Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Deloitte LLP
best practices, and provide recommendations for improvement. Conduct security audits and assessments to identify gaps and recommend remediation actions. Conduct risk assessments and scope vulnerability assessments to identify potential security threats and vulnerabilities. Connect to your skills and professional experience Candidates will be able to demonstrate relevant knowledge and … and access control mechanisms. Experience with security technologies such as firewalls, intrusion detection/prevention systems, security information and event management (SIEM) systems, and vulnerabilityassessment tools, and their configuration options. Familiarity with cloud security principles and best practices, including securing cloud-based infrastructure and services (AWS, Azure More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical … analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerabilityassessment techniques such as fuzzing and code injection Researchers undertaking experimental development … experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverse engineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research More ❯
best practices, including ISO27001, SOC2 and Cyber Essentials controls. Experience with firewalls, intrusion detection systems, anti-virus software, and data encryption. Knowledge of risk assessment tools, technologies, and methods. Experience designing secure networks, systems, and application architectures. Eligible for SC Clearance (lived in the UK for 5 years or … more). Vulnerability Management Carry out internal vulnerability assessments in line with industry best practice. Manage our 3rd party penetration testing (Continuous Security Testing) service, review of reports and ensure technical teams resolve defects in a timely manner. Ensuring our automated scanning tools (Nessus and Qualys) are maintained More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Jisc
solutions, ensuring they align with business needs, scalability, and technological advancements. Implementing security measures to safeguard the infrastructure, including firewalls, encryption, access controls, and vulnerability assessments. Automating the setup and management of infrastructure components, writing code to define and deploy resources, making the process efficient and consistent. Continuously monitoring More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
As a Penetration Tester, you will be instrumental in evaluating and strengthening our clients' security frameworks. Your role will involve conducting advanced penetration testing, vulnerability assessments, and red teaming exercises to identify and mitigate security risks. Additionally, you will contribute to project management and client engagement. Key Responsibilities: Plan … and execute penetration tests on networks, systems, and applications to identify security vulnerabilities. Perform in-depth vulnerability assessments, security audits, and risk analysis, providing clients with detailed reports and actionable recommendations. Collaborate with the red team to simulate real-world cyber threats and evaluate the effectiveness of security measures. … Security, or a related discipline. Relevant certifications: CHECK Team Member, CREST Registered Tester, or equivalent. Minimum of 2 years' experience in penetration testing and vulnerability assessment. Strong understanding of network protocols, operating systems, and security technologies. Proficiency in penetration testing tools such as Metasploit, Burp Suite, Nmap, and others. More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Somerset Bridge Group
and support.Security & Compliance Collaborate with IT Compliance to ensure infrastructure is secure and compliant with industry regulations. Manage regular security audits, patch management and vulnerability assessments in accordance with the Vulnerability Management framework.Stakeholder Management Develop and maintain strong relationships with key stakeholders across the organisation. Liaise with suppliers More ❯
Gloucester, Gloucestershire, South West, United Kingdom Hybrid / WFH Options
Anson Mccade
support the development of next-generation RF systems. This role involves contributing to a variety of secure, high-impact projects focused on RF communications, vulnerability analysis, and mission system design. The position provides exposure to the full RF engineering lifecycle, from circuit modelling and antenna design through to system … to meet specific system requirements Select and optimise antennas for specialised applications Perform real-time RF testing using spectrum and vector network analysers Conduct vulnerability assessments on embedded RF systems Develop specialist RF research and test tools Support system development and verification activities, including trial involvement Required Experience: Practical … with software-defined radios and associated development workflows Desirable Skills: Digital Signal Processing (DSP) and RF algorithm development Antenna optimisation and characterisation Embedded systems vulnerability analysis Working knowledge of tools such as OpenCPI, GnuRadio, VHDL, Python, C/C++ Development experience on Linux platforms and familiarity with Git-based More ❯
Gloucester, England, United Kingdom Hybrid / WFH Options
Anson McCade
support the development of next-generation RF systems. This role involves contributing to a variety of secure, high-impact projects focused on RF communications, vulnerability analysis, and mission system design. The position provides exposure to the full RF engineering lifecycle, from circuit modelling and antenna design through to system … to meet specific system requirements Select and optimise antennas for specialised applications Perform real-time RF testing using spectrum and vector network analysers Conduct vulnerability assessments on embedded RF systems Develop specialist RF research and test tools Support system development and verification activities, including trial involvement Required Experience: Practical … with software-defined radios and associated development workflows Desirable Skills: Digital Signal Processing (DSP) and RF algorithm development Antenna optimisation and characterisation Embedded systems vulnerability analysis Working knowledge of tools such as OpenCPI, GnuRadio, VHDL, Python, C/C++ Development experience on Linux platforms and familiarity with Git-based More ❯