analytical, communication, and stakeholder engagement skills Experience supporting cybersecurity for intelligence or defense systems Familiarity with cloud security, Zero Trust architecture, and endpoint protection solutions Background in incident response, penetrationtesting, or threat intelligence Experience implementing RMF within classified environments Join a mission-driven team advancing government communication capabilities and operational readiness. Apply today and become part of More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
Tewkesbury, Gloucestershire, England, United Kingdom
Sanderson
Debian variants). Designing, planning, and rolling out software and upgrades. Troubleshooting issues and implementing fixes across the infrastructure. The role includes working with the security team and external penetrationtesting teams to ensure a very high security standard across the infrastructure. Benefits Competitive Salary Generous pension provision Performance and business development bonuses 25 days holiday per year More ❯
prioritization of remediation of findings. Ability to monitor network security systems, summarize results with dashboards or other tools and report to C-suite on a weekly basis. Familiarity with Penetrationtesting tools such as MITRE ATT&CK and developing remediation strategies, POAM, and implementation of the POAM. Interpersonal skills in supporting internal stakeholders, customers, and support contractors. Knowledge More ❯
subject matter expert (SME) for OT systems during audits, inspections, and vendor engagements. • Evaluate new technologies and develop risk-based strategies to enhance OT cybersecurity and system reliability. • Support penetrationtesting, vulnerability assessments, and patch management activities in live and test environments. • Participate in a 24/7 on-call rotation to support critical infrastructure operations. Qualifications: • Bachelor More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. - Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
Docker, Kubernetes, IaC). Threat Modeling, Reviews & Remediation Lead threat modeling workshops across product and platform teams. Identify and assess vulnerabilities using SAST, DAST, SCA, manual code reviews, and penetration testing. Promote reusable remediation patterns for code and infrastructure vulnerabilities. Leverage threat intelligence to prioritize mitigations based on business risk. Engineering & Automation Build and maintain automation tools for vulnerability More ❯
issues, such as firewall management, HIDS/HIPS configuration, log monitoring, and audit compliance (SOC II). You will ensure that our software application is both manually and automatically penetration tested for security vulnerabilities (both Red Team and Blue Team exercises), and be a decision maker in all things security management-able to "pull the plug" on a feature … application, or other business function if it represents a significant risk to the company. You will: Conduct penetration tests against web applications infrastructure Validate security on new hardware and software infrastructure Assist front-line company representatives with security questions Manage firewall rules and internal pentesting Manage SOC II controls and external pentesting Manage priorities through backlog management system (Jira … Come to work, do great things, then go home! What You Need to Get the Job Done 3+ years experience performing penetrationtesting (against web applications) Experience securing cloud-based infrastructures and solutions Previous experience working on an information security team Advanced knowledge of common security vulnerabilities (OWASP) and best practices Familiarity with SOC II controls and how More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
directly with SIEM/SOC and how to get the best from this service Ability to develop and evolve SOC and SIEM operation with third party Experience with network penetrationtesting and techniques Develop and promote best practice for information security, and conduct threat research Experience writing detail incident reports and documenting detections so that future breaches can More ❯
directly with SIEM/SOC and how to get the best from this service Ability to develop and evolve SOC and SIEM operation with third party Experience with network penetrationtesting and techniques Develop and promote best practice for information security, and conduct threat research Experience writing detail incident reports and documenting detections so that future breaches can More ❯
San Jose, California, United States Hybrid / WFH Options
Zscaler
stakeholders including engineering, security, business teams, external assessors, federal agencies, and leadership Working knowledge and experience with the various cloud computing services (e.g., IaaS, PaaS, SaaS) Coordinating 3PAO assessments, penetrationtesting, audits, and implementing continuous monitoring programs to ensure ongoing compliance and address security findings What We're Looking for (Minimum Qualifications) 8+ years of experience in federal More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯