of "Open financial services to everyone on the planet and share our Values of "Stay Curious," "Have Empathy," and "Be Accountable." Your Role: We are seeking an experienced Staff Security Engineer who can help expand our Security efforts and play a critical role in safeguarding Alpaca's systems, data, and client assets from evolving cyber threats to ensure … the security and integrity of our Firm. The role requires a deep understanding of Cybersecurity principles, incident response, cloud security, offensivesecurity, and proactive threat detection with a proven track record of managing security risks and cross functional collaboration. The Security Team is 100% distributed and remote. This role will be reporting directly to … the CISO. Things You Get To Do: Lead and triage security events including potential security incidents, insider threats, malware infections, unauthorized access, fraud, and data exfiltration events Conduct thorough analyses of events, assess impact, and implement corrective actions by collaborating with cross-functional teams to prioritize and remediate issues as necessary Develop and maintain security incident response More ❯
Job Number: R Penetration Tester Key Role: Find possible vulnerabilities while using penetration testing tools and techniques, to ensure security of computer systems, applications, servers, and networks. Apply advanced skills and extensive technical expertise, including full industry knowledge. Develop innovative solutions to complex problems. Work without considerable direction, and mentor and supervise team members. Basic Qualifications: 5+ years of … Windows, and virtual platforms 5+ years of experience with computer attack methods and system exploitation techniques 5+ years of experience leveraging adversarial tactics to c ond uct hands-on security testing 5+ years of experience performing network security analysis, including sof tware or traffic analysis TS/SCI clearance with a polygraph HS diploma or GED Additional Qualifications … Experience with manually auditing source code, including Java, Ruby, Python, JavaScript, Rus t, or C, to find security issues Bachelor's degree in CS, Information Systems, Engineering, or a related field Certified Ethical Hacker ( CEH ) , OffensiveSecurity Certified Professional ( OSCP ) , HTB Certified Penetration Tester Spe cia list ( CPTS ) , eLearnSecurity Junior Penetration Tester ( EJPT ) , GIAC Global Information Assurance More ❯
20+ years! Culture at Intermedia is built on teamwork and transparency. We hold each other accountable and always have each other's back! About the role: Intermedia's Information Security team is seeking a Senior Security Engineer with a strong passion for threat detection, incident response, and security engineering. The ideal candidate thrives in digging through data … to find anomalies, identifying root causes, uncovering malicious activity, recommending corrective actions, and working cross-functionally to drive remediation and strategic improvements. Key Responsibilities Security Monitoring & Incident Response Monitor and triage security alerts from SIEM, EDR, and other tools; escalate and respond as needed. Investigate security incidents, determine root cause, document findings, and develop IOCs to prevent … recurrence. Support escalations from internal employees or customers with security-related concerns. Security Engineering & Tooling Assist with security reviews related to infrastructure and system changes. Build, enhance, and maintain internal security tooling and scripting repositories. Contribute to the development of detection content, alert tuning, and automation pipelines. Strategic & Team Contributions Drive annual security team goals More ❯
and programming expertise. The ideal candidate will have hands-on experience with cyber network operations and deep technical knowledge of programming, with the ability to work in a high-security, fast-paced environment. REQUIREMENTS The Level 2 CNO Analyst/Programmer possesses strong programming skills in Assembly, C, C++, Java, Perl, or Python, and is adept at designing and … response by developing tools and scripts to detect, investigate, and respond to cybersecurity threats. 5. Prepare clear and concise documentation for technical processes and code to maintain compliance with security policies and enhance collaboration. 6. Work closely with cyber analysts, engineers, and other stakeholders to coordinate efforts and meet mission objectives. Engage with cross-functional teams to identify and … and verbal communication skills, with an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), OffensiveSecurity Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in vulnerability More ❯
and programming expertise. The ideal candidate will have hands-on experience with cyber network operations and deep technical knowledge of programming, with the ability to work in a high-security, fast-paced environment. REQUIREMENTS The Level 1 CNO Analyst/Programmer possesses strong programming skills in Assembly, C, C++, Java, Perl, or Python, and is adept at designing and … response by developing tools and scripts to detect, investigate, and respond to cybersecurity threats. 5. Prepare clear and concise documentation for technical processes and code to maintain compliance with security policies and enhance collaboration. 6. Work closely with cyber analysts, engineers, and other stakeholders to coordinate efforts and meet mission objectives. Engage with cross-functional teams to identify and … and verbal communication skills, with an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), OffensiveSecurity Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in vulnerability More ❯
and programming expertise. The ideal candidate will have hands-on experience with cyber network operations and deep technical knowledge of programming, with the ability to work in a high-security, fast-paced environment. REQUIREMENTS The Level 3 CNO Analyst/Programmer possesses strong programming skills in Assembly, C, C++, Java, Perl, or Python, and is adept at designing and … response by developing tools and scripts to detect, investigate, and respond to cybersecurity threats. 5. Prepare clear and concise documentation for technical processes and code to maintain compliance with security policies and enhance collaboration. 6. Work closely with cyber analysts, engineers, and other stakeholders to coordinate efforts and meet mission objectives. Engage with cross-functional teams to identify and … and verbal communication skills, with an ability to explain technical details to both technical and non-technical stakeholders. 5. Advanced certifications in cybersecurity, such as Certified Ethical Hacker (CEH), OffensiveSecurity Certified Professional (OSCP), or similar. 6. Experience working in a classified, high-security environment and adhering to strict data handling procedures. 7. Demonstrated experience in vulnerability More ❯
Penetration Tester – UK remote - £60,000 - £80,000 + Benefits + Bonus Our client is looking for an experienced Penetration Tester to join their established OffensiveSecurity function. This role involves conducting and delivering high-quality security assessments across web applications, infrastructure, mobile, cloud, and networks. Our client is looking for someone who has a wide understanding … of different types of security testing, and in-depth threat-intelligence knowledge. Main Responsibilities: Perform penetration tests on web applications, networks, APIs, cloud environments, and mobile platforms. Assist in red team exercises, social engineering assessments, and security awareness initiatives. Conduct vulnerability assessments, exploit security flaws, and document findings with actionable remediation steps. Simulate real-world attack scenarios … to evaluate security weaknesses. Utilize and develop custom scripts, tools, and exploits to test system defences. Work closely with security teams to remediate identified vulnerabilities. To be considered, you should have: 4+ years in a penetration testing position. Strong knowledge of OWASP Top 10, MITRE ATT&CK Framework, and common exploit techniques. Experience using tools such as Burp More ❯
Penetration Tester Position Description CGI Cyber Security Team in the UK is one of the largest Cyber consultancies in the UK with around 300 members. The UK Cyber team works across a variety of domains including: Government, Defence, Critical Infrastructure, Healthcare, Utilities, Banking and Financial Services and Many more. At CGI you will get the opportunity to work across … a number of domains and work in all areas of Cyber Security allowing you to grow and develop your career. We offer full 360-degree services to our clients from initial consulting on a range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical … Incident Response, Protective Monitoring Services, Penetration Testing and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured in the Security control, measures and systems we have put in place in line with their requirements. At CGI training and development is very important not only do we More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
Are you a passionate security researcher with experience assessing large, complex software products? We are looking for talented individuals who are excited about security research and developing creative solutions for some of Oracle’s most critical customers. Finding and combining bugs to create new attacks is essential in this role. Who We Are We are a world-class … team of application security researchers who love new challenges. We are an inclusive and diverse, with a full range of experience and a global reach. We have the resources of a large enterprise and the energy of a start-up, and we’re working on a critical software assurance initiative with our cloud and mobile engineering teams. Our mission … is to make application security and software assurance a reality, at scale. We’re a dedicated team that leverages each other’s strengths to produce cutting-edge solutions to difficult problems. Join us to grow your career and create the future of software assurance at scale. Work You’ll Do As a member of our team, you will be More ❯
Top Secret/SCI Clearance required SRG is seeking a Red Team Penetration Tester III, you will be responsible for leading and executing complex penetration testing events and conducting offensive cybersecurity operations for the U.S. Government and DoD systems. You will work collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no … telework. Develop, modify, and utilize offensivesecurity tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in … offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent More ❯
Top Secret/SCI Clerance required SRG is seeking a Red Team Penetration Tester IV, you will be responsible for leading and executing complex penetration testing events and conducting offensive cybersecurity operations for the U.S. Government and DoD systems. You will work collaboratively with Blue Team and Cybersecurity professionals to enhance the overall cyber posture. On-site only, no … telework. Develop, modify, and utilize offensivesecurity tools such as Metasploit, NMAP, Kali Linux, and Cobalt Strike Mimic threat actor behavior using TTPs aligned with frameworks like MITRE ATT&CK Conduct assessments across multiple operating systems including Linux, Windows, and macOS Perform exploit development and identify zero-day or previously unknown vulnerabilities Analyze, identify, and remediate gaps in … offensive tools and development techniques Perform development with at least two scripting or programming languages (Python, C++, Java, Rust, Assembly, C#, etc.) in support of exploit development Education: Bachelor's degree in Cybersecurity, Cyber Operations, Cyber Engineering, Information System, Information Technology, Computer, Electrical, or Electronics Engineering, Software Engineering, Computer Science, Mathematics with a concentration in Computer Science, or equivalent More ❯
A global quantitative trading firm specializing in algorithmic and high-frequency trading (HFT) is hiring a Cyber Security Engineer (2-4 years' experience) to operate in a broad, vendor-agnostic security environment. This fully onsite role (5 days per week) offers exposure to cutting-edge security challenges across multiple domains. This is an opportunity to deep-dive … into security engineering, incident response, and automation in a high-impact role. If you're a technically strong, hands-on engineer looking for broad exposure and real security challenges, we want to hear from you! Responsibilities Owning security projects end to end - from design to execution Engineering, automating, and securing infrastructure, networks, and cloud environments Hands-on … engagement in Incident Response, security assessments, and remediation Working across networking, firewalls, and security (Palo Alto, Fortinet, all major cloud providers) Building and automating with Terraform, Ansible, Golang, Python, HashiCorp Leveraging offensivesecurity knowledge (OSCP, Hack The Box, pentesting, SQL injection, homelabbing) Collaborating with multiple teams and communicating effectively across the business Skills & Requirements SecurityMore ❯
About Bridewell One of the most exciting prospects in the UK cyber security sector today, Bridewell is a leading cyber security services company specialising in protecting and transforming critical business functions for some of the world's most trusted organisations. We are the trusted partner for operators of essential services and provide end-to-end cyber security capabilities that help our clients overcome their security challenges, allowing them to operate safely and securely. Bridewell holds the Gold level, Investors in People award which we feel solidifies and reflects on the outstanding calibre that makes us truly one team. Who are we looking for? We are looking for an experienced Project Manager who can lead and … projects at any one time, with proven experience engaging and managing relationships with various stakeholders, including clients, vendors, and internal teams. Ideally, you'll have worked with a Cyber Security services provider or within a Cyber Security function, with knowledge of Cyber Security principles, standards, and technologies desirably resulting in at least a foundation level qualification (e.g. More ❯
Job Title: Security Testing Consultant (Penetration Testing) Location: London SE1 (with hybrid working available post-probation) Salary: 45,000 - 60,000 + benefits Are you a skilled Penetration Tester looking to join a collaborative and mission-driven cyber security team? This Security Testing Consultant position offers the chance to deliver high-impact security assessments across web … applications, infrastructure, cloud platforms, APIs, mobile, and wireless systems. You'll be part of a close-knit team delivering trusted security testing and advisory services for clients across various industries. If you're passionate about offensivesecurity and want to contribute to Red Team activities while supporting junior team members, this role is for you. What You … and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience with CI/CD security and container technologies like Docker. Knowledge of Red Team operations, CobaltStrike, bug bounty programs, or IoT/AI/LLM security. Hands-on coding or scripting knowledge and an More ❯
City of London, London, Grange, United Kingdom Hybrid / WFH Options
Applause IT Recruitment Ltd
Job Title: Security Testing Consultant (Penetration Testing) Location: London SE1 (with hybrid working available post-probation) Salary: £45,000 - £60,000 + benefits Are you a skilled Penetration Tester looking to join a collaborative and mission-driven cyber security team? This Security Testing Consultant position offers the chance to deliver high-impact security assessments across web … applications, infrastructure, cloud platforms, APIs, mobile, and wireless systems. You'll be part of a close-knit team delivering trusted security testing and advisory services for clients across various industries. If you're passionate about offensivesecurity and want to contribute to Red Team activities while supporting junior team members, this role is for you. What You … and Qualys. Knowledge of AWS, Azure, or Google Cloud platform security. At least 2 certifications from: CREST CRT, OSCP, OSCE, or CCT. Desirable Extras: Experience with CI/CD security and container technologies like Docker. Knowledge of Red Team operations, CobaltStrike, bug bounty programs, or IoT/AI/LLM security. Hands-on coding or scripting knowledge and an More ❯
At Vertical Structure (an Instil Company), we specialise in providing human-focused security and penetration testing services for web applications, cloud infrastructure and mobile applications. The Role We are looking for a CTL (Infrastructure) to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability … assessments across a range of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will be crucial in identifying security weaknesses and helping clients fortify their systems. We offer varied, challenging work in a supportive environment where you will find yourself constantly evolving and learning, whilst studying towards further specialised … providing tailored actionable recommendations. Manage end-to-end testing, collaborating with clients during kick-off and discovery sessions, providing expert advice and follow up. Stay current with the latest security threats, vulnerabilities, and trends. Research offensivesecurity techniques to assess and validate infrastructure and technologies, including cloud-based systems continuously incorporating new techniques into the team's More ❯
CYBER NETWORK OPERATOR: Expert Level Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is looking for proactive and self-motivated individuals to work as a Cyber Network Operator on a highly technical team conducting remote cyber operations. You should have a minimum of … years of related experience, have a solid background in the Penetration Test/Attack Lifecycle and be able to pivot and exploit while avoiding detection in high-security networks. You will be responsible for all phases of network exploitation and will be able to successfully attack and persist in customer networks which include a diverse set of network hosts … MySQL. • Familiarity with wireless (WiFi/WiMax/Bluetooth) technology (hardware or core software). • Familiarity with mobile phone operating systems (Android/iOS). • Experience working with network security tools such as Metasploit, Netcat, BurpSuite, NMAP, Nessus or similar. • Understanding/use of network IDS/IPS technologies such as firewalls, proxies, ipchains, iptables, Snort, and related technologies. More ❯
practices to manage reverse engineering projects effectively. Collaborate with cross-functional teams, prioritize tasks, and ensure timely delivery of project milestones. Vulnerability Identification: Drive the discovery and analysis of security vulnerabilities, weaknesses, and design flaws in software applications and systems through comprehensive reverse engineering techniques. Technical Leadership: Provide technical leadership and mentorship to junior reverse engineers, guiding them in … advanced analysis methodologies, problem-solving, and decision-making. Collaborative Problem-Solving: Collaborate closely with security analysts, developers, and stakeholders to address complex technical challenges, propose solutions, and drive implementation efforts. Documentation and Reporting: Document reverse engineering findings, analysis methodologies, and project progress. Prepare technical reports and presentations to communicate results, recommendations, and project status effectively. Continuous Improvement: Continuously improve … Engineer, Cybersecurity, or a relevant field, or a master's degree in computer science, Cybersecurity, or related disciplines is preferred. Relevant certifications such as Certified Reverse Engineering Analyst (CREA), OffensiveSecurity Certified Professional (OSCP), or similar certifications demonstrating expertise in reverse engineering and cybersecurity are highly desirable. More ❯
TECHNICAL OPERATOR: Full Performance Level Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for proactive and self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. You should have multiple years conducting targeting in support of … and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), OffensiveSecurity (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
a passion to make an impact. Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team The Security Department oversees security, compliance, GRC, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering … This would be a great challenge for those who want to work with the best technology in a dynamic and advanced environment. The Opportunity/Role Summary: Conduct application security reviews and perform penetration testing, ensuring alignment with compliance standards. Engage in projects, research, and security tool development to enhance security measures and meet compliance requirements. Scale … security processes using automation. Provide training, outreach, and develop documentation to guide security practices among internal teams. Offer technical guidance, advocate for automation, evaluate designs, and lead our security teams to empower engineering partners with cutting-edge tools, techniques, and methodologies to naturally build secure products. What you'll Need to Succeed/Role Requirements: Strong foundations More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Agoda
a passion to make an impact. Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team The Security Department oversees security, compliance, GRC, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering … This would be a great challenge for those who want to work with the best technology in a dynamic and advanced environment. The Opportunity/Role Summary: Conduct application security reviews and perform penetration testing, ensuring alignment with compliance standards. Engage in projects, research, and security tool development to enhance security measures and meet compliance requirements. Scale … security processes using automation. Provide training, outreach, and develop documentation to guide security practices among internal teams. Offer technical guidance, advocate for automation, evaluate designs, and lead our security teams to empower engineering partners with cutting-edge tools, techniques, and methodologies to naturally build secure products. What you'll Need to Succeed/Role Requirements: Strong foundations More ❯
a passion to make an impact. Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security Department oversees security, compliance, GRC, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering … advanced environment. The Opportunity: You will be working in a fast paced DevSecOps environment where code change happens at a rapid speed and where it is paramount to control security testing into a continuous deployment/integration flow. In this Role, you'll get to: Play a lead role in developing and designing application-level security controls and … standards. Perform application security design reviews against new products and services. Track and prioritize all security issues. Build internal security tools that help fix security problems at scale. Perform code review and drive remediation of discovered issues. Enable automated security testing at scale to measure vulnerability, and report on risk across all microservice, web and More ❯
Liverpool, Lancashire, United Kingdom Hybrid / WFH Options
Agoda
a passion to make an impact. Harnessing our innovative technologies and strong partnerships, we aim to make travel easy and rewarding for everyone. Get to Know our Team: The Security Department oversees security, compliance, GRC, and security operations for all Agoda. We are vigilant in ensuring there is no breach or vulnerability threatening our company or endangering … advanced environment. The Opportunity: You will be working in a fast paced DevSecOps environment where code change happens at a rapid speed and where it is paramount to control security testing into a continuous deployment/integration flow. In this Role, you'll get to: Play a lead role in developing and designing application-level security controls and … standards. Perform application security design reviews against new products and services. Track and prioritize all security issues. Build internal security tools that help fix security problems at scale. Perform code review and drive remediation of discovered issues. Enable automated security testing at scale to measure vulnerability, and report on risk across all microservice, web and More ❯
Location: Chantilly, VA US Security Clearance Requirement: TS/SCI with Full Scope Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for proactive and self-motivated individuals for our Linux Threat Hunter positions. In this unique position, you will be working closely with deployed Linux servers dealing with data flows and collection of network … and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetration testing or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), OffensiveSecurity (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
to bring 1B+ people onchain in the most secure way possible. We want to provide them secure platforms and tools to build and interact with exciting applications. The Protocol Security team ensures the security of all onchain development at Coinbase. We partner closely with product teams to make sure that our users can safely and confidently engage with … the onchain world. What you'll be doing (ie. job duties): Perform threat modeling and security assessments of blockchain products and services. Propose, plan, and execute Red Team operations based on realistic threats. Write detailed reports covering the goals and outcomes of Red Team operations, including significant observations and recommendations. Collaborate with partner teams to improve detection and response … capabilities. Provide expert technical guidance to the team in building new security frameworks and analysis tools. Stay informed on current security trends, advisories, publications, and academic research. What we look for in you (ie. job requirements): Bachelor's or Master's degree in Computer Science, Cyber security, Software Engineering, or a related field. 3+ years of blockchain More ❯