Elevate your career with a prestigious boutique pentesting consultancy. They are seeking a seasoned Penetration Tester to fortify thedefences of a diverse client portfolio, ensuring the highest standards of security across web applications, infrastructure, cloud services, APIs, wireless, and mobile applications. You will engage in leading end-to-end … your expertise in red teaming and social engineering to identify and mitigate potential threats. Your daily activities will involve the adept use of leading penetrationtesting tools such as Kali Linux, Burp Suite, and Qualys, allowing you to craft and execute robust security strategies. The ideal candidate will more »
and how to get the best from this service Ability to develop and evolve SOC and SIEM operation with third party Experience with network penetrationtesting and techniques Develop and promote best practice for information security, and conduct threat research Experience writing detail incident reports and documenting detections more »
security across the UK. The role would see you developing and elevating the security best practice covering incident response and investigation, threat hunting/penetrationtesting, as well as identifying emerging technologies and business threats, plus much, much more. The technology stack is primarily based around Microsoft so more »
them clearly to all levels of hierarchy, including senior leadership. Experience: Minimum of 5 years of experience in endpoint security, malware analysis, threat hunting, penetrationtesting, incident response, reverse engineering, or digital forensics. Familiarity with AWS cloud infrastructure, with hands-on experience monitoring associated logs, including GuardDuty, CloudTrail more »
City of London, London, United Kingdom Hybrid / WFH Options
Akkodis
solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in PenetrationTesting and/or Security Monitoring Understanding of networking and infrastructure design Active or ability to obtain SC clearance Knowledge/experience of more »
CloudFormation, and Terraform to automate infrastructure provisioning and configuration 4. Compliance and Auditing: Ensure compliance with industry standards Conduct security assessments, vulnerability scans, and penetrationtesting and fix findings Collaborate with auditors during compliance audits 5. Identity and Access Management (IAM): Manage IAM roles, policies, and permissions Implement more »
Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
structures. Self-starter and capable of independent working Team player and adept at working in multi-disciplinary and diverse teams Desirable Software engineering experience Penetrationtesting skills Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in more »
Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security standards and regulations Maintain and more »
Develop and Test Group Disaster Recovery Plans Maintain Information Security policies, making sure data centres and users adhere. Manage cyber security tools and regular penetration testing. Assist in the delivery of CyberEssentials+ (or similar as deemed appropriate) for group companies Verify application, data, and network security to assure confidentiality … systems, backup systems, ensuring continued system functions and maintaining data integrity and retrieval. Analyse network security events by participating in and supporting audit processes, penetrationtesting, and reviewing log reports from network systems and other systems for actionable items and remediation. Monitor and reports on the performance of more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
and using purple team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetrationtesting, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage more »
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
is required Proven business acumen and commercial awareness Experience with the '3 Lines of Defense' Governance Model Working knowledge of IT security best practices, penetrationtesting, vulnerability management, Incident, Problem & Change Management, and Business Continuity Robust experience in project management, analytical skills, and continuous improvement methodologies Strategic thinking more »
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
Delaney & Bourton
they are up to date and effectively protecting the organisations assets. Conduct regular system and network security assessments to identify vulnerabilities and mitigate them. Penetrationtesting analysis and remediation activities. Monitor security access and access control to prevent unauthorised access, data breaches, and cyber-attacks. Create technical documentation more »
Bath, England, United Kingdom Hybrid / WFH Options
Peaple Talent
ownership of incidents and problems, identifyingct with a security-first mindset, following best practices to maintain infrastructure integrity. Assist in disaster recovery planning and testing, including PEN testing. Keep relevant personnel informed of project progress and deviations from expected timelines. Ensure system documentation is accurate and up-to-date. more »
development life cycle (SDLC) processes and methodologies.Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH.Experience in developing and testing software using Python, C++, and Java.Excellent problem-solving skills and the ability to work well under pressure.Ability to communicate technical ideas and issues to … both technical and non-technical audiences.ResponsibilitiesCreating and implementing security protocols to ensure the security of IoT devices and applications.Developing and testing software to detect and prevent security breaches.Reviewing code and conducting risk assessments to identify vulnerabilities.Collaborating with cross-functional teams to ensure security and compliance are implemented throughout the … awareness programs to increase security awareness among employees.Leadership skills, ability to manage and develop a team.Identifying and managing threats and breaches to security infrastructure.Conducting penetrationtesting of IoT devices and applications to test security measures.Experience in developing and driving capability growth.Automotive cyber expertise would be desirable.Experience in securing more »
by the Alten Group in early 2022. Responsibilities Creating and implementing security protocols to ensure the security of IoT devices and applications. Developing and testing software to detect and prevent security breaches. Reviewing code and conducting risk assessments to identify vulnerabilities. Collaborating with cross-functional teams to ensure security … increase security awareness among employees. Leadership skills, ability to manage and develop a team. Identifying and managing threats and breaches to security infrastructure. Conducting penetrationtesting of IoT devices and applications to test security measures. Experience in developing and driving capability growth. Automotive cyber expertise would be desirable. … cycle (SDLC) processes and methodologies. Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH. Experience in developing and testing software using Python, C++, and Java. Excellent problem-solving skills and the ability to work well under pressure. Ability to communicate technical ideas and more »
broad range of on-premise and cloud services; develop proof-of-concept code or end-to-end exploits for bugs you’ve identified. Create testing tools to help engineering teams identify weaknesses in their own code. Collaborate with engineering teams to help them triage and fix security issues, identifying … within the development organisation and your own management chain. Target profile and skillset: 5+ years industry experience in a software/product assessment or penetrationtesting role. Proficiency reviewing code written in a variety of programming languages, including at least one of C, C++, Java or JavaScript. Extensive more »
to safeguard data transmitted over O-RAN and 5G Core interfaces. JOTS Compliant solutions in both O-RAN and 3GPP environments for commercial deployment. penetrationtesting to identify vulnerabilities on RAN and Core network and recommend remediation measures. Requirements: 3 years' working experience within enterprise networking technical understanding more »
to safeguard data transmitted over O-RAN and 5G Core interfaces. JOTS Compliant solutions in both O-RAN and 3GPP environments for commercial deployment. penetrationtesting to identify vulnerabilities on RAN and Core network and recommend remediation measures. Requirements: 3 years' working experience within enterprise networking technical understanding more »
we help to protect our customers from current and emerging security threats. We provide a full spectrum of cyber security services including CREST-certified penetrationtesting, 24/7 threat monitoring, compliance support and security training to help organisations protect against today’s evolving threat landscape. Interested? If more »
Cyber Security Experience implementing OWASP DSOMM & SAMM maturity improvements with agile teams Experience working to implement security processes based around SAST, DAST and pen testing Strong experience of the basics of project management, specifically planning, budgeting, risk management, impediment removal Experience working in an agile environment with persistent product more »
their improvement. • Training and development of direct reports. • Upkeep of Comms rooms and services securing their power. • Overseeing associated security services. (Firewalls/Pen testing/compliance updates) • Planning and running team meetings and workshops. • Participating in and being an escalation point of Out of Hours support. • Ensuring that more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
essential. Key Responsibilities Responsible for educating the workforce on information security through training and building awareness. Threat modelling, mitigation, validation, including software and hardware penetration testing. Work with all functions of the IT department to design security into the system and drive security reviews. Develop tools to assist in more »