ATT&CK Framework Desirable Certifications, Qualifications Experience: Computer Security Security Blue Team 1 or higher CompTIA Cyber Security Analyst SC-200 Microsoft Security Operations Analyst One of: CREST Registered Penetration Tester, CREST Certified Infrastructure Tester, Cyber Scheme Team Member (CSTM), Cyber Scheme Team Leader (CSTL), EC-Council Certified Security Analyst (ECSA): PenetrationTesting practical, EC-Council Certified … PenetrationTesting Professional (CPENT), Offensive Security Certified Professional (OSCP) Company benefits include: Discretionary 10% bonus Discretionary 2k annual training fund per employee Very competitive pension scheme Virtual GP Annual Eye Test More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Stripe Olt
part of a truly team driven environment. As a First Responder, you must display excellent outside-the-box thinking and communication skills. DESIRABLE EXPERIENCE. Vulnerability Assessment experience. Knowledge of Penetrationtesting tools and techniques. Network and firewall alert management. Active Directory and group policy management experience. Experience in deploying, managing, and supporting of endpoint security platforms Information security … in line with business requirements. PowerShell scripting. Experience with server infrastructure deployment, configuration and support. Ability to produce high-quality technical reports. Experience with Cyber Essentials and Essentials Plus. Penetrationtesting experience. Security related certifications (BTL1, BTL2, SC200, CySA+, Sec+, etc). Shift Allowance: additional 5k salary uplift for being on shift Performance-related, discretionary end-of-year More ❯
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and PenetrationTesting (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security More ❯
networked, and application environments. Support secure deployment practices in Microsoft technologies (e.g., Azure, M365, Active Directory), and provide direct assistance in resolving technical design and configuration challenges. Assist with testing and validating cyber security controls during implementation. Track, prioritise, and drive remediation of technical security risks Maintain a visible and well-structured log of identified security issues, ensuring that … validated and documented. Act as the designated operational lead for BC/DR cyber input Provide authoritative security input into GLD's Business Continuity and Disaster Recovery planning and testing processes, ensuring cyber considerations-such as backup integrity, ransomware preparedness, and secure failover mechanisms-are incorporated into organisational resilience plans. Support simulations and post-incident reviews to strengthen future … to-date, and aligned with legal, regulatory, and architectural requirements. Lead periodic reviews in response to emerging threats, changes in business operations, or evolving technologies. Coordinate, commission, and interpret penetrationtesting and vulnerability assessments Oversee the planning and execution of penetration tests and vulnerability scans across GLD's digital estate. Work with external providers and internal teams More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
point of contact for Clients, Internal and External via email, teams and telephone. Scheduling, coordinating and prioritising engagements. Collaborating with teams and other members to allocate engagements to the Penetrationtesting team, Security specialistsand Cyber Essentials/Plus assessors Paying attention to detail andensuring all aspects of the project are completed to a high standard. Keeping andmaintaining digital More ❯