Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
play a critical role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetration testing to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security More ❯
Life on the team Computacenter is growing our penetration testing capability and we are looking for an experienced penetration tester to support the delivery of vulnerabilityassessment and penetration testing services to Computacenter and our customers delivered services. As a highly skilled and motivated Penetration Tester, you will join our dynamic Cybersecurity team. In this role, you will … Conduct comprehensive penetration tests: Execute internal and external network penetration tests, web application penetration tests, mobile application penetration tests, API penetration tests, cloud security assessments, and social engineering simulations. Vulnerability identification and analysis: Research, identify, and exploit security vulnerabilities in a variety of systems and applications. Red/Purple/Blue Teaming: participate in exercises with the goal of More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate … Threat Detection & SOAR Automation: Oversee Security Orchestration, Automation, and Response (SOAR) solutions including SOC Prime. Network & Application Security: Manage Web Application Firewalls (WAF) and Intrusion Prevention Systems (IPS). Vulnerability & Penetration Testing: Review Penetration Testing, vulnerability assessments, and security scanning to proactively identify and remediate risks. PCI DSS Compliance: Conduct security audits, risk assessments, and ensure regulatory compliance. … Required Strong expertise in Azure cloud security, Microsoft Defender, and Microsoft Sentinel. Proven experience in SOAR technologies for security automation and response orchestration. Hands-on experience with penetration testing, vulnerability assessments, and security scanning. Experience implementing and managing WAF, IPS, and DNS security solutions. Extensive experience with Terraform for IaC security automation. Knowledge of DevOps pipelines (CI/CD More ❯
Support bioinformaticians in building pipelines that are secure by design, version-controlled, and deployed through automated workflows. Collaborate with engineering teams to embed security throughout the development lifecycle. Automate vulnerability assessments to proactively identify and mitigate risks. Work closely with the security team to integrate best practices into new and existing features. Ensure compliance with security standards and regulations More ❯
South Croydon, Surrey, England, United Kingdom Hybrid / WFH Options
Gold Group Ltd
following : * In-depth knowledge of cybersecurity frameworks, tools, and technologies* Strong understanding of networking protocols, cloud security, and secure software development principles* Experience with incident response, risk management, and vulnerabilityassessment* Familiarity with regulatory compliance and standards (e.g. GDPR, ISO 27001)* Experience in an organisation running or being part of an ISO27001 adoption project* Incident management & change Management More ❯
Solutions and Work Packages remain on-track. Responsibilities will also include but are not limited to: Assisting, preparing and undertaking Cyber Essentials Audits based on the IASME Standard Undertaking Vulnerability Assessments and remediation Undertaking penetration testing to include infrastructure, web applications and networks Assisting with client reporting and assurance audits Undertaking Cyber Essentials PLUS audits and assessments Providing an More ❯
a focus on automated security testing, deployment, and monitoring. Collaborate with the engineering teams to ensure security is integrated from feature development to deployment. Conduct regular security audits and vulnerability assessments to identify and mitigate risks across systems and environments. Work closely with internal and external R&D teams to integrate security best practices into new and existing features. More ❯
to security incidents, including unauthorized access, phishingattempts, and data anomalies. • Collaborate with cybersecurity teams and other third parties to analyse threat intelligence feeds and proactively identifyemerging risks. • Participate in vulnerability assessments and support external/internal penetration testing efforts. • Conduct regular audits of user permissions, authentication logs, and endpoint security compliance. • Develop and deliver security awareness training programs for … operations. Cybersecurity Management: • Supervise technological security measures including SIEM, DLP, IDS/IPS, Firewall, WAF, cryptological mechanisms, EDR • Analyse security alerts and conduct technical incident investigations. • Run and monitor vulnerability tests and periodic scans of key assets • Collaborate on managing security patches and updates with Internal IT, CloudOps and Engineering teams • Document technical findings and generate reports for IT … AI. Experience in crisis management and incident response. Up-to-date knowledge of emerging security trends and technologies. Ability to develop and integrate contingency plans. Experience in Cybersecurity risk assessment and management. Knowledge of security audits and supervision in accordance with European and International regulations. Proven experience of protecting SaaS environments. Proven skills in analysis and teamwork. Ability to More ❯
Portsmouth, England, United Kingdom Hybrid / WFH Options
InfoSec People Ltd
remediation guidance. The position requires strong technical leadership, mentoring junior testers, and staying ahead of emerging cyber threats through research and innovation. Key Responsibilities: Perform advanced penetration tests and vulnerability assessments. Engage with clients to define testing objectives and provide expert consultancy. Lead junior testers, review reports, and ensure technical accuracy. Deliver clear, comprehensive documentation and present findings to More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
83zero Ltd
and incidents in line with ITIL processes Monitor and enhance network security controls including web security gateways, NAC, endpoint security, and perimeter defense Contribute to internal reviews, security audits, vulnerability assessments, and penetration testing Support firewall rule changes, VPN access, network segmentation, and performance improvements Participate in on-call rotation for high-priority issues and assist during major incidents … secure environments with a focus on proactive security posture Knowledge of network security tools such as Cisco Secure Access, Cisco ISE, Microsoft Defender XDR, Sentinel, and SentinelOne Comfortable with vulnerability management frameworks and tools Familiarity with network monitoring and performance management Previous experience working within an ITIL-based support framework Hands-on experience with Check Point, Cisco, or Palo More ❯
guidance in relation to cyber risk appetite and define and manage policy exceptions and significant risks through appropriate risk management, exception and governance processes. Develop SSE's cyber risk assessment maturity to enable commercially informed decision-making, ensuring that risk management and the implementation of controls are guided by a clear understanding of return on investment and business value. … You have Excellent cyber security experience with exposure to IT and OT environments and in-depth knowledge of cyber risk assessment methods and technologies, and proficiency in performing risk, business impact, control and vulnerability assessments and assurance. Excellent knowledge of risks and threats to UK energy sector and security issues, techniques and implications across digital platforms, control systems More ❯
guidance in relation to cyber risk appetite and define and manage policy exceptions and significant risks through appropriate risk management, exception and governance processes. Develop SSE's cyber risk assessment maturity to enable commercially informed decision-making, ensuring that risk management and the implementation of controls are guided by a clear understanding of return on investment and business value. … You have Excellent cyber security experience with exposure to IT and OT environments and in-depth knowledge of cyber risk assessment methods and technologies, and proficiency in performing risk, business impact, control and vulnerability assessments and assurance. Excellent knowledge of risks and threats to UK energy sector and security issues, techniques and implications across digital platforms, control systems More ❯