cambridge, east anglia, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
with third-party network vendors to coordinate security activities. Assist with internal and external audits, penetration testing, and incident reviews. Enforce security policies, conduct vulnerability assessments, and coordinate mitigation efforts. Attend the head office in Portsmouth at least once a quarter. Requirements A degree or equivalent career experience in … to analyse and utilize threat intelligence to enhance security measures. Experience with security tools such as firewalls, WAFs, intrusion detection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with More ❯
with third-party network vendors to coordinate security activities. Assist with internal and external audits, penetration testing, and incident reviews. Enforce security policies, conduct vulnerability assessments, and coordinate mitigation efforts. Attend the head office in Portsmouth at least once a quarter. Requirements A degree or equivalent career experience in … to analyse and utilize threat intelligence to enhance security measures. Experience with security tools such as firewalls, WAFs, intrusion detection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing VulnerabilityAssessment and Penetration Testing (VAPT) Test Management Selenium More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing VulnerabilityAssessment and Penetration Testing (VAPT) Test Management Selenium More ❯
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerabilityassessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerabilityassessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Ely, Cambridgeshire, East Anglia, United Kingdom Hybrid / WFH Options
IT Governance Limited, a GRC Solutions Company
Conduct Cyber Essentials assessments to ensure compliance with IASME scheme guidelines. Assist clients in aligning with Cyber Essentials requirements and implementing effective solutions. Support vulnerability assessments and PCI DSS scanning services. Identify process improvements and contribute to automation opportunities with our Head of Cyber Essentials. We're seeking a More ❯
programming with at least one modern language such as Java, C++, or C#, including object-oriented design; Experience in penetration testing and exploitability-focused vulnerabilityassessment; Experience with platform-level security mitigations and hardening for Linux and Windows; Experience in professional, non-internship software development; Experience building test More ❯
programming with at least one modern language such as Java, C++, or C# including object-oriented design - Experience in penetration testing and exploitability-focused vulnerabilityassessment - Experience in platform-level security mitigations and hardening for Linux and Windows - Experience in professional, non-internship software development - Experience building test More ❯
into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and Penetration Testing •Potential to work overseas to provide training services or working with clients to develop their own security posture More ❯
into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and Penetration Testing •Potential to work overseas to provide training services or working with clients to develop their own security posture More ❯
cambridge, east anglia, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
peterborough, east anglia, United Kingdom Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
equipment, including PLCs, HMIs, and VFDs Experience analyzing and improving ICS programs to meet industry standards Knowledge of cybersecurity functions such as risk management, vulnerability assessments, and security strategy Understanding of security systems including firewalls, intrusion detection, antivirus software, authentication, log management, and content filtering Ability to work with … and blogs Bachelor's degree Additional Qualifications: Experience with IEC 62443, NIST SP 800-82, NERC CIP, or other industrial control regulations Experience analyzing vulnerability and security risk assessment tools, including OT Passive Monitoring Tools Knowledge of cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks Knowledge More ❯
PLCs, HMIs, and VFDs Experience analyzing and improving ICS programs to meet industry standards and best practices Knowledge of cybersecurity functions, including risk management, vulnerability assessments, and security strategies Understanding of security systems such as firewalls, intrusion detection, anti-virus software, authentication systems, log management, and content filtering Ability … white papers, and blogs Bachelor's degree Additional Qualifications: Experience with IEC 62443, NIST SP 800-82, NERC CIP, or similar regulations Experience analyzing vulnerability and security risk assessment tools, including OT Passive Monitoring Tools Knowledge of cybersecurity tools, network topologies, intrusion detection, PKI, and secured networks Knowledge More ❯