FK3, Grangemouth, Falkirk, Stirling and Falkirk, United Kingdom
Logicomms
with enhanced security requirements. • Create, refine, and update tailored cyber security policy documents. • Conduct annual cyber audits to track progress, maintain compliance, and highlight risks. • Perform vulnerability assessments and penetrationtesting to uncover and remediate potential threats. • Analyse and monitor security logs across a range of platforms, identifying suspicious activity and responding accordingly. • Assess and manage third-party … Certifications such as CISSP, CISM, CISA, CEH, CompTIA Security+, or similar (highly advantageous). • Hands-on experience with Cyber Essentials and Cyber Essentials Plus. • Proven background in security audits, penetrationtesting and vulnerability assessments. • Strong working knowledge of NCSC best practice and how to apply it for SMEs. • Experience developing security policies, analysing logs and supporting incident response. More ❯
and delivering exceptional results aligned with business priorities. Our commitment to security and quality is reinforced by our ISO27001 and ISO9001 certifications (UKAS), as well as our CREST approved penetrationtesting and SOC capabilities. Additionally, we are an IASME Cyber Essentials Certification Body and Cyber Essentials Plus certified. Find out more about our accolades here: Why work for More ❯
exceptional results that are aligned with business priorities. Our commitment to security and quality is reinforced by our ISO27001 and ISO9001 certifications (UKAS), as well as our CREST approved penetrationtesting and SOC capabilities. Additionally, we are an IASME Cyber Essentials Certification Body and Cyber Essentials Plus certified. Find out more about our accolades here: Why work for More ❯
Development - Enhance and extend mobile app security solutions using system-level insights. Mobile OS Research - Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. Reverse Engineering & Security Testing - Utilise white hat techniques, including penetrationtesting and reverse engineering, to identify and address threats. Collaboration & Innovation - Work closely with the team in an office-based setting More ❯
Development - Enhance and extend mobile app security solutions using system-level insights. Mobile OS Research - Dive into Android, iOS, and HarmonyOS Next to analyse system behaviours. Reverse Engineering & Security Testing - Utilise white hat techniques, including penetrationtesting and reverse engineering, to identify and address threats. Collaboration & Innovation - Work closely with the team in an office-based setting More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯