City of London, London, United Kingdom Hybrid/Remote Options
Vanquish Technologies Limited
Simulation (BAS) platforms to build and validate threat scenarios. Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modeling. Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera. Experience producing threat reports and briefings. Certifications Required or Preferred: Years of relevant experience: 8+ years … of experience in threat intelligence, cybersecurity operations, or penetration testing. Proven ability to collaborate across technical teams, including Red/Blue teams and SO Industry Experience Required or Preferred: Key Soft Skills (e.g Communication, leadership, stakeholder management): Analytical and detail-oriented with a strong sense of curiosity. Collaborative and team-focused, with a proactive approach to cross-functional engagement. … and analyze the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organizations business and technology environment. Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies. Act as a liaison between threat intelligence and More ❯
analyse the global threat landscape to identify emerging risks, adversary tactics, and trends relevant to the organization's business and technology environment Collaborate with Red Team, Blue Team, and PenetrationTesting teams to integrate threat intelligence into testing scenarios using Breach & Attack Simulation (BAS) platforms and enhance defensive strategies Act as a liaison between threat intelligence and … intelligence and offensive security operations Ad hoc requests from your line manager Cyber Security Analyst Ideal Candidate: At least 5 years of experience in threat intelligence, cybersecurity operations, or penetrationtesting Ability to collaborate across technical teams, including Red/Blue teams and SOC Familiarity with threat intelligence platforms (TIPs), SIEMs, and threat data enrichment tools Experience using … Breach and Attack Simulation (BAS) platforms Strong understanding of adversary tactics, techniques, and procedures (TTPs), MITRE ATT&CK framework, and threat modelling Hands-on experience with penetrationtesting tools such as Metasploit Framework, Burp Suite, Kali Linux, and Pentera Experience producing threat reports and briefings Business level fluency in English Japanese, Cantonese, Mandarin language would be advantageous due More ❯
SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetrationtesting and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders to maintain compliance and manage third … analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. PenetrationTesting and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
Paddington, Sheldon Square, Greater London, United Kingdom Hybrid/Remote Options
Morson Edge
SP800 series, CSF). Conduct risk assessments and vulnerability management activities. Maintain robust security controls across enterprise assets, software, networks, and applications. Support incident response and recovery processes, including penetrationtesting and audit log management. Deliver training and awareness programs to enhance the organizations security posture. Collaborate with internal and external stakeholders to maintain compliance and manage third … analytical mindset with strong problem-solving skills. Technical Skills: Comprehensive knowledge of security controls, including: Data Protection, Account Management, and Access Control Management. Continuous Vulnerability Management and Incident Response. PenetrationTesting and Security Awareness Training. Secure Configuration and Network Monitoring. More ❯
Crewe, Cheshire, United Kingdom Hybrid/Remote Options
Matchtech
from our Crewe campus . In this role, you will report to the Functional Manager - Product Security Test & Incident Management and will be responsible for preparing and executing cybersecurity testing for automotive products in compliance with UNECE R . 155 and China GB 44495 regulations. This role plays a critical part in ensuring our vehicle systems are secure and … meet regulatory requirements across global markets. Responsibilities include: Manage and maintain test properties to ensure readiness for cybersecurity testing, including flashing, coding, debugging, analysis, and issue resolution on both test benches and vehicles. Develop cybersecurity test cases aligned with regulatory requirements (e.g., UNECE R155, GB 44495). Execute cybersecurity test cases and generate comprehensive test reports. Support cybersecurity homologation … and compliance testing activities for global regions. Coordinate and plan various levels of product security testing throughout the development lifecycle. About the Person The successful candidate will be a delivery-focused and results-driven cybersecurity test engineer , ideally with hands-on experience in product security testing within the automotive industry . They should possess strong technical skills More ❯
the current Enterprise Architect to understand and document: The council s ICT Strategy and technical architecture. Existing security architecture, including compliance with PSN, PCI-DSS, LGA Cyber Security, and penetrationtesting protocols. Key platforms and technologies in use, including Microsoft Azure, M365, Active Directory, Intune, endpoint management, and any bespoke systems. Governance structures, design principles, and procurement processes. More ❯
TS1 9FU, Middlesbrough, North Yorkshire, United Kingdom
Deekay Technical Recruitment
the current Enterprise Architect to understand and document: The council’s ICT Strategy and technical architecture. Existing security architecture, including compliance with PSN, PCI-DSS, LGA Cyber Security, and penetrationtesting protocols. Key platforms and technologies in use, including Microsoft Azure, M365, Active Directory, Intune, endpoint management, and any bespoke systems. Governance structures, design principles, and procurement processes. More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge click apply for full job details More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable Skills/Knowledge/Experience Familiarity with mobile development, DevSecOps tooling … testing and automation frameworks Have deep knowledge and experience using the mobile security tools Good understanding of authentication, authorisation, encryption, and cryptography patterns Experience in proactive researching of new technologies emerging in the security landscape More ❯