slough, south east england, united kingdom Hybrid / WFH Options
Hays
About the role As a Senior Vulnerability Manager, you will be responsible for working with all stakeholders within group security and throughout the business for developing and enforcing the strategy and vision for end-to-end vulnerability management. You will be accountable for vulnerabilityassessment, vulnerability hunting and research and risk management. Tell me more … any questions you may have about the role, between 8:30am-5:00pm Monday to Friday. Shifts: Monday – Friday (37.5 hours per week) The must haves: 5 years+ of vulnerability management experience 7 years + of cyber security experience Understanding of cloud technologies and CI/CD pipeline Experience in working in a large or federated enterprises in the More ❯
exciting opportunity to join a new team to help grow and define your career! Key Responsibilities Monitor, detect, and respond to cybersecurity threats across enterprise and operational networks. Conduct vulnerability assessments and penetration testing to identify and mitigate risks. Support the development and implementation of cybersecurity policies, procedures, and standards. Collaborate with engineering and IT teams to ensure secure More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Pertemps
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerability scanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise and More ❯
Business Unit: Cyber Security Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In … Conduct comprehensive penetration tests : Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and social engineering simulations. Vulnerability identification and analysis : Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises with the goal of More ❯
Support bioinformaticians in building pipelines that are secure by design, version-controlled, and deployed through automated workflows. Collaborate with engineering teams to embed security throughout the development lifecycle. Automate vulnerability assessments to proactively identify and mitigate risks. Work closely with the security team to integrate best practices into new and existing features. Ensure compliance with security standards and regulations More ❯
maintain ISO 27001 and ISO 22301 compliance programs. Oversee and configure the GRC tool, ensuring it remains current and effective. Manage relationships with GRC solution providers. Conduct risk and vulnerability assessments, compliance reviews, and audits. Support and manage ISO 27001, ISO 22301, and PCI audits. Maintain a central repository for audit evidence. Develop and enhance the GRC framework in More ❯
a focus on automated security testing, deployment, and monitoring. Collaborate with the engineering teams to ensure security is integrated from feature development to deployment. Conduct regular security audits and vulnerability assessments to identify and mitigate risks across systems and environments. Work closely with internal and external R&D teams to integrate security best practices into new and existing features. More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯