areas, including WAF Proofs of Concept (PoCs) Provide specialized WAF-focused advice on web and API attack methodologies, evasions, and mitigation techniques, leveraging your ethicalhacking background. Contribute to DevSecOps/DevOps with security testing expertise to enhance the automation aspects of the project. Ideal Candidate Profile Someone … into a WAF Engineering SME Akamai Or F5 BIG-IP/NGNIX+ Or AVIWAF Or CSPs (AWS/Azure/GCP) Strong background in ethicalhacking Extensive experience with web-based attack methodologies, including knowledge of tools, payloads, exploits, and countermeasures. Proficient in web application and API security. more »
areas, including WAF Proofs of Concept (PoCs) Provide specialized WAF-focused advice on web and API attack methodologies, evasions, and mitigation techniques, leveraging your ethicalhacking background. Contribute to DevSecOps/DevOps with security testing expertise to enhance the automation aspects of the project Key Accountabilities: Utilize ethicalhacking skills to safeguard the organization from web-based attacks, ensuring the protection of operations, reputation, and customer trust. Conduct in-depth technical evaluations of WAF solution rulesets, focusing on detection and prevention of web and API security threats. Develop custom WAF rules and features, addressing gaps and more »
identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies including MPLS, SD WAN. Knowledge of cloud providers security (AWS more »
Manchester, Clifton, City and Borough of Salford, United Kingdom Hybrid / WFH Options
Advania UK
not essential: One or more Microsoft security focused accreditations, SC-200 or AZ-500 Having achieved a BSc or MSc in Cyber Security incorporating EthicalHacking, Digital Forensics or Information Security One or more of the following industry certifications: CEH, GCIA, GCIH, GSEC, Security+, GCTI Experience in secured more »
SANS301/SANS401/FOR578, Crest CRTIA/CCTIM, Security+, or similar. Ideally a BSc or MSc in Cyber Security, preferably including modules on EthicalHacking, Digital Forensics, Information Security or Threat Intelligence Please note you need to be eligible to undergo the Security Clearance process for this more »
diverse technology and business teams. Strong verbal and written communication skills. Desirable experience: Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). In-depth knowledge of Operating System security and system hardening concepts, such as CIS Benchmarks. more »
diverse technology and business teams. Strong verbal and written communication skills. Desirable experience: Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). In-depth knowledge of Operating System security and system hardening concepts, such as CIS Benchmarks. more »
including but not limited to: CISSP – Certified Information Systems Security Professional, CISM – Certified Information Security Manager, ISSAP – Information Systems Security Architecture Professional, CEH – Certified Ethical Hacker, AWS Certified Solution Architect more »
National Security clearances Hold one or more the following: CompTIA, GIAC Security Essentials (GSEC), NIST Cybersecurity Framework (NCSF), Offensive Security Certified Professional (OSCP), Certified Ethical Hacker (CEH), Certified Information Security Manager (CISM), Certified Cloud Security Professional (CCSP), Certified Information Systems Security Professional (CISSP), Certified Protection Professional (CPP), Industrial Security more »
threat patterns and vulnerabilities i.e. SentinelOne Managing technical problems related to applications and production equipment Addressing intrusions using expertise in computer forensics Engage in 'ethicalhacking', for example, simulating security breaches Foreseeing future problem areas by monitoring workflows and network traffic patterns Monitor identity and access management, including … and cloud security technologies would be beneficial. Strong understanding of firewalls, networking. Microsoft 365 and endpoint security. Keen awareness of Cyber Security trends and hacking techniques. Network Security Control If you are a highly skilled Cyber Security Engineer, who is looking to take on a new challenge within the more »
beneficial to applicants: Certification in Computer Science, Information Security, or related field (or equivalent work experience). Cybersecurity certifications such as CompTIA Security+, Certified Ethical Hacker (CEH) or Microsoft M365/Azure Understanding of cybersecurity principles, networking concepts, and various operating systems. Knowledge of common security threats, attack vectors more »
to conduct vulnerability assessments, threat analysis, and reporting. Experience/understanding of Cloud Platforms AWS/GCP and Firewalls Possess a related credential for ethicalhacking and security risk assessment Be excellent in oral and written communication skills and interpersonal skills Relevant certifications such as - Certified Information Systems more »
Experience with network and application firewalls, intrusion prevention, anti-virus, and security tooling. Familiarity with Microsoft 365/Azure. Desirable: SSCP or CISSP CISM EthicalHacking/Purple Teaming more »
into applications and company culture. •Research and evaluate technologies to mitigate cyber security threats. •Lead major security incidents and investigations. •Perform penetration testing and ethicalhacking activities. •Penetration test and enhance internal FIAT and cryptocurrency custodian processes and procedures. •Monitor and investigate activities on the dark web. •Maintain more »
modelling and risk scoring platforms Proxy security Vulnerability and Threat detection/Endpoint detection and response (EDR) Intrusion detection and prevention, such as Darktrace Ethical Hacker, Cyber Security SANS, CISSP certification Packet capture networking Systems and Networks Firewalls and Load balancers This is not a network security/firewall more »
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM more »
and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM more »
Senior Software Engineer for Security EHT UK, Remote Global Product Security’s EthicalHacking Team (EHT) is responsible for performing in-depth security assessments across Oracle’s entire product and service portfolio. Over the years, the EHT has built a suite of pioneering security tools used for both more »
to guarantee interviews upon completion. You will receive various qualifications including CompTIA Network+, Security+, A+, CySA+, Linux+, PenTest+, Cloud+, Cisco CCNA, CCSP and Certified Ethical Hacker qualifications. * The Cyber Security role is subject to successful completion of the training course. The price of the course is £69 per month more »
to guarantee interviews upon completion. You will receive various qualifications including CompTIA Network+, Security+, A+, CySA+, Linux+, PenTest+, Cloud+, Cisco CCNA, CCSP and Certified Ethical Hacker qualifications. * The Cyber Security role is subject to successful completion of the training course. The price of the course is £69 per month more »
Birmingham, West Midlands (County), United Kingdom
IT Career Swap
to guarantee interviews upon completion. You will receive various qualifications including CompTIA Network+, Security+, A+, CySA+, Linux+, PenTest+, Cloud+, Cisco CCNA, CCSP and Certified Ethical Hacker qualifications. * The Cyber Security role is subject to successful completion of the training course. The price of the course is £69 per month more »
Birmingham, England, United Kingdom Hybrid / WFH Options
GTS Group Ltd
Top 10 Security risks Preferred certificate in Certified Information Systems Security Professional (CISSP) or Certified Secure Software Lifecycle Professional (CSSLP); bonus certificate in Certified Ethical Hacker (CEH) or Offensive Security Certified Professional (OSCP) Due to the nature of the work, the client are unable to consider candidates on a more »
support to clients' IT teams to enhance their understanding of network security principles and Cisco technologies. Requirements: Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or other relevant certifications preferred. Proven experience in network security assessment, design, and implementation, with a strong understanding of Cisco technologies. In more »
that improve existing assessment capabilities. Essential Criteria: Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability assessment and more »