have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and Change Management. More ❯
Nottingham, Nottinghamshire, United Kingdom Hybrid / WFH Options
Experian Group
Defender for Cloud, GuardDuty, CloudTrail, or CloudWatch. System administration on Unix, Linux, or Windows Network forensics, logging, and event management Defensive network infrastructure (operations or engineering) Vulnerability assessment and penetrationtesting concepts Malware analysis concepts, techniques, and reverse engineering In-depth knowledge of network and host security technologies and products (such as firewalls, network IDS, scanners) and improve More ❯
Collaborate with teams to resolve performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root cause analysis and recommend mitigation More ❯
English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with More ❯
log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of 2 to More ❯
Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/7 operations More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Ccl Solutions Group
Summary: CCL Solutions Group is seeking an exceptional Senior Penetration Tester with CHECK Team Leader Infrastructure (CTL-INF) qualifications to join our elite team of security professionals. Location: Home based Main Job Summary This is more than just a job, we're looking for individuals with a hacker's mindset, deep technical expertise, and a relentless drive to secure … leading provider of cybersecurity services, we are a team committed to making a real difference in protecting communities, businesses, and the critical infrastructure of the UK. As a Senior Penetration Tester within CCL Solutions Group, your key responsibilities will be: Lead and deliver end-to-end penetrationtesting engagements across infrastructure and cloud environments. Manage and mentor … Leader certification (Cyber Scheme Team Leader - INF or CREST CCT-INF). Minimum of 2 years delivering CHECK engagements as a CTL. At least 3 years of hands-on penetrationtesting experience in enterprise environments. Deep understanding of infrastructure testing, Active Directory security, and cloud technologies (AWS, Azure, Kubernetes). Strong familiarity with tools such as Nmap More ❯
Key responsibilities include: Designing security architectures, solutions, and controls to safeguard client assets and data. Developing incident response plans and assisting customers in their implementation. Performing security assessments , including penetrationtesting, to identify vulnerabilities and proposing mitigation strategies. Recommending and implementing security tools such as firewalls, IDS, endpoint protection, and DDoS mitigation solutions. Building strong client relationships through More ❯
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
Stratford-upon-avon, Warwickshire, United Kingdom Hybrid / WFH Options
Big Red Recruitment
data and broadcast services to global customers. In this role, you will: Own cloud operations across Azure and drive platform performance and cost optimisation Oversee security engineering, audits, pen testing, and compliance Lead change and incident management and support services (24/7) Manage end-user tech, corporate apps (e.g. ServiceNow, Salesforce), and software licensing Collaborate with exec leadership More ❯
the wider DB&T team on ongoing work programs. Maintain regular communication with the immediate product team regarding in-flight work and future scope. Liaise with security teams for penetrationtesting, vulnerability reports, and general security updates. Collaborate with legal teams on GDPR, data, and compliance matters across the portfolio. Innovate to reduce paper usage and drive digital More ❯
Cannock, Staffordshire, Great Wyrley, United Kingdom
Veolia
the wider DB&T team on ongoing work programs. Maintain regular communication with the immediate product team regarding in-flight work and future scope. Liaise with security teams for penetrationtesting, vulnerability reports, and general security updates. Collaborate with legal teams on GDPR, data, and compliance matters across the portfolio. Innovate to reduce paper usage and drive digital More ❯
making a brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetrationtesting, vulnerability scanning to name a few. All candidates should make sure to read the following job description and information carefully before applying. This role is to join More ❯
small, agile team involved in CE/RED certification projects, helping us discover, define, and execute how third-party IoT or radio-connected devices can demonstrate conformance through practical testing, documentation, or gap analysis. Ideal for someone who thrives at the intersection of security and network engineering, product compliance, and is generally curious. Travel to the clients and vendor … sites will be required. Responsibilities Explore and define practical methods to verify EN18031-1/2/3 conformity for vendor-supplied devices. Assist in testing or simulation of product behavior against cybersecurity requirements (e.g., secure update, authentication, network misuse). Analyze vendor documentation (e.g., TCFs, firmware, update methods) to assess risk or compliance gaps. Contribute to the creation … test plans, checklists, or internal assessment criteria aligned to RED Article 3(3)(d)/(e)/(f). Work collaboratively with product compliance managers, QA teams, and external testing labs. Assist in building a repeatable discovery and test process for validating EN18031-1/2/3 conformity for vendor-supplied devices What We’re Looking For Experience More ❯
making a brand/reputation of working with large police forces across the UK and assisting with Technical Cyber Security consulting side and offering services such as outsourced SOC, penetrationtesting, vulnerability scanning to name a few. This role is to join the commercial team to leverage current client base and offer technical Cyber Security solutions but mainly More ❯