infrastructure. Conduct architectural reviews and ensure security controls are implemented across all systems, with a focus on privacy and compliance. Define and oversee security testing requirements, including penetrationtesting, and provide actionable feedback to stakeholders. Lead, facilitate, and participate in technical steering group meetings, change management processes More ❯
performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root More ❯
Building Automation Cybersecurity team, gaining hands-on experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetrationtesting, and participating in cyber assessments while learning about standards such as … systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of cyber assessment vulnerability assessment and penetration testing. Assist in detailed design documents for various cyber solutions. Participate in design discussions with end customers and vendors. Manage existing cybersecurity platforms. Key … configuring Microsoft operating systems, firewall switches. Desirable Certifications: MCTS/MCSA (Microsoft) VCP (VMware) CCNA Offensive Security Certified Professional (OSCP) Practical Junior/Network Penetration Tester (PJPT/PNTP) Nice to have: Strong passion for cybersecurity and a desire to learn and grow in the field. Basic knowledge of More ❯
strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, PenetrationTesting (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able to recognise and manage More ❯
Birmingham, West Midlands, United Kingdom Hybrid / WFH Options
Inspire People
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
stays at the forefront of the constantly evolving field of Cybersecurity. This role also has the potential to lead/evolve into IT Security, PenetrationTesting, and Information Governance specialisations. Key Responsibilities Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems … to the Cyber Essentials Scheme. Conduct in-depth vulnerability assessments to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Experis UK
since 2003 and our focus has always been on excellence in cyber security. We have teams that offer world class services in red teaming, penetrationtesting, threat intelligence, research and development, detection and response, governance, risk, and compliance, and plenty more. Our business is global and so are More ❯
and regulations (e.g., NCSC, ISO, SoC, NIST, PCI, GDPR). Experience in application or infrastructure architecture, software development, or related fields. Skills in security testing using appropriate tools. Familiarity with Continuous Security, CI/CD practices. Understanding of network security, web application security (OWASP), and cryptographic controls (PKI, TLS … technical teams. Desirable Skills Experience with identity management and authentication/authorization solutions. Involvement in governance, risk, compliance, operational security, and supply chain security. Penetrationtesting qualifications (e.g., OSCP, CREST). Experience leading security engineers and junior staff. Join Us What are you waiting for? Let's write More ❯
practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for backend … frontend, and cloud-based applications. Perform unit testing, debugging, and troubleshooting to ensure software quality and regulatory compliance. Write clear and comprehensive documentation for system designs, APIs, and regulatory submissions. Qualifications & Skills: Required: Bachelor's or Master's degree in Computer Science, Software Engineering, or related field. 5+ years … leadership experience in regulated industries (medical devices preferred). Deep understanding of IEC 62304, FDA software regulations, and cybersecurity best practices. Experience in unit testing, DevOps, CI/CD pipelines, and cloud security. Strong knowledge of microservices architecture, RESTful APIs, and database management (SQL/NoSQL). Preferred: Cloud More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Arthur J. Gallagher & Co
encourage you to apply. Overview Are you ready to take your cybersecurity skills to the next level? We're seeking a dynamic Mid-Level Penetration Tester to join our growing team within a large organisation. This is a client-facing, fully remote role with exciting travel opportunities for internal … engagements, wireless assessments, and red teaming. This opportunity sits withing our Cyber Risk Management Division and will part of a team of 4 Penertration Testing experts. This is mainly a remote based role however travel to clients locations and also Gallagher offices in the UK will be a requirement. … How you'll make an impact Conduct external, internal, web application, WiFi, cloud, and red team penetration tests. Engage in OSINT, phishing campaigns, Cyber Essentials audits, and governance projects. Provide cyber awareness training and network hardening consultations for clients. About you Experience as a Penetration tester with proven More ❯
Stoke-On-Trent, England, United Kingdom Hybrid / WFH Options
bet365
the Company’s hybrid working from home policy. Preferred skills and experience Excellent understanding and demonstrable experience of automated, dynamic and static application security testing tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation … languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for conducting and reporting on Web Application Penetration Testing. Strong documentation skills. Excellent communication skills. Main Responsibilities Providing support to technical leads and mentoring junior members of the team. Taking a lead … the project process to ensure that information security aspects are considered up front and throughout the project lifecycle. Contributing to and utilising our security testing methodologies, creating and updating technical documentation as necessary. Conducting manual and automated source code review. Liaising with the software development function to ensure that More ❯