cyber network operational capabilities to develop exploitation plans and make operational adjustments during execution. Additional relevant experience includes engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Exploitation Analyst shall possess the following capabilities: Experience in computer or information systems design/… development/analysis roles Experience engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration The ability to apply deep understanding of adversary networks, network defenses, and cyber network operational capabilities to develop exploitation plans and make operational adjustments as More ❯
connections, and traffic movements. Relevant experience includes computer or information systems design, development, and analysis, as well as engineering hardware and software, programming, computer and network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and network and systems administration. The Level 1 Digital Network Exploitation Analyst shall possess the following capabilities: Experience in computer or … information systems design, development, or analysis. Background in hardware/software engineering, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, or network and systems administration. Completion of military training in a relevant area such as the Joint Cyber Analysis Course (JCAC) may count towards the experience requirement (24-week JCAC course More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Identify overall … security requirements for the protection of data to ensure the implementation of appropriate information security controls. Provide analysis of customer mission needs to determine functional testing requirements. Work with security control assessors on systems testing. Perform functional analysis to identify required tasks and their interrelationships. Identify required resources. Maintain security posture for Information Systems or programs to ensure Information … The Level 2 Functional Analyst shall possess the following capabilities: Perform functional analysis to identify critical Cybersecurity tasks required and their interrelationships. Analyze customer/mission needs to determine testing requirements. Identify required resources to enable creation, registration, and assignment of SSPs in conjunction with Delegated Authorizing Officials (DAOs), ISSO's, and System Owners. Review and update organizational documentation More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Marlin Selection
Manage and optimise enterprise-grade security tools: WAF, DDoS, email and web security gateways, SIEM, SOAR, EDR, MFA, SSO, IDS/IPS, PAM and more. Perform vulnerability assessments and penetration test remediation. Deliver Cyber Security Awareness Training across the business. Lead ad-hoc security initiatives and projects. Mentor junior security staff and collaborate across IT and business units to … SC-100/200/900, OSCP or equivalent. Strong interpersonal and communication skills. Ability to lead, prioritise, and deliver across multiple concurrent tasks. Previous experience in financial services, penetrationtesting, or a SOC environment is a strong advantage. Working Pattern & Location Hybrid working model: 3 days in the office (High Holborn), 2 days from home. Shift coverage More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
respond to potential threats. Utilise advanced tools and techniques to analyse security data and identify patterns or anomalies that may indicate a security breach. Review regular vulnerability assessments and penetrationtesting to ensure the robustness of security measures. Ensure rapid response to common incidents: Contribute to incident response plans to address security breaches promptly and effectively. Key Skills More ❯
extend it across cloud providers Collaborate with onshore and offshore teams to promote DevSecOps and security practices Configure AWS and third-party security tools, working with managed SOC and penetrationtesting providers Lead AWS security projects, ensuring correct design and delivery of security requirements Continuously improve security using automated scanning and monitoring tools Stay updated on cloud infrastructure More ❯
Edinburgh, Scotland, United Kingdom Hybrid / WFH Options
Acumin
and external partners to ensure data integrity and alignment What We’re Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
Edinburgh, City of Edinburgh, United Kingdom Hybrid / WFH Options
Red Snapper Recruitment Limited
and external partners to ensure data integrity and alignment What We're Looking For: Deep understanding of cybersecurity operations, particularly in CIM and TVM (incident detection, response, patching, and penetrationtesting) Strong analytical and data visualization skills Ability to drive cross-functional collaboration in a geographically distributed environment Proven organizational skills and ability to manage competing priorities Qualifications More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Responsible for … risk management, intrusion detection, contingency planning, incident handling, configuration control, change management, auditing, security authorization process, principles of Cybersecurity (confidentiality, integrity, non-repudiation, availability, access control), and security testing Bachelor's Degree in Computer Science or IT Engineering or a related technical degree from an accredited college or university. In lieu of a Bachelor's degree, an additional More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide a More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide a More ❯
distribute intelligence reporting to MDA customers. Meeting Support and Exercises: Participate in meetings and working groups to provide cyber threat intelligence support. Support cyber tabletop exercises (CTTXs), cooperative vulnerability penetrationtesting (CVPA), and adversarial assessments (AA). Qualification Requirements: Education: Bachelor's degree in a relevant field such as history, political science, sociology, or other social science disciplines. More ❯
Operator to join our adversary simulation team, delivering high-impact operations against some of the most complex enterprise environments in the UK and beyond. This isn't a typical penetrationtesting role. You'll be leading tailored campaigns that emulate real-world threat actors - from phishing initial access through to cloud-native post-exploitation and domain-level compromise … and encourages new ideas and perspectives High-autonomy environment with supportive, skilled peers. Annual training & research budget - use it for conferences, courses, or tooling. Access to red team labs, testing infrastructure, CTI, and sandbox environments. Opportunities to contribute to public research, tools, and community initiatives. Flexible work, sensible management, and zero micromanagement. How to apply If you are interested More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: Provide management More ❯
and Risk Management! Your effort and expertise are crucial to the success and execution of this impactful mission that is critical in ensuring mission success through Security Engineering, Vulnerability Testing, PenetrationTesting, Risk Management and Assessment, Insider Threat Analysis, and IT Policies and Procedures by improving, protecting, and defending our Nation's Security. Job Description: We are More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
Best Companies as Best Company To Work For in the UK, Tech, and the South East in 2023. We are ISO27001 and ISO9001 certified by UKAS, a CREST approved penetrationtesting and SOC company, and hold IASME Cyber Essentials Certification and Cyber Essentials Plus certification. Learn more about our awards here . Why work for FSP? We offer More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Huntsville, Alabama, United States Hybrid / WFH Options
Gridiron IT Solutions
and procedures Experience with computer programming languages, including PhP, Python, SQL, C++, Perl, or Java Experience with SIEM and Endpoint tools, including Splunk, Defender, QRadar, and ArcSight Experience with penetrationtesting CEH and Security+ or CSA+ Certification GIAC Cyber Threat Intelligence (GCTI) Certification Clearance: Applicants selected will be subject to a security investigation and may need to meet More ❯
lifecycle. You'll help establish a robust security culture as we unlock Granola for the next 100x users. In this role, you will: Conduct security assessments, code reviews, and penetrationtesting to identify vulnerabilities in our applications Design and implement security tools, frameworks, and methodologies to protect against security threats Work closely with development teams to ensure secure More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯