Permanent Vulnerability Assessment Jobs in Hampshire

1 to 25 of 28 Permanent Vulnerability Assessment Jobs in Hampshire

Penetration Tester

southampton, south east england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Penetration Tester

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Penetration Tester

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Information Security Analyst

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Information Security Analyst

southampton, south east england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Information Security Analyst

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Cloud Security Engineer

southampton, south east england, United Kingdom
TalentHawk
with third-party network vendors to coordinate security activities. Assist with internal and external audits, penetration testing, and incident reviews. Enforce security policies, conduct vulnerability assessments, and coordinate mitigation efforts. Attend the head office in Portsmouth at least once a quarter. Requirements A degree or equivalent career experience in … to analyse and utilize threat intelligence to enhance security measures. Experience with security tools such as firewalls, WAFs, intrusion detection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with More ❯
Posted:

Cloud Security Engineer

basingstoke, south east england, United Kingdom
TalentHawk
with third-party network vendors to coordinate security activities. Assist with internal and external audits, penetration testing, and incident reviews. Enforce security policies, conduct vulnerability assessments, and coordinate mitigation efforts. Attend the head office in Portsmouth at least once a quarter. Requirements A degree or equivalent career experience in … to analyse and utilize threat intelligence to enhance security measures. Experience with security tools such as firewalls, WAFs, intrusion detection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with More ❯
Posted:

Cloud Security Engineer

portsmouth, hampshire, south east england, United Kingdom
TalentHawk
with third-party network vendors to coordinate security activities. Assist with internal and external audits, penetration testing, and incident reviews. Enforce security policies, conduct vulnerability assessments, and coordinate mitigation efforts. Attend the head office in Portsmouth at least once a quarter. Requirements A degree or equivalent career experience in … to analyse and utilize threat intelligence to enhance security measures. Experience with security tools such as firewalls, WAFs, intrusion detection/prevention systems, and vulnerability scanners. Conducting security audits and vulnerability assessments. Implementation and management of IAM policies. Risk assessment and mitigation in cloud environments. Experience with More ❯
Posted:

Technical Support Engineer Tier I

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Technical Support Engineer Tier I

southampton, south east england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Technical Support Engineer Tier I

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Software Tester / UK

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Software Tester / UK

southampton, south east england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Software Tester / UK

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Account Executive - UK

southampton, south east england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Account Executive - UK

basingstoke, south east england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Account Executive - UK

portsmouth, hampshire, south east england, United Kingdom
Action1
functional limits. By pioneering autonomous OS and third-party patching - AEM’s foundational use case - through peer-to-peer patch distribution and real-time vulnerability assessment without needing a VPN, it eliminates costly, time-consuming routine labor, preempts ransomware and security risks, and protects the digital employee experience. More ❯
Posted:

Offensive Security Specialist

southampton, south east england, United Kingdom
Computer Network Defence Ltd (CND)
into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and Penetration Testing •Potential to work overseas to provide training services or working with clients to develop their own security posture More ❯
Posted:

Offensive Security Specialist

basingstoke, south east england, United Kingdom
Computer Network Defence Ltd (CND)
into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and Penetration Testing •Potential to work overseas to provide training services or working with clients to develop their own security posture More ❯
Posted:

Offensive Security Specialist

portsmouth, hampshire, south east england, United Kingdom
Computer Network Defence Ltd (CND)
into a market leading function •Customer engagement, through the scoping process, tool selection and overall delivery •Run and take ownership of services such as Vulnerability Assessments, Code Review and Penetration Testing •Potential to work overseas to provide training services or working with clients to develop their own security posture More ❯
Posted:

Security Analyst

basingstoke, south east england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

Security Analyst

southampton, south east england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

Security Analyst

portsmouth, hampshire, south east england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

Cyber Security Engineer, COR7186A

Basingstoke, Hampshire, South East, United Kingdom
Hybrid / WFH Options
Corriculo Ltd
monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the … other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't More ❯
Employment Type: Permanent, Work From Home
Salary: £55,000
Posted:
Vulnerability Assessment
Hampshire
25th Percentile
£30,000
Median
£45,000
75th Percentile
£45,000
90th Percentile
£52,500