Permanent Vulnerability Assessment Jobs in Gloucestershire

23 of 23 Permanent Vulnerability Assessment Jobs in Gloucestershire

Penetration Tester

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Penetration Tester

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Product Security Engineer

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST More ❯
Employment Type: Permanent
Salary: GBP 60,000 Annual
Posted:

Product Security Engineer

Bristol, Kendleshire, Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST More ❯
Employment Type: Permanent
Salary: £60000/annum
Posted:

Information Security Analyst

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Information Security Analyst

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Operational Cyber Researcher

Gloucester, Gloucestershire, South West
BAE Systems
supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical … analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerability assessment techniques such as fuzzing and code injection Researchers undertaking experimental development … experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverse engineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research More ❯
Employment Type: Permanent
Posted:

Technical Support Engineer Tier I

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Technical Support Engineer Tier I

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

GCP Cloud Engineer

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Sentinel
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
Posted:

GCP Cloud Engineer

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Sentinel
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
Posted:

Penetration Tester

gloucester, south west england, united kingdom
Inspirec
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp … firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience More ❯
Posted:

Penetration Tester

cheltenham, south west england, united kingdom
Inspirec
across various platforms. The consultant will play a critical role in evaluating and strengthening our clients’ cybersecurity postures by conducting in-depth security assessments, vulnerability analysis, and developing comprehensive security strategies. RESPONSIBILITIES Conduct comprehensive penetration tests, vulnerability assessments, and security audits to identify risks and ensure compliance with … including risk levels, remediation steps, and strategic recommendations. EXPERIENCE: Minimum of 4+ years of experience in cybersecurity, specifically in penetration testing and Incident Response, vulnerability management, and risk assessment. Public Sector experience, ideally MOD, MOJ, Must be SC clearable. Proven hands-on experience with tools such as Metasploit, Burp … firewall configurations, and secure network design. Proficiency in scripting languages (e.g., Python, Bash, PowerShell) to automate tasks and streamline processes. Hands-on experience of vulnerability assessments, Incident response, penetration testing, threat hunting and compromise assessment. Experience collaborating with Sales teams as a pre-sale's cyber security consultant. Experience More ❯
Posted:

Security Architect

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Employment Type: Permanent
Salary: GBP 85,000 Annual
Posted:

Security Architect

Bristol, Kendleshire, Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Employment Type: Permanent
Salary: £85000/annum
Posted:

Software Tester / UK

gloucester, south west england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Software Tester / UK

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Account Executive - UK

gloucester, south west england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Account Executive - UK

cheltenham, south west england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Security Analyst

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

Security Analyst

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

Cyber Security Consultant

gloucestershire, south west england, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
supported to grow your expertise, travel for meaningful client engagements, and take real ownership of your work. Responsibilities: Lead or support the delivery of vulnerability assessments and penetration testing projects Provide technical security consultancy and basic to intermediate-level training to clients across the UK and internationally Occasionally deputise … and deliver tailored security solutions Contribute to business development through proposal writing and client engagement Skills/Must have: Strong understanding of penetration testing, vulnerability assessments, EDR, and endpoint protection Experience working in or with government or defence clients Previous consultancy experience with client-facing responsibilities SC clearance or More ❯
Posted:

Cyber Security Consultant

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Hamilton Barnes 🌳
supported to grow your expertise, travel for meaningful client engagements, and take real ownership of your work. Responsibilities: Lead or support the delivery of vulnerability assessments and penetration testing projects Provide technical security consultancy and basic to intermediate-level training to clients across the UK and internationally Occasionally deputise … and deliver tailored security solutions Contribute to business development through proposal writing and client engagement Skills/Must have: Strong understanding of penetration testing, vulnerability assessments, EDR, and endpoint protection Experience working in or with government or defence clients Previous consultancy experience with client-facing responsibilities SC clearance or More ❯
Posted: