configuration management. Experience with Microsoft Azure administration/security. Experience with Tenable administration Experience with mobile device management Familiarity with BigFix, BitLocker is preferred but not required. Understanding of penetrationtesting and vulnerability assessments. Understanding of enterprise networking concepts. Experience working in a regulated industry. Strong analytical and problem-solving skills. Past applicable job experience may include, but More ❯
Wilmslow, Cheshire, North West, United Kingdom Hybrid / WFH Options
Secure Recruitment Ltd
Vulnerabilities are Understood & Mitigated meaning that Code Reading Skills are also desirable. Skills & Experience of the Cyber Security Engineer role: Hands-On Experience with Security Assessment Tools & Techniques including PenetrationTesting & Code Review. Use of Planned, Structured Methodologies for Conducting & Reporting on Web Application Penetration Testing. Understanding & Demonstrable Experience of Automated, Dynamic & Static Application Security Testing Tools, as well as Manual Security Testing to find Vulnerabilities & Logical Issues. Broad Understanding of SDLC & Technology Functions & how they relate to Information Security. Understanding of Industry Standard Information Security Practices. Ideally Offensive Security Certified Professional (OSCP) Certification (or similar is Desirable but Not Essential). Strong Communication Skills & High Attention to Detail. Main Responsibilities of the Cyber … Tested Products within Project Context. Conducting Manual & Automated Source Code Reviews. Completing Comprehensive Security Vulnerability Analysis & Assessments of Software Applications & Providing Actionable Recommendations for Remediation. Contributing to & Utilising Security Testing Methodologies, Creating & Updating Technical Documentation as necessary. Liaising with Software Development Department to ensure Security is considered throughout SDLC. Identifying any Security Issues within the Businesss Software and Manage More ❯
practices and timely remediation of vulnerabilities, aligned with criticality-based policy enforcement. Prioritise weaknesses in IT infrastructure and applications using manual and automated methods, including results from Static Application Testing (SAST) and Software Composition Analysis (SCA) tooling (in conjunction with the Service Transition team). Influence stakeholders to prioritise and drive remediation of process and technology gaps Work with … Cyber Security, Application Teams, and IT Risk to ensure controls are met and vulnerabilities are addressed across infrastructure and applications. Engage and support Cyber Security for remediation of penetration test findings. Engage with Internal and External Auditors as the SME on all matters relating to VM. Stakeholder Engagement & Culture Act as the primary Service Matter Expert and point of … AWS, Azure, Oracle), with a high-level understanding of platforms, operating systems, and technologies. Proven capability in creating and executing comprehensive threat and vulnerability management programmes, including vulnerability scanning, penetrationtesting, and security awareness training. Proficiency in using vulnerability scanning tools (e.g. Tenable, Qualys, Rapid7, Veracode, JFrog Xray), threat intelligence platforms, and incident response tools. Prior experience implementing More ❯
Pittsburgh, Pennsylvania, United States Hybrid / WFH Options
Reed Smith LLP
industry requirements, and regulatory expectations. Provide technical support and administration for LAN/WAN, remote access, IDS/IPS, and unified threat management systems, including troubleshooting, analysis, and the testing and deployment of new hardware and security applications. Deploy and manage policies for antivirus and endpoint detection and response agents in collaboration with system owners to ensure effective endpoint … the development and implementation of security policies and procedures, security awareness programs, and participation in IT audits preferred. Hands-on experience with operating system security, encryption technologies, forensic analysis, penetrationtesting, and vulnerability/risk assessment. Prior experience in the legal profession or professional services environment preferred but not required. Skills: Ability to design and implement secure infrastructure More ❯
management etc. Respond to security events and incidents. Perform regular security audits and risk assessments. Maintain security controls, identify risks and propose treatment plans. Conduct regular vulnerability scans and penetration tests. Liaise with global IT and Cloud teams to maintain company systems and their security. Liaise with global Security Operations Centre colleagues to resolve any issues. Ensure compliance with … Bachelor's degree in Computer Science, IT or Information Security. Compliance exposure with relevant security frameworks and standards (PCI, ISO, NIST, CIS). Experience with audits and compliance enforcement. Penetrationtesting experience. Strong understanding of networking protocols and systems architecture. Creating PCI digital keys or security access modules. Threat intelligence exposure. Proficient in programming or scripting languages. IaC More ❯
Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetrationtesting, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have one of the following o A More ❯
practices. Analyze logs and data from various sources (firewalls, endpoint protection, network devices). Research emerging threats, vulnerabilities, and exploits to improve security posture. Assist in vulnerability management and penetrationtesting coordination. Support compliance initiatives (e.g., NIST, ISO 27001, SOC 2, or industry-specific standards). Document findings and create detailed reports for technical and non-technical stakeholders. More ❯
outcomes across all aspects of services that have potential to impact on our customers. What we're looking for: Proven leadership in cyber security engineering Expertise in vulnerability scanning, penetrationtesting, and risk assessments Strong communication and stakeholder management skills Hands-on experience with tools like Zscaler, Qualys, Taegis, IDS/IPS, SIEM Deep knowledge of NIST, ISO More ❯
Cambridge, Massachusetts, United States Hybrid / WFH Options
S&P Global
in a cross-team setting. Prior experience working with enterprise security technologies such as WAF, CSPM, OAuth2, and SIEM. Strong understanding of cryptography and current best practices. Experience with penetrationtesting tools, techniques and methodologies and understanding of common vulnerabilities and remediation strategies. Three or more years experience writing code in Python, Javascript, Java, or Go. Experience conducting More ❯
Crewe, England, United Kingdom Hybrid / WFH Options
Apex Recruitment Services
Engineer to join our growing team on a full-time, hybrid basis in Crewe. In this pivotal role, you’ll take responsibility for planning, preparing, and executing cyber security testing for automotive systems. Your work will ensure compliance & safeguarding vehicles against emerging cyber threats and maintain the highest security standards across global markets. Key Skills & Experience The ideal candidate … will be a results-driven Cyber Security Test Engineer with a proven track record of delivering high-quality product security testing, ideally within the automotive industry. You’ll bring a strong technical foundation, practical experience in cyber security testing, and a clear understanding of global automotive standards and regulations. Collaboration, adaptability, and the ability to thrive in a … fast-paced, cross-functional environment are key to success in this role. The successful candidate will demonstrate: Hands-on automotive experience & solid understanding of cyber security testing, frameworks and methodologies, with penetrationtesting experience considered a plus. Proficiency in software development and scripting languages such as; C, Java, Python, and CAPL. Experience in test planning, coordination, and More ❯
warrington, cheshire, north west england, united kingdom Hybrid / WFH Options
Apex Recruitment Services
Engineer to join our growing team on a full-time, hybrid basis in Crewe. In this pivotal role, you’ll take responsibility for planning, preparing, and executing cyber security testing for automotive systems. Your work will ensure compliance & safeguarding vehicles against emerging cyber threats and maintain the highest security standards across global markets. Key Skills & Experience The ideal candidate … will be a results-driven Cyber Security Test Engineer with a proven track record of delivering high-quality product security testing, ideally within the automotive industry. You’ll bring a strong technical foundation, practical experience in cyber security testing, and a clear understanding of global automotive standards and regulations. Collaboration, adaptability, and the ability to thrive in a … fast-paced, cross-functional environment are key to success in this role. The successful candidate will demonstrate: Hands-on automotive experience & solid understanding of cyber security testing, frameworks and methodologies, with penetrationtesting experience considered a plus. Proficiency in software development and scripting languages such as; C, Java, Python, and CAPL. Experience in test planning, coordination, and More ❯
Penetration Tester - Red Team - Remote A renowned cyber security consultancy is growing their technical team with the addition of a Penetration Tester with experience of Red Team engagements. You'll join a talented team of cyber security specialists to work on a range of offensive security projects with clients across various industries, using bleeding-edge tooling to deliver … skills and career with professional qualifications. To be successful in this role, you should bring: A minimum of 2 years' experience working on red team engagements Strong background in penetrationtesting with skills in topics such as EDR evasion, exploit development, cloud exploitation etc. Coding experience in languages such as Python, C/C++, Rust or GO Professional More ❯
U.S. airspace safety and efficiency. We are seeking a Cybersecurity Test Engineer to join our team of qualified, diverse individuals. The ideal candidate will design, execute, and document security testing for the Federal Aviation Administration (FAA). In this role, you will support verification, validation, and compliance activities by developing test plans, identifying vulnerabilities, and validating the effectiveness of … teams to ensure FAA systems meet the highest standards of safety, resiliency, and cybersecurity compliance. Develop and execute test plans, test cases, and test scripts for cybersecurity validation. Perform penetrationtesting, vulnerability assessments, and security control validation. Support verification and validation (V&V) of FAA system security requirements. Collaborate with engineers and architects to ensure secure design and … implementation. Conduct functional, regression, and performance testing on cybersecurity features. Validate compliance with NIST 800-53, RMF, FedRAMP, FISMA, and FAA cybersecurity standards. Document test results, prepare test reports, and support remediation activities. Integrate security testing into DevSecOps pipelines and CI/CD workflows. Provide recommendations for improving security posture based on test findings. Prepare audit-ready test More ❯
Chantilly, Virginia, United States Hybrid / WFH Options
Task Force Talent LLC
Task Force Talent is seeking a Penetration Tester with an active TS/SCI FSP security clearance. Target salary range is 100k - 210k, depending on experience level. Our client for this role is a small company with very unique experience and expertise in cybersecurity and related areas. Candidates should have a background or experience in a technical area, excellent … U.S. citizen with active TS/SCI FSP security clearance. (Sorry, we are unable to sponsor or upgrade clearance s for this role.) Experience with: Grey and black box penetrationtesting and system exploitation against desktops, servers, applications, operating systems, and security systems to gain root and administrator access Performing reconnaissance, privilege escalation persistence, lateral movement, and payload More ❯
or looking to move into another area of Cyber Security. Our industry-renowned and awarded training program will teach you to perform web application security assessment, network and infrastructure testing, applied research, consultancy skills, and more. You will propel your career and be on the fast track to becoming a full fledge Penetration Tester (aka Security Consultant). … from client communication to report writing You’ll work through real-world scenarios using tools like Burp Suite, Kali Linux, and custom NCC Group platforms. Expect to learn manual testing techniques alongside automated approaches You’ll observe live client engagements, gaining exposure to different industries, threat models, and testing methodologies Midway through the programme, you’ll deliver a … gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetrationtesting and consultancy, ready to specialise or broaden into other areas of cyber security. A successful Associate Has a good level of English command, both written and spoken More ❯
or looking to move into another area of Cyber Security. Our industry-renowned and awarded training program will teach you to perform web application security assessment, network and infrastructure testing, applied research, consultancy skills, and more. You will propel your career and be on the fast track to becoming a full fledge Penetration Tester (aka Security Consultant). … from client communication to report writing You’ll work through real-world scenarios using tools like Burp Suite, Kali Linux, and custom NCC Group platforms. Expect to learn manual testing techniques alongside automated approaches You’ll observe live client engagements, gaining exposure to different industries, threat models, and testing methodologies Midway through the programme, you’ll deliver a … gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetrationtesting and consultancy, ready to specialise or broaden into other areas of cyber security. A successful Associate Has a good level of English command, both written and spoken More ❯
or looking to move into another area of Cyber Security. Our industry-renowned and awarded training program will teach you to perform web application security assessment, network and infrastructure testing, applied research, consultancy skills, and more. You will propel your career and be on the fast track to becoming a full fledge Penetration Tester (aka Security Consultant). … from client communication to report writing You’ll work through real-world scenarios using tools like Burp Suite, Kali Linux, and custom NCC Group platforms. Expect to learn manual testing techniques alongside automated approaches You’ll observe live client engagements, gaining exposure to different industries, threat models, and testing methodologies Midway through the programme, you’ll deliver a … gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetrationtesting and consultancy, ready to specialise or broaden into other areas of cyber security. A successful Associate Has a good level of English command, both written and spoken More ❯
warrington, cheshire, north west england, united kingdom
NCC Group
or looking to move into another area of Cyber Security. Our industry-renowned and awarded training program will teach you to perform web application security assessment, network and infrastructure testing, applied research, consultancy skills, and more. You will propel your career and be on the fast track to becoming a full fledge Penetration Tester (aka Security Consultant). … from client communication to report writing You’ll work through real-world scenarios using tools like Burp Suite, Kali Linux, and custom NCC Group platforms. Expect to learn manual testing techniques alongside automated approaches You’ll observe live client engagements, gaining exposure to different industries, threat models, and testing methodologies Midway through the programme, you’ll deliver a … gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetrationtesting and consultancy, ready to specialise or broaden into other areas of cyber security. A successful Associate Has a good level of English command, both written and spoken More ❯
bolton, greater manchester, north west england, united kingdom
NCC Group
or looking to move into another area of Cyber Security. Our industry-renowned and awarded training program will teach you to perform web application security assessment, network and infrastructure testing, applied research, consultancy skills, and more. You will propel your career and be on the fast track to becoming a full fledge Penetration Tester (aka Security Consultant). … from client communication to report writing You’ll work through real-world scenarios using tools like Burp Suite, Kali Linux, and custom NCC Group platforms. Expect to learn manual testing techniques alongside automated approaches You’ll observe live client engagements, gaining exposure to different industries, threat models, and testing methodologies Midway through the programme, you’ll deliver a … gaining CRT or CSTM, you will apply to NCSC for CHECK Team Member accreditation. Transition into client-facing delivery work with confidence and credibility Build a strong foundation in penetrationtesting and consultancy, ready to specialise or broaden into other areas of cyber security. A successful Associate Has a good level of English command, both written and spoken More ❯
Team Journeyman Course (RTJC), Certified Red Team Operator (CRTO) certification, Offensive Security, Rogue Ops- Red Team 1 (ROPS), Certified Professional (OSCP), Global Information Assurance Certification, (GIAC) Exploit Researcher & Advanced Penetration Tester (GXPN), GIAC Penetration Tester (GPEN), and/or GIAC Web Application Penetration Tester (GWAP). CNOQC Course (Computer Network Operator Qualification Course) and FORGE (Future Operator … Readiness Growth and Enrichment). Expertise in antivirus evasion, EDR evasion, offensive infrastructure, phishing and social engineering campaigns, and/or penetrationtesting of critical infrastructure, networking, IoT, and wireless devices. Education: Technical Training, Certification(s) or Degree, 1+ years of experience. Security Clearance Level: TS/SCI Location: On Customer Site Citizenship Required: US Citizenship GDIT IS More ❯
secure, innovative solutions across industries. We foster collaboration, inclusion, and continuous growth, with networks supporting diversity, equity, and belonging. What You'll do: Lead and manage threat intelligence-led penetration tests across applications, infrastructure, cloud (AWS/Azure/O365), APIs, and OT Develop advanced test plans, identify critical assets, and deliver detailed, actionable reports for technical and business … team capabilities Contribute to research on emerging threats and attack techniques to strengthen proactive security What You'll Bring: CREST CRT (or higher) certification - essential 5+ years' experience in penetrationtesting with strong understanding of adversarial tactics and threat intelligence Expertise across network, cryptography, vulnerabilities, and attack vectors Strong communication and reporting skills Experience with Breach Attack Simulation More ❯
Mongo, ElasticSearch, and Redis Experience with containerization, including Docker or Podman, or container orchestration, including Swarm or Kubernetes Experience operating with AWS Experience with computer and network security and penetrationtesting Experience with dataflow integration such as Apache NiFi Experience writing source code for new applications or generating and enhancing code samples for existing applications Experience using back … end and front-end languages to develop complete solutions Experience creating and using data models, data structures, data transformations, and data processing pipelines Ability to work with automated testing tools to perform testing and maintenance Clearance: Applicants selected will be subject to a security investigation and may need to meet eligibility requirements for access to classified information ; TS More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetrationtesting and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve More ❯
Arlington, Virginia, United States Hybrid / WFH Options
UICGS and Bowhead Family of Companies
network analysis tools to identify cloud-based vulnerabilities (e.g., ACAS, HBSS, etc.) • Apply system, network, and OS hardening techniques for cloud environments • Conduct cloud-based application vulnerability assessments and penetrationtesting • Identify systemic security issues based on analysis of vulnerability and configuration data • Apply cybersecurity and privacy principles to organizational requirements (confidentiality, integrity, availability, authentication, non-repudiation) • Utilize More ❯
Perform initial triage and analysis of alerts generated by security tools (e.g., SIEM platforms). Conduct forensic analysis of digital artifacts including disk images and log data. Assist with penetrationtesting and vulnerability assessments. Apply remediation measures to detected vulnerabilities and provide security hardening recommendations. Support the deployment and monitoring of firewalls, encryption tools, and other security technologies. More ❯