Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
Testing). Familiarity with OWASP Top 10, CWE, and remediation strategies. Hands-on experience with security testing tools and techniques. Excellent communication and documentation skills. Relevant certifications (e.g. CISSP, SANS GCIA, Security+, CCNA/CCNP). Solid understanding of IT infrastructure, protocols, and security design. Desirable: Background in threat modelling. Degree in Computer Science or equivalent experience. Knowledge of More ❯
to review Job responsibilities Due to the nature of this role, previous experience working in an Analyst role within a Cyber Security Operations Centre is essential. Essential Qualifications required SANS SEC504 (GIAC GCIH) SANS SEC511 (GIAC GMON) SANS SEC541 (GIAC GCTD) SANS FOR508 (GIAC GCFA) SANS FOR509 (GIAC GCFR) AZ-500: Azure Security Engineer Associate More ❯
to review Job responsibilities Due to the nature of this role, previous experience working in an Analyst role within a Cyber Security Operations Centre is essential. Essential Qualifications required SANS SEC504 (GIAC GCIH) SANS SEC511 (GIAC GMON) SANS SEC541 (GIAC GCTD) SANS FOR508 (GIAC GCFA) SANS FOR509 (GIAC GCFR) AZ-500: Azure Security Engineer Associate More ❯
the shortlisting and interview processes Due to the nature of this role, previous experience working in an Analyst role within a Cyber Security Operations Centre is essential.Essential Qualifications required SANS SEC504 (GIAC GCIH) SANS SEC511 (GIAC GMON) SANS SEC541 (GIAC GCTD) SANS FOR508 (GIAC GCFA) SANS FOR509 (GIAC GCFR) AZ-500: Azure Security Engineer Associate More ❯
have: Experience in a similar role, in both responsibility and scale Proficiency with one of the following: Python, Jenkins, Powershell, Bash, GitHub Actions Relevant professional certifications for example: CISSP SANS Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security More ❯
have: Experience in a similar role, in both responsibility and scale Proficiency with one of the following: Python, Jenkins, Powershell, Bash, GitHub Actions Relevant professional certifications for example: CISSP SANS Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security More ❯
end vulnerability management workflow to include industry standards such as CVE, CPE, CVSS. Possess, or working towards, professional or industry security/IT certifications, such as, CEH, MCSA, CISSP, SANS, and an understanding of the security principles outlined in OWASP, CIS, NIST and ISO27000. It would be advantageous for the successful candidate to have an adaptive attitude to a More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux for effective vulnerability assessment and penetration testing. Apply knowledge of OWASP Top 10 and SANS Top 25 vulnerabilities and communicate methodologies with development teams. Skills, Experience, and Abilities Required: Essential: Proficient with pen testing tools such as Cobalt Strike, Caldera, Atomic Red Team, Pentera … experience in information security, with a focus on technical cyber security. Minimum of 5 years' experience in a network/cloud security environment. Certifications such as CISSP, CCSP, OSCP, SANS or equivalent. Certification in one or more cloud vendor offerings (AWS, GCP, Azure, OCI). More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
complex technical security concepts to technical and non-technical audiences including executives. Perform technical quality reviews and conduct technical conversations directly with clients. Confident with OWASP Top 10 and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerability assessment … years of experience in information security, with a focus on Technical Cyber Security domain Minimum of 5 years experience in a network/cloud security environment. CISSP, CCSP, OSCP, SANS or equivalent desirable Certification in one or more cloud vendor offerings such as AWS, GCP, Azure, OCI. More ❯