National defense. The products you will touch will be deployed into larger systems and/or … You Will Get to Do: The selected candidate will work on varied FIPS 140 validation projects. General security analysis Design work (product architecture) Vulnerability testing Physical security testing System-level logical analysis Product evaluations against Technology Type standards (Protection Profiles) Cryptographic and Public Key Infrastructure (PKI) testing Cryptographic algorithm testing Source code review activities Technical report writing and review. Testing automation through scripting Develop applications to support test cases. You Will Bring These Qualifications: Cryptographic Validation Program (CVP) Certification Knowledge of cryptographic encryption algorithms, key exchange algorithms, hashing/message authentication algorithms, PKI, random more »
multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. The contract provides system engineering, development, test, integration and operational support, and is focused on injecting new technology … challenging issues on a large, significant program. The position requires a solid understanding of security practices and policies as well as hands-on vulnerability testing experience. The selected individual will collaborate with other engineers and technical experts in providing improvements to our operational, test, integration, and development systems. Primary … meet customer specified requirements for processing information. Evaluating the impact of new development on the operational security posture of the system. Evaluating, reviewing, and testing critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using common more »
multiple system security plans for development, test and production systems following the Risk Management Framework (RMF); manage cross domain capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. The contract provides system engineering, development, test, integration and operational support, and is focused on injecting new technology … challenging issues on a large, significant program. The position requires a solid understanding of security practices and policies as well as hands-on vulnerability testing experience. The selected individual will collaborate with other engineers and technical experts in providing improvements to our operational, test, integration, and development systems. Primary … meet customer specified requirements for processing information. Evaluating the impact of new development on the operational security posture of the system. Evaluating, reviewing, and testing critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using common more »
for development, test and production systems at multiple classification levels following the Risk Management Framework (RMF); manage cross domain capabilities; and support Security Verification Testing (SVT) of relevant Type 1 devices. Leidos is the prime contractor providing system engineering, development, test, integration, and operational support. This new program is … challenging issues on a large, significant program. The position requires a solid understanding of security practices and policies as well as hands-on vulnerability testing experience. The selected individual will collaborate with other engineers and technical experts in providing improvements to our operational, test, integration, and development systems. Primary … compliance policies and recommending and implementing enhancements. Evaluating the impact of new development on the operational security posture of the system. Evaluating, reviewing, and testing security-critical software. Proposing, assessing, coordinating, implementing, and enforcing information systems security policies, standards, and methodologies. Auditing and assessing system security configuration settings using more »
Implement and maintain vulnerability management programs and processes. Identify, assess, and prioritize vulnerabilities within the company's technology infrastructure. Perform regular scans, audits, and penetrationtesting to identify potential weaknesses. Create reports and provide insights to stakeholders regarding vulnerability status and remediation strategies. Collaborate with cross-functional teams … Participate in incident response and provide guidance in the event of a security breach. Job Requirements Significant experience in vulnerability management, including vulnerability assessment, penetrationtesting, and remediation. Strong knowledge of vulnerability scanning tools such as Nessus, Qualys, or similar. Understanding of industry frameworks and standards, such as more »
custom scans for emerging critical weaknesses and providing rapid responses Creating technical content for our website to educate users about the latest vulnerabilities. Automating penetrationtesting processes to scale across multiple customers Contributing to research projects aimed at improving the platform. Providing technical support during client calls and … cyber security One or more industry qualifications such as OSCP, OSWE, OSEP, CRT, CCT APP, or CCT INF Experience in network and web application penetrationtesting, automation using Python, Ruby, or Golang, and familiarity with vulnerability scanning tools Strong communication skills and comfort with client-facing interactions If more »
custom scans for emerging critical weaknesses and providing rapid responses Creating technical content for our website to educate users about the latest vulnerabilities. Automating penetrationtesting processes to scale across multiple customers Contributing to research projects aimed at improving the platform. Providing technical support during client calls and … cyber security One or more industry qualifications such as OSCP, OSWE, OSEP, CRT, CCT APP, or CCT INF Experience in network and web application penetrationtesting, automation using Python, Ruby, or Golang, and familiarity with vulnerability scanning tools Strong communication skills and comfort with client-facing interactions If more »
and driving the application security and privacy initiatives Perform threat modeling and architecture review on upcoming features and products Perform regular security assessments through penetrationtesting and code reviews of products Encourage and train developers in secure coding practices Develop security features in our product and scale security … re experienced in working with highly technical engineering teams You have performed threat modeling and architectural review for years You like bug hunting and penetrationtesting (bonus points if you share your Bugcrowd/HackerOne profiles) Experience in AWS is a plus Experienced contributing to the security community more »
Title: Cyber Security Assurance Manager (Technical) - PenetrationTesting/Red Team Manager Location: Crawley (3 days in office, 2 days from home after probation) Salary: Up to £80,000 plus bonus (depending on experience) Reports: Circa 8 heads Our client, an award winning Power Utilities company, is currently … and best practices. Key Responsibilities: Define and deliver the cyber security technical assurance strategy Manage the cyber security technical assurance team Establish and improve penetrationtesting and vulnerability management processes, including red team and purple team exercises Develop and implement IT disaster recovery and business continuity plans Deputise more »
Are you ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetrationtesting, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data … across various sectors. It's time to make a real impact in the world of cybersecurity! The ideal candidate will conduct penetration security testing for our clients, both on-site and remotely. Job Title: Pen Tester Job Type: Permanent Salary: Up to £90k per annum + Benefits Manchester … technical solutions to clients Assisting in identifying, resolving, and documenting security incidents Offering guidance and mentorship to adjacent teams and team members Required: Pen testing experience in Mainframe or Code review. Proficiency in networking and associated protocols Experience in mobile security, including OS, RF, and App security. Ability in more »
Are you ready to dive into the world of cybersecurity and risk mitigation? Our client is at the forefront, offering top-notch services in penetrationtesting, vulnerability assessments, security consulting, managed services, and incident response. Join them in their mission to strengthen cybersecurity defenses and protect sensitive data … across various sectors. It's time to make a real impact in the world of cybersecurity! The ideal candidate will conduct penetration security testing for our clients, both on-site and remotely. Job Title: Pen Tester Job Type: Permanent Salary: Up to £90k per annum + Benefits Manchester … technical solutions to clients Assisting in identifying, resolving, and documenting security incidents Offering guidance and mentorship to adjacent teams and team members Required: Pen testing experience in Mainframe or Code review. Proficiency in networking and associated protocols Experience in mobile security, including OS, RF, and App security. Ability in more »
Penetration Tester | UK Remote | £40,000-£50,000 I am currently working with a very successful fast growing Cyber Security Consultancy who specialise in PenetrationTesting and Security Consulting. This role allows you to work fully remote, and support some top clients. Within this role, you will … predominately be testing on Web application and Infrastructure testing. There is direct communication with the CTL meaning you will learn a lot form them. Progression in this role involves being able to gain certs such as CRT and CTL, and managing/building out a team of Pen Testers more »
OFFICIAL and above classifications. Provide specialist advice and knowledge of Public Cloud (Azure, AWS, GCP) cloud-based security architectures. Define and lead external security testing (e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. … Serverless architectures Implementing Information Security and Privacy Standards and Frameworks (e.g. ISO 27k, NIST800-53, CIS, GDPR) Leading security working groups and external security testing (ITHC, PenetrationTesting, etc) of cloud solutions at high HMG classification levels (OFFICIAL required, SECRET desirable) or equivalent in other industries Designing … utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is more »
risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetrationtesting and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such … security technologies by developing selection criteria to identify appropriate security solutions to support strategic, operational needs, and security requirements. Participate in the development and testing of the security incident response plan, act as the incident response leader. Develop security, risk, and compliance reports and alerts. Participate in the yearly … review of policies and procedures to support information security, risk, and security compliance activities. Participates in developing, testing, and implementation of disaster recovery procedures for the cybersecurity technology in place. Manages cybersecurity projects to ensure that the delivery is on-time, within budget, and adopted to meet the company more »
Altrincham, Cheshire, North West, United Kingdom Hybrid / WFH Options
Cyber Security Specialists
who provide a range of Security consultancy and Managed security services.Examples include Cyber Security, Cloud Security & Data Privacy Consultancy, Vulnerability Scanning, Cloud Security Assessments & PenetrationTesting services. We are growing and looking to recruit a Cyber Security Consultant with experience of supporting clients in the Public sector. Were … OFFICIAL and above classifications. Provide specialist advice and knowledge of Public Cloud (Azure and AWS) cloud-based security architectures. Define and lead external security testing (ITHC, Pen Testing, etc) of solutions on the public cloud native platforms and Software as a Service (SaaS) solutions. Perform risk assessments of more »
Alto. Onion Security, Splunk, Suricata, Kali. Application Security. Identity and Access Management. Data Protection Endpoint Security. Cyber Security Operations. Experienced with Threat Modelling. Pen testing and basic incident response. Scripting languages ( python, or PowerShell/building dashboards/automating common tasks) Preferred : Experience in designing systems against a zero more »
Reading, England, United Kingdom Hybrid / WFH Options
Vallum Associates
PaloAlto. • Onion Security, Splunk, Suricata, Kali. • Application Security. • Identity and Access Management. • Data Protection. Endpoint Security. • Cyber Security Operations. • Experienced with Threat Modelling. • Pen testing and basic incident response. • Scripting languages ( python, or PowerShell/building dashboards/au- tomating common tasks) Preferred: • Experience in designing systems against a more »
Defence capability and make significant contributions to our security operations. Ideal candidates will bring a strong background in threat management, vulnerability assessment, and security testing, aiming to drive innovation and excellence in our security practices. Key Responsibilities: Conduct thorough vulnerability assessments across various platforms, including networks, systems, applications, and … and recommend actionable remediation strategies. Work collaboratively with multiple stakeholders to prioritize vulnerabilities based on severity, impact, and exploitability. Manage end-to-end security testing processes, including penetrationtesting for identifying security weaknesses across IT, IoT, and OT environments. Coordinate and oversee remediation efforts to ensure timely more »
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Proactive Appointments Limited
experience in a Cyber Security Engineer role where they have gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. Experience working with cloud hosting providers, managing application testing and working with system owners/developers to improve application security is highly … accurate logs of security events and incidents. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetrationtesting to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security training, reviewing the market for effective more »
Greater London, England, United Kingdom Hybrid / WFH Options
Luware
ensure technical compliance with relevant regulations and standards Identify and assess security risks and vulnerabilities to the company’s products Plan, scope and review penetrationtesting reports, new software patch releases and vulnerability scan reports, to develop remediation plans with our operational support teams to mitigate issues based more »
this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners/developers to … technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetrationtesting to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security training, reviewing the market for effective more »
this exciting role we are seeking an engineer who has gained knowledge and experience in web application security, web application firewalls, vulnerability management and penetration testing. They are also looking for experience working with cloud hosting providers, managing application testing and working with system owners/developers to … technology environments. Work to defined SLAs & KPIs. Represent Information Security as required at IT meetings. Assist in the management of patching, vulnerability analysis and penetrationtesting to ensure recommendations are risk assessed and implemented in a timely manner. Assist in group security training, reviewing the market for effective more »
solutions '€¢Experience of threat intelligence '€¢Leadership and mentoring experience and skills '€¢Understanding of low-level concepts including operating systems and networking '€¢Commercial experience in PenetrationTesting and/or Security Monitoring '€¢Understanding of networking and infrastructure design '€¢Knowledge/experience of one or more System administration (Linux, Windows more »
solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in PenetrationTesting and/or Security Monitoring Understanding of networking and infrastructure design Knowledge/experience of one or more System administration (Linux, Windows more »