Desired Skills/Qualifications The successful candidate will have also one or more of the following qualifications: Understand and be well versed in common cyber threat terminology, vulnerability and penetration test principles and methodologies; possess basic knowledge of cyber incident and response forensics and related current events. Familiarity with Log Analysis, Packet Analysis OSI Model, Network Architectures, NIST, DIA … and Information Operations, threat intelligence activities including the collection of and tracking threat actors, digital forensics incident response; and threat hunting methodologies. experience performing attack analysis or Red Team penetrationtesting against operational computer networks including experience in Windows Security, Network Security, Linux/Unix Security, Database security, or Mainframe Security. Ability to operate and navigate the Windows More ❯
in London, is a global Cybersecurity advisory firm. They are hiring a Senior Pentester in London (hybrid, 2x day a week in London offices). Responsibilities: Lead and deliver penetration tests across various industries, including infrastructure, technology, healthcare, financial services, and retail. Engage directly with clients, building credibility and strong professional relationships. Oversee end-to-end testing, from … remaining undetected by XDR/IDS/IPS/EDR systems. Conduct physical security assessments, including covert access operations. Qualifications & Skills: 5 - 10 years of experience in hands-on penetrationtesting/red teaming/Offensive Security operations with consulting/client-facing experience. Experience as a CHECK Team Lead. Proficiency in scripting and programming languages such as More ❯
in London, is a global Cybersecurity advisory firm. They are hiring a Senior Pentester in London (hybrid, 2x day a week in London offices). Responsibilities: Lead and deliver penetration tests across various industries, including infrastructure, technology, healthcare, financial services, and retail. Engage directly with clients, building credibility and strong professional relationships. Oversee end-to-end testing, from … remaining undetected by XDR/IDS/IPS/EDR systems. Conduct physical security assessments, including covert access operations. Qualifications & Skills: 5 - 10 years of experience in hands-on penetrationtesting/red teaming/Offensive Security operations with consulting/client-facing experience. Experience as a CHECK Team Lead. Proficiency in scripting and programming languages such as More ❯
in London, is a global Cybersecurity advisory firm. They are hiring a Senior Pentester in London (hybrid, 2x day a week in London offices). Responsibilities: Lead and deliver penetration tests across various industries, including infrastructure, technology, healthcare, financial services, and retail. Engage directly with clients, building credibility and strong professional relationships. Oversee end-to-end testing, from … remaining undetected by XDR/IDS/IPS/EDR systems. Conduct physical security assessments, including covert access operations. Qualifications & Skills: 5 - 10 years of experience in hands-on penetrationtesting/red teaming/Offensive Security operations with consulting/client-facing experience. Experience as a CHECK Team Lead. Proficiency in scripting and programming languages such as More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
best practices. Strong analytical and prioritization skills with a pragmatic, risk-based approach to decision-making. Leadership experience Nice to have: If you have come from a development/penetrationtesting background this would be advantageous for my client. Pen testing experience Certifications (CEH)/OSCP This role is on a hybrid basis with 2 - 3 days More ❯
access reviews, and incident response readiness. Provide insights and triage signals from security tooling (SAST, DAST, dependency scanning, SIEM). Work hands-on to perform internal security assessments or penetration testing. Manage relationships with external pentest providers, auditors, and assessors. Secure Development Lifecycle (SDLC) Partner with engineering teams to embed security in the SDLC and DevSecOps practices. Advise and … security leadership role. Strong understanding of security standards and frameworks (ISO 27001, SOC 2, CIS, NIST, GDPR, EU AI Act). Hands-on technical skills in areas such as penetrationtesting, application security, or infrastructure hardening. Familiarity with modern software development practices, DevSecOps, and cloud-native architectures (preferably Python eco-system, Kubernetes and Azure/AWS/GCP More ❯
Black-box testing (unauthenticated + authenticated) External web app and REST endpoint testing Risk-ranked vulnerability report Retesting after remediation Log & packet trace submission Destruction attestation of test data U.Sbased testing & data residency The selected contractor will work closely with ADS, AOT, Fast and ProMiles personnel as required during this engagement. External web application penetrationtestingMore ❯
integration and security architecture • Support DevSecOps practices and secure system development lifecycle • Evaluate and recommend cybersecurity tools and technologies • Implement and maintain security controls per NIST 800-53 • Support penetrationtesting and security assessment activities • Assess and recommend access control systems, application and file security, security practices, intrusion detection/prevention • Perform system administration, configuration, patching, upgrades, and More ❯
first step into a fast-growing field. Key Responsibilities: Monitor and analyse security alerts to identify potential threats. Assist in investigating and resolving security incidents. Support vulnerability assessments and penetrationtesting activities. Help implement security policies, procedures, and compliance standards. Learn and apply industry best practices, tools, and frameworks (e.g., ISO 27001, NIST, CIS). Requirements: Bachelors degree More ❯
Collaborate closely with cybersecurity and compliance teams to navigate security reviews, audits, and approval processes. Identify potential security risks within network configurations and recommend mitigations. Participate in vulnerability assessments, penetrationtesting, and remediation efforts related to network infrastructure Qualifications: Proven experience in network engineering with a focus on security compliance. Strong understanding of security protocols, encryption, and network More ❯
digital transformation organisation delivering critical projects across energy, water, renewables, and manufacturing. The Senior ICS OT Cyber Security Engineer will secure and optimise industrial control systems, conduct threat assessments, penetrationtesting, and design technical solutions to mitigate cyber risks. The role involves mentoring junior engineers, collaborating with stakeholders, with occasional travel to client sites and the Stone office. More ❯
to proactively enhance the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetrationtesting and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security More ❯
as the Cybersecurity Assessment Team's principal Operational Technology SME. Participate in the development and implementation of comprehensive Cybersecurity program strategies, including OT security engineering design review, vulnerability assessments, penetrationtesting, and incident response planning. Provide technical expertise and guidance to DHS on OT services security matters, including threat analysis, risk mitigation strategies, and secure network and systems More ❯
in complex infrastructure environments A strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, PenetrationTesting (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able to recognise and manage the needs and expectations of More ❯
Clydebank, Dunbartonshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetrationtesting with internal or external parties as appropriate. Drives business-wide understanding of secure development practices and general information security awareness. Represents the company during audits and performs More ❯
SCI) clearance, with polygraph. Bachelor's degree in a related scientific or technical discipline Approximately 5+ years of related work experience Working knowledge of cyber operations and/or penetrationtesting Ability to conduct network forensics and internet traffic characterization Strong analytic and critical thinking skills, including the ability to think strategically Ability to effectively express complex ideas More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
and network access. Performs research and analysis a t the deepest levels of total system product to include concept, design, fabrication, test, installation, operation, maintenance, and disposal. Designs encryption, penetrationtesting, and vulnerability analysis solutions of various security technologies. Integrates architectural features into existing infrastructures and designs cyber security architectural artifacts. Provides full assessments of system's security … posture. Performs security testing to verify cyber security integrity of the system. Designs and recommends mitigations. Conducts architectural analysis and relates existing system to future needs and trends. Embeds advanced forensic tools and techniques for attack reconstruction. Develops security policies and procedures to be applied across multiple system architectures. Provides technical expertise and guidance to more junior team members. … written communication Linux experience, specifically with security hardening BASH or other Linux scripting to validate security compliance Familiarity with ICD 503 and NIST 800-53 Experience executing DISA SCAP testing Experience with Xacta and eMASS Splunk configuration experience is a PLUS Active Top Secret clearance with SCI eligibility Must be able to pass CI poly within 6 months of More ❯
Leading the cultural shift towards secure software development across product teams Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetrationtesting, vulnerability management, and remediation efforts Acting as a software security SME, advising teams on secure design, risk More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile securityMDM (MAM/BYOD)to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 securityleveraging Purview, Conditional Access, MFAto safeguard modern workplaces. … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA—to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Analyst Location: Newport, RI Full Time (Y/N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/SCI Primary Responsibilities: • Analysis, documentation and development of integration, testing, operations, and maintenance of system security. • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events from environments to … Detection System, policy server, IAVA management, Defense Information Systems Agency, Host Based Security System, Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetrationtesting, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetrationtesting, vulnerability assessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
and outside contacts. Strong interpersonal skills and good judgment with the ability to work alone or as part of a team. Desired Experience Eight (8+) years in vulnerability management & penetration-testing corrective actions. Eight (8+) years supporting DoD defensive cyber operations: system protection, incident handling, reporting, recovery. Physical Demands Must be able to lift 25 pounds on occasion. More ❯
to assess system designs, configurations, and operational practices to ensure they meet security requirements. You will play a critical role in identifying non-compliance, conducting vulnerability assessments, and coordinating penetrationtesting, while providing valuable process improvements and developing standards and guidelines for security controls. Key Responsibilities: Analyze design specifications, design documentation, configuration practices and procedures, and operational practices More ❯