City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years … of experience in threat intelligence, cybersecurity operations, or penetration testing. Proven ability to collaborate across technical teams, including Red/Blue teams and SO Industry Experience Required or Preferred: Key Soft Skills (e.g Communication, leadership, stakeholder management): Analytical and detail-oriented with a strong sense of curiosity. Collaborative and team-focused, with a proactive approach to cross-functional engagement. … and analyze the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organizations business and technology environment. Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies. Act as a liaison between threat intelligence and More ❯
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetrationtesting and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders to maintain compliance and manage third … analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. PenetrationTesting and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
Paddington, Sheldon Square, Greater London, United Kingdom Hybrid/Remote Options
Morson Edge
SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetrationtesting and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders to maintain compliance and manage third … analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. PenetrationTesting and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
in providing expert technical advice for risk assessments and compliance initiatives. The ideal candidate will possess strong experience in managing and delivering security operations, including planning vulnerability assessments and penetrationtesting, investigating security breaches, maintaining operational security processes, maturity assessments and actively contributing technical expertise to risk management. An understanding of ISO27001 and Power BI would be beneficial … programme. The Role: Lead Security Operations (SecOps). Manage SOC and build capabilities. Advise on risk assessments. Ensure security compliance. 3 Days onsite in Birmingham The Person: Experience managing penetrationtesting and breach investigation. Able to advise on risk and conduct maturity assessments. Have an understanding of ISO27001 and Power BI. Desirable to have familiarity with GovAssure/ More ❯
Employment Type: Contract
Rate: £500 - £550 per day + Inside IR35 + ASAP Start
and the remainder remote working, for an initial 6 month contract. *Due to the nature of the work, the client required active SC Clearance* *Inside IR35* Role Description: A Penetration Tester plays a vital role within the UK's cybersecurity industry, particularly when assisting organisations with managing and mitigating security risks. The core responsibilities of a Penetration Tester … for maintaining an up-to-date knowledge of the ever-evolving threat landscape, adhering to ethical guidelines especially when handling sensitive data. In addition to strong technical skills, a Penetration Tester also needs to be able to demonstrate strong communication skills so complex findings can be described to non-technical stakeholders. Key Responsibilities: - Conduct the full range of effective … organisation skills and ability to work in a pressurised environment whilst working towards and achieving deadlines. - Use of MS Office software such as Word, Excel, Powerpoint - Strong knowledge of penetrationtesting tools including (Burpsuite, Metasploit, Nmap) etc - Good knowledge of multiple Operating Systems (OS) including Windows &.NIX - Ability to configure network devices, Firewalls, IDS/IPS devices and More ❯
Our client is looking for a Penetration Tester to join their team on six month initial contract, working onsite three days a week in Wokingham and the rest remote. This role is working via umbrella and requires a candidate with an active SC clearance. Required skills, experience and personal attributes: Proven experience (2-3 years) in an IT security … pressurised environment whilst working towards and achieving deadlines. Use of MS Office software such as Word, Excel, Powerpoint The ability to travel to Capgemini customer locations. Strong knowledge of penetrationtesting tools including (Burpsuite, Metasploit, Nmap) etc Good knowledge of multiple Operating Systems (OS) including Windows &.NIX Ability to configure network devices, Firewalls, IDS/IPS devices and More ❯
home Duration: 30/06/2026 Rate: 500p/d via Umbrella Clearance: Contractor must hold active SC Clearance and be a sole UK National Role Description: A penetration tester plays a vital role within the UK's cybersecurity industry, particularly when assisting organisations with managing and mitigating security risks. The core responsibilities of a penetration tester … for maintaining an up-to-date knowledge of the ever-evolving threat landscape, adhering to ethical guidelines especially when handling sensitive data. In addition to strong technical skills, a penetration tester also needs to be able to demonstrate strong communication skills so complex findings can be described to non-technical stakeholders. Required skills, experience and personal attributes: Proven experience … organisation skills and ability to work in a pressurised environment whilst working towards and achieving deadlines. Use of MS Office software such as Word, Excel, Powerpoint Strong knowledge of penetrationtesting tools including (Burpsuite, Metasploit, Nmap) etc Good knowledge of multiple Operating Systems (OS) including Windows &.NIX Ability to configure network devices, Firewalls, IDS/IPS devices and More ❯
Job Description: Mandatory Skills: PenetrationTesting - PT Experience: 5-8 Years Security Clearance - must be in the UK from 3 to 5 years. Job Description Coordinate with the team to scope and executing Pentest end to end, producing documentation Working knowledge of Jira, SNOW and confluence. Experience in regulatory compliance environment Experience working in API testing, Network More ❯
Warwick, Warwickshire, West Midlands, United Kingdom
Infoplus Technologies UK Ltd
Security Clearance - must be in the UK from 3 to 5 years. Job Description ?Mandatory Skills: PenetrationTesting - PT ?Experience: 5-8 Years Job Description Coordinate with the team to scope and executing Pentest end to end, producing documentation Working knowledge of Jira , SNOW and confluence. Experience in regulatory compliance environment Experience working in API testing , Network More ❯
Security Clearance - must be in the UK from 3 to 5 years. Job Description ?Mandatory Skills: PenetrationTesting - PT ?Experience: 5-8 Years Job Description Coordinate with the team to scope and executing Pentest end to end, producing documentation Working knowledge of Jira , SNOW and confluence click apply for full job details More ❯
the current Enterprise Architect to understand and document: The council s ICT Strategy and technical architecture. Existing security architecture, including compliance with PSN, PCI-DSS, LGA Cyber Security, and penetrationtesting protocols. Key platforms and technologies in use, including Microsoft Azure, M365, Active Directory, Intune, endpoint management, and any bespoke systems. Governance structures, design principles, and procurement processes. More ❯
TS1, Middlesbrough, North Yorkshire, United Kingdom
Deekay Technical Recruitment
the current Enterprise Architect to understand and document: The council’s ICT Strategy and technical architecture. Existing security architecture, including compliance with PSN, PCI-DSS, LGA Cyber Security, and penetrationtesting protocols. Key platforms and technologies in use, including Microsoft Azure, M365, Active Directory, Intune, endpoint management, and any bespoke systems. Governance structures, design principles, and procurement processes. More ❯
Birmingham, West Midlands, United Kingdom Hybrid/Remote Options
Crimson
processes, handle support requests, and investigate breaches as required. Monitor external security environments, identify emerging threats, and communicate findings to leadership when necessary Plan and coordinate vulnerability assessments and penetrationtesting, providing expert advice on tools and techniques. Support risk assessments, recommend mitigations, and ensure compliance with security policies and standards. Drive improvements within the external Security Operations More ❯
Luton, Bedfordshire, South East, United Kingdom Hybrid/Remote Options
Crimson
processes, handle support requests, and investigate breaches as required. Monitor external security environments, identify emerging threats, and communicate findings to leadership when necessary Plan and coordinate vulnerability assessments and penetrationtesting, providing expert advice on tools and techniques. Support risk assessments, recommend mitigations, and ensure compliance with security policies and standards. Drive improvements within the external Security Operations More ❯
team Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round security posture in mobile appsincluding associated services (penetrationtesting, obfuscation, consultancy etc.). Our mission is tobuild a scalable, adaptable, and proactive approach to securing LBGs mobile apps, enabling mobile engineers across the bank to operate More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge click apply for full job details More ❯
team Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round security posture in mobile appsincluding associated services (penetrationtesting, obfuscation, consultanc click apply for full job details More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable Skills/Knowledge/Experience Familiarity with mobile development, DevSecOps tooling … testing and automation frameworks Have deep knowledge and experience using the mobile security tools Good understanding of authentication, authorisation, encryption, and cryptography patterns Experience in proactive researching of new technologies emerging in the security landscape More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable skills/knowledge/experience: Familiarity with mobile development, DevSecOps tooling … testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good understanding of authentication, authorisation, encryption, and cryptography patterns. Experience in proactive researching of new technologies emerging in the security landscape. More ❯