Permanent Vulnerability Assessment Jobs in Berkshire

1 to 25 of 26 Permanent Vulnerability Assessment Jobs in Berkshire

DevOps Engineer

slough, south east england, United Kingdom
Excis Compliance
skills to oversee deliverables and meet deadlines. 5,Technical Skills (Must-Have): DevOps: CI/CD pipelines, containerization, infrastructure as code (IaC). Cybersecurity: Vulnerability assessment, threat mitigation, security tooling (e.g., SAST/DAST). Requirements: DevOps: CI/CD pipelines, containerization, infrastructure as code (IaC). Cybersecurity … Vulnerability assessment, threat mitigation, security tooling (e.g., SAST/DAST). Power Systems: Application development (preferred). More ❯
Posted:

Cyber Threat Intelligence Analyst

Reading, Oxfordshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Employment Type: Permanent
Salary: GBP 60,000 - 65,000 Annual
Posted:

Cyber Threat Intelligence Analyst

Reading, Berkshire, United Kingdom
Hybrid / WFH Options
GCS
support the development of a robust threat-informed defence strategy. You'll also work collaboratively across teams to enhance our threat intelligence capabilities, inform vulnerability management, and strengthen incident response readiness. Your role will involve maintaining threat actor profiles, managing intelligence feeds, supporting compliance, and shaping threat intelligence processes … while contributing to the organisation's long-term security maturity. What you'll be doing as a Senior Cyber Threat Intelligence Analyst: Cyber Threat Assessment: Support and lead cyber threat assessments and provide recommendations to technical, managerial, and executive stakeholders. Incident Response Support: Act as part of the incident … hunting, detection engineering and signature development. Intelligence Feeds & Dashboards: Evaluate technical intelligence feeds, ensure quality of data, and build reporting dashboards for key stakeholders. Vulnerability Management Collaboration: Work closely with the vulnerability management team to align intelligence with known exposures. Threat Actor Profiling: Maintain in-depth profiles of More ❯
Employment Type: Permanent
Salary: £60000 - £65000/annum Company benefits
Posted:

Penetration Tester

reading, south east england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Penetration Tester

slough, south east england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Head of Cyber Security

slough, south east england, United Kingdom
Burman Recruitment
Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat More ❯
Posted:

Information Security Analyst

reading, south east england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Information Security Analyst

slough, south east england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Network Security Engineer

slough, south east england, United Kingdom
InterEx Group
to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to More ❯
Posted:

Technical Support Engineer Tier I

reading, south east england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Technical Support Engineer Tier I

slough, south east england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Senior Product Security Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Client Server
infrastructures across Python, C++, and Kotlin/Java environments, ensuring robust protection that supports high-speed, data-driven operations. You will conduct threat modelling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle and provide mentorship, guidance and More ❯
Posted:

GCP Cloud Engineer

slough, south east england, United Kingdom
Hybrid / WFH Options
Sentinel
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
Posted:

GCP Cloud Engineer

reading, south east england, United Kingdom
Hybrid / WFH Options
Sentinel
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
Posted:

Senior Information Systems Security Specialist

Reading, Berkshire, South East, United Kingdom
Henderson Scott
and staying up to date with HMG, MoD, and industry best practices. Supporting solution architects in applying secure design principles and ensuring compliance. Overseeing vulnerability assessments and coordinating formal system accreditations. Acting as a key interface with government technical authorities. What We're Looking For: Essential: CISSP or equivalent. More ❯
Employment Type: Permanent
Salary: £75,000
Posted:

Software Tester / UK

slough, south east england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Software Tester / UK

reading, south east england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Account Executive - UK

reading, south east england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Account Executive - UK

slough, south east england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Security Engineer

slough, south east england, United Kingdom
Eames Consulting
risk , with strong familiarity with DORA compliance and payments/settlement systems . What You’ll Do: Lead and execute advanced penetration testing and vulnerability assessments Own IAM strategy and operations , ensuring airtight access controls Drive compliance with DORA (Digital Operational Resilience Act) standards Evaluate and mitigate third-party More ❯
Posted:

Senior Cyber Security Architect

Aldermaston, Berkshire, UK
Searchability NS&D
low-level solution designs for compliance and risk mitigation Facilitate system accreditations and interface with NCSC and other national authorities Conduct technical risk assessments, vulnerability assessments, and IT Health Checks Lead Security Working Groups and represent security interests in cross-functional settings Provide leadership in embedding security architecture best More ❯
Posted:

Senior Cyber Security Architect

reading, south east england, United Kingdom
Searchability NS&D
low-level solution designs for compliance and risk mitigation Facilitate system accreditations and interface with NCSC and other national authorities Conduct technical risk assessments, vulnerability assessments, and IT Health Checks Lead Security Working Groups and represent security interests in cross-functional settings Provide leadership in embedding security architecture best More ❯
Posted:

Penetration Tester

slough, south east england, United Kingdom
iFindTech Ltd
strengthen detection and response capabilities. The Role: Engage in purple team exercises alongside the SOC to simulate attack scenarios and improve detection Run internal vulnerability assessments and pen tests to support compliance and readiness for audits Deliver external penetration testing services — from scoping and testing to risk analysis and More ❯
Posted:

Penetration Tester / Outside IR35 / 500-550 pd / Remote

slough, south east england, united kingdom
Hybrid / WFH Options
SR2 | Socially Responsible Recruitment | Certified B Corporation™
ethical hacking processes, analysing and identifying vulnerabilities, and reporting on opportunities to increase defence strength, and actionable recommendations. Key Responsibilities Threat modelling and simulation Vulnerability assessments Ethical hacking of networks, operating systems, and web application Utilise tools for SIEM, Data Loss Prevention, and endpoint detection Collaborate with third-party More ❯
Posted:

Security Analyst

reading, south east england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:
Vulnerability Assessment
Berkshire
10th Percentile
£64,250
25th Percentile
£68,750
Median
£73,750
75th Percentile
£75,938
90th Percentile
£77,625