Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Stackstudio Digital Ltd
non-technical audiences, including executive stakeholders. Perform technical quality reviews and engage in direct technical conversations with clients. Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux for effective vulnerabilityassessment and penetration testing. Apply knowledge of OWASP Top 10 and SANS Top 25 vulnerabilities and communicate methodologies with development teams. Skills, Experience, and Abilities Required: Essential: Proficient More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Infoplus Technologies UK Ltd
and SANS Top 25 vulnerabilities and ability to effectively communicate methodologies and techniques with development teams Utilize tools such as BurpSuite, Nessus, Nmap, Kali Linux, and Nessus for effective vulnerabilityassessment and penetration testing. Your Profile Essential skills/knowledge/experience: (Up to 10, Avoid repetition) Proficient Pen Testing Tools - Cobalt Strike, Caldera, Atomic Red team, Pentera More ❯
Knutsford, Cheshire, England, United Kingdom Hybrid / WFH Options
Tenth Revolution Group
environments Manage secure configurations, access controls, and CI/CD workflows in GitLab Integrate and protect telemetry tools such as Cribl, Elastic, Splunk, Fluentd, and Syslog Perform threat modelling, vulnerability assessments, and risk analysis for the pipeline Partner with DevOps to embed security into infrastructure-as-code and deployment processes Monitor and respond to security events, maintaining clear documentation More ❯
Knutsford, Cheshire, United Kingdom Hybrid / WFH Options
Octopus Computer Associates
secure configuration and access management within GitLab version control and CI/CD pipelines Integrate and secure telemetry tools including Cribl, Elastic, Splunk, Fluentd, and Syslog Conduct threat modelling, vulnerability assessments, and risk analysis for the telemetry pipeline Collaborate with DevOps engineers to embed security into infrastructure-as-code and deployment workflows Monitor and respond to security events and … of networking protocols, Firewalls, VPNs, and security principles Experience with security frameworks (eg, NIST, ISO 27001) and compliance requirements Knowledge of container security tools (eg, Aqua, Twistlock, Trivy) and vulnerability scanners Excellent analytical and communication skills Preferred Qualifications: Certifications such as CISSP, CISM, CKS (Certified Kubernetes Security Specialist), or equivalent Experience in building MVPs or working in startup-like More ❯