London, UK - Milton Keynes, UK - Mobile England, UK - Nottingham, UK - Reading Job-ID: 214652 Contract type: Standard Business Unit: Cyber Security Life on the team Computacenter is growing our penetrationtesting capability and we are looking for an experienced penetration tester to support the delivery of vulnerability assessment and penetrationtesting services to Computacenter and … our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In this role, you will be responsible for identifying vulnerabilities in systems, applications, and networks through a variety of penetrationtesting methodologies. Your expertise will play a critical role in strengthening our security posture and safeguarding our valuable … Security Professionals. If you are looking for a team that offers development and flexibility look no further and apply today What you'll do A highly skilled and motivated Penetration Tester to join our dynamic cybersecurity team. In this role, you will be responsible for identifying vulnerabilities in our systems, applications, and networks through various penetrationtestingMore ❯
work Manage vendor performance and escalations Security & Compliance: Act as primary point of contact for parent company security audits Develop and maintain security compliance documentation Coordinate and respond to penetrationtesting activities Implement security recommendations and remediation plans Ensure infrastructure meets corporate security standards Participate in security incident response planning Business Continuity: Lead disaster recovery planning for scientific … computing infrastructure Coordinate and execute DR testing Maintain DR documentation and procedures Develop and maintain business continuity plans Ensure RPO/RTO objectives are met Financial Planning & Technical Debt: Develop long-term capital planning for infrastructure Manage infrastructure budget and forecasting for AskBio European locations Identify and track technical debt Create remediation plans for technical debt Provide cost-benefit … optimization tools Demonstrated ability to work with scientific computing workflows Experience managing vendor relationships and contracts Knowledge of IT security and compliance requirements Experience with disaster recovery planning and testing Understanding of IT financial planning and budgeting Experience with audit responses and compliance documentation Strong experience with Linux administration and engineering Extensive knowledge of virtualization technologies, particularly VSphere Preferred More ❯
You'll Do Design and implement secure software solutions, applying security-by-design principles and recognised standards (ISO 27001, NIST). Conduct threat modelling, code reviews, vulnerability assessments, and penetration tests to identify and mitigate risks. Respond to security incidents, perform root cause analysis, and enhance incident response capabilities and documentation. Collaborate with developers and clients to embed secure … Cyber Security Analysting, ideally within defence, government, or critical infrastructure sectors Strong knowledge of secure software development, security protocols, and cyber security principles Skilled in using vulnerability assessment and penetrationtesting tools (e.g. Nessus, Burp Suite) Familiarity with security frameworks (ISM, PSPF, ISO 27001) and tools like SIEM, IDS/IPS, and threat intelligence platforms Excellent problem-solving More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯