have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. More ❯
log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of 2 to More ❯
verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability to work independently. Willingness to work More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
Stoke-on-Trent, Staffordshire, UK Hybrid / WFH Options
WeDo
You’re walking into a mature environment: The company already has Secure SDLC and DevSecOps practices in place. This isn’t a ground-up build – it’s about stress-testing and strengthening what’s already built. You’ll have impact and visibility: Reporting to the CIO, with close collaboration with the Head of Information Security (compliance), you’ll shape … You’ll Be Doing: Actively identifying vulnerabilities in applications, especially around authentication flows, payments, and sensitive data handling Thinking creatively and adversarially – “breaking the app” to protect it Performing penetrationtesting, threat modelling, and secure code reviews Working directly with developers to integrate security best practices into an already-operational DevSecOps pipeline Advising on product and architectural design … culture that prioritises customer trust and system integrity What We’re Looking For: Deep hands-on experience in application security – not just theory, but experience in secure coding, manual testing, and fixing complex vulnerabilities A proven background in credit cards, payments, or financial transaction systems Understanding of modern application architectures (APIs, microservices, cloud platforms – likely Azure) Familiarity with OWASP More ❯
the wider DB&T team on ongoing work programs. Maintain regular communication with the immediate product team regarding in-flight work and future scope. Liaise with security teams for penetrationtesting, vulnerability reports, and general security updates. Collaborate with legal teams on GDPR, data, and compliance matters across the portfolio. Innovate to reduce paper usage and drive digital More ❯
Cannock, Staffordshire, Great Wyrley, United Kingdom
Veolia
the wider DB&T team on ongoing work programs. Maintain regular communication with the immediate product team regarding in-flight work and future scope. Liaise with security teams for penetrationtesting, vulnerability reports, and general security updates. Collaborate with legal teams on GDPR, data, and compliance matters across the portfolio. Innovate to reduce paper usage and drive digital More ❯