of safeguarding Industrial Control Systems and SCADA networks from evolving cyber threats.Key Responsibilities: Monitor and assess OT cybersecurity systems, ensuring effective threat detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetration testing exercises. Contribute to policy development More ❯
Sheffield, South Yorkshire, Yorkshire, United Kingdom
Upbeat Ideas UK Ltd
consistency across environments. Collaborate with cross-functional teams to understand application requirements and translate them into network solutions. Ensure network security by implementing industry-best practices and conducting regular vulnerability assessments. Troubleshoot and resolve network-related issues in a timely and efficient manner. Stay abreast of the latest networking technologies and trends and recommend upgrades and improvements to keep More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
GoDefend is a growing UK-based cyber security company based in Newcastle upon Tyne, offering a wide-spectrum of cyber solutions whilst specialising in continuous vulnerability scanning and penetration testing. We are seeking a Penetration Tester with over three years of hands-on experience in offensive security. Youll join a growing, fast-paced cyber security team where your technical … with clients and translating complex risks into clear business language. What Youll Be Doing: Conduct penetration testing across web applications, mobile apps, cloud platforms, and internal networks. Perform detailed vulnerability assessments and provide actionable remediation guidance. Create professional, jargon-free reports suitable for both technical and non-technical audiences. Lead or support scoping calls with clients to define the More ❯
Leeds, West Yorkshire, England, United Kingdom Hybrid / WFH Options
Eames Consulting
team, purple team, or adversary emulation experience. Programming/scripting skills (Python, PowerShell, Bash). Cloud pentesting experience (AWS, Azure, GCP). Familiarity with threat modeling or risk-based vulnerability assessments. Advanced certifications such as OSCE, OSEP, OSWE, CRTP, CREST CRT/CCT . Join us if you want to make a real impact, tackle diverse challenges, and grow More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
an experienced Penetration Tester specialising in Infrastructure Testing on behalf of a leading UK-based security consultancy. This company is renowned for its innovative approach to security, providing ongoing vulnerability assurance and continuous threat management through its advanced portal solution, beyond traditional point-in-time assessments. The Role: As an Infrastructure Penetration Tester , you will be responsible for conducting … Responsibilities: Conduct Comprehensive Testing: Perform formal, in-depth penetration tests focused on infrastructure and occasionally other areas. Reporting: Deliver detailed, well-structured technical and non-technical reports in English. Vulnerability Assessments: Identify vulnerabilities and provide actionable remediation recommendations. Pre-Engagement Support: Assist in scoping client projects and drafting proposals to ensure clear and accurate planning. Project Management: Manage penetration More ❯
an experienced Penetration Tester specialising in Infrastructure Testing on behalf of a leading UK-based security consultancy. This company is renowned for its innovative approach to security, providing ongoing vulnerability assurance and continuous threat management through its advanced portal solution, beyond traditional point-in-time assessments. The Role: As an Infrastructure Penetration Tester , you will be responsible for conducting … Responsibilities: Conduct Comprehensive Testing: Perform formal, in-depth penetration tests focused on infrastructure and occasionally other areas. Reporting: Deliver detailed, well-structured technical and non-technical reports in English. Vulnerability Assessments: Identify vulnerabilities and provide actionable remediation recommendations. Pre-Engagement Support: Assist in scoping client projects and drafting proposals to ensure clear and accurate planning. Project Management: Manage penetration More ❯
Castleford, England, United Kingdom Hybrid / WFH Options
Northern Powergrid
managing risk to the network, drawing on asset data and climate related research and projections and deriving models to facilitate the development of asset, network and system risk assessments, vulnerability assessments and adaptation analyses Utilise fault data and forecasts to establish vulnerability thresholds and trigger levels for our adaptative pathways to assist in our climate change adaptation planning More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
as Active Directory, DNS, DHCP, and email systems Support employee workstations, software provisioning, and user permissions Document infrastructure configurations, processes, and changes Assist in 3rd party IT audits and vulnerability assessments Provide out-of-hour support as needed and last line technical support for the customer support team Skills and experience 3-5 years of experience in IT infrastructure More ❯
SK15, Stalybridge, Borough of Tameside, Greater Manchester, United Kingdom
Hyde Group Holdings
Assist in monitoring and analysing security alerts to detect and respond to potential threats. Support the implementation and maintenance of security measures to protect company data and systems. Conduct vulnerability assessments to identify security weaknesses. Help in the development and enforcement of security policies and procedures. Participate in incident response activities and investigations. Collaborate with IT and other departments More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
scripts Programmatically create and modify property list (.plist) files and work with JSON syntax to augment Jamf Pro data management workflows. Ensure devices adhere to high security standards, conduct vulnerability assessments, and proactively address potential security risks. Software Deployment & Patch Management: Packaging, deployment, and updating of macOS, iOS, and third-party applications. Manage and maintain enterprise macOS images, service More ❯
of vulnerabilities within the context of BAE Systems, and passing onto resolver groups for resolution Ensuring resolution is being conducted in line with documented process Conduct simulated attacks and vulnerability assessments to support Red and Purple Team operations, identifying security weaknesses and enhancing defensive capabilities Contributes to the development of Active Defence, Red Team capabilities through people, process, and … processes are as inclusive as possible. If you have a disability or health condition (for example dyslexia, autism, an anxiety disorder etc.) that may affect your performance in certain assessment types, please speak to your recruiter about potential reasonable adjustments. Please be aware that many roles at BAE Systems are subject to both security and export control restrictions. These More ❯