Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for NAC upgrades and troubleshooting. 4. IP Telephony Support More ❯
We are currently seeking a highly skilled and results-oriented Penetration Tester with at least 5 years of hands-on penetrationtesting experience. This is a rare opportunity to join a highly skilled and diverse security team committed to continuous growth and excellence in the field of offensive security. This role is office-based with occasional travel … to client site. Key Responsibilities Lead internal and external penetration tests, including web, mobile, infrastructure, wireless, cloud, and social engineering. Execute red team, purple team, and breach simulation exercises tailored to client maturity and objectives. Deliver detailed and actionable penetrationtesting reports Collaborate with clients to understand their specific security needs and present findings in a clear … manner. Develop and maintain security testing methodologies and procedures in alignment with industry best practices. Reviewed penetration test reports to ensure they are up to standard and meet test objectives. Mentor junior penetration testers. Assist in incident response activities, including investigation, containment, and remediation of security incidents. Conduct cloud security assessments. Essential Requirements Must be currently residing More ❯
analysis and mitigation strategies for vulnerabilities. Identifying security vulnerabilities and assessing their impact. Implementing control frameworks such as NIST 800-53, ISO 27001, FedRamp, and NIST CSF. Experience with penetrationtesting tools for web applications. Maintaining system/application records for reporting and alerts. Advising on IT security policies and procedures to reduce risks. Staying current with emerging More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
Best Companies as Best Company To Work For in the UK, Tech, and the South East in 2023. We are ISO27001 and ISO9001 certified by UKAS, a CREST approved penetrationtesting and SOC company, and hold IASME Cyber Essentials Certification and Cyber Essentials Plus certification. Learn more about our awards here . Why work for FSP? We offer More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor’s or Master’s degree … in Computer Science or related field (e.g. Electrical Engineering) 7+ years industry experience in one or more of the following areas: software/product security assessments, penetrationtesting, red teaming, web application assessments Aptitude for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and … iOS/Android), Reverse Engineering (e.g. IDA Pro/Ghidra/Radare2), Fuzzing (e.g. Jazzer/AFL/Peach), Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proficiency in manual penetrationtesting in at least TWO or more of the following areas - Mobile, API, Infrastructure, OS, Web Application Knowledge of common vulnerabilities in different More ❯
review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetrationtesting knowledge is also super useful •Familiarity with Cloud Development Kit (CDK) and GitOps •Experience operating in a DevOps/agile team environment •Understanding of docker, Kubernetes, serverless More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
Best Company To Work For in the UK, Tech and the South East in 2023. We are ISO27001 and ISO9001 Certified by UKAS. We are also a CREST approved penetrationtesting and SOC company, IASME Cyber Essentials Certification body and Cyber Essentials Plus certified. Find out more about our awards here: Why work for FSP? At FSP, we More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
Best Company To Work For in the UK, Tech and the South East in 2023. We are ISO27001 and ISO9001 Certified by UKAS. We are also a CREST approved penetrationtesting and SOC company, IASME Cyber Essentials Certification body and Cyber Essentials Plus certified. Find out more about our awards here: Why work for FSP? At FSP, we More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
Designing and evaluating complex systems for computer security Scope and execute security assessments and vulnerability research Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help engineering teams identify security-related weaknesses Collaborate with engineering teams to help them triage and fix security issues Mentor members of the team in computer and … s degree in Computer Science or related field (e.g. Electrical Engineering) 15+ years of relevant experience in one or more of the following areas: software/product security assessments, penetrationtesting, red teaming, web application assessments Interest in vulnerability research and exploit development – leading groups of 5 -10 engineers past experience required Understanding of operating systems, CPU instruction … iOS/Android) Reverse Engineering (e.g. IDA Pro/Ghidra/Frida) Fuzzing (e.g. Jazzer/AFL/Peach) Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proven experience with security research including any published CVEs Experience developing proof of concept exploits bypassing modern exploit mitigations Active participant or organiser of Capture The Flag competitions Knowledge More ❯