swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
VIQU IT Recruitment
VLANS, TCP/IP ect. Azure Qualifications (e.g. AZ-104, AZ-305, AZ-700, AZ-500, AZ-140). Desirable: Experience with filtering tools, Data (PowerBI, SQL), SonicWALL, Pen testing, VoIP and site recovery. Duties of the Azure Solutions Architect: Design and architect modern IT infrastructure solutions, focusing on Azure and Microsoft 365 technologies. Lead and end to end More ❯
systems security. Guide clients in establishing cybersecurity policies, standards, and procedures. Manage cybersecurity training & awareness services for clients from design to implementation. Understanding of security analysis, security events, and penetration testing. Soft Skills: Strong interpersonal and communication skills; experience with cross-cultural communications. Calmness and clarity of thought under pressure and ability to maintain positive attitude. Agile and flexible More ❯
improvement model for security Ensure Information Security controls are operating effectively Ensure where gaps are identified that these have remediation plans agreed and delivered Ensure effective Information Security pen testing co-ordination along with Vulnerability Security assessments Help embed security best practices throughout the business and early in projects Assist in 3rd party assurance Skills, Experience and Knowledge: Strong More ❯
improvement model for security Ensure Information Security controls are operating effectively Ensure where gaps are identified that these have remediation plans agreed and delivered Ensure effective Information Security pen testing co-ordination along with Vulnerability Security assessments Help embed security best practices throughout the business and early in projects Assist in 3rd party assurance Skills, Experience and Knowledge: Strong More ❯
Bristol, Avon, England, United Kingdom Hybrid / WFH Options
MBDA
and internationally as well as an opportunity to work in a lab-based environment. There will also be further opportunities to develop practical cyber security skills such as "pen testing", "capability and vulnerability analysis" in the new cyber lab. Other things that this role can provide is an opportunity to engage with stakeholders, engineering teams and sub-contractors to More ❯
experience around Security, Data, Cloud, Service and Solution. You will be seeing designs through from start to finish incorporating everything from technology to solution, assurance, governance, and security (pen testing) - Not from a hands-on perspective but from a design perspective. You will need to be client facing and be able to make complex designs seem simple to customers. More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it More ❯
Community; • documentation of completion of at least one of the following courses: Windermere, RIOT, FORGE, Advanced Cyber Operations Course - Procedures (AOC-P), Offensive Security Certified Professional (OSCP), GIAC Expert Penetration Tester (GXPN), or Zero Point Security Certified Red Tram Operator (CRTO); • experience operating in an agile development environment; • experience with container technologies, such as Kubernetes and Docker; • experience in … a fast-paced environment with flexible customer requirements; • knowledge of penetrationtesting or red team operations; and • a Bachelor's degree in Computer Science, Computer Engineering, Electrical Engineering, Cybersecurity, or Information Systems. LEAD Endeavors is a defense intelligence and cyber security analysis and solutions company. Our solutions aid the nation's defense industry in creating offensive and defensive More ❯
based forensics, cyber incident response, cyber-criminal investigation, intrusion detection/analysis, designing countermeasures and mitigations against potential exploitations of programming language weaknesses and vulnerabilities, cyber red teaming, network penetrationtesting, security operations center analysis, defensive cyber operations, or offensive cyber operations. Malware development, analysis, binary disassembly, binary decomplication, network/communication protocol analysis, software vulnerability research, or … software exploit development. In addition, desired skills/certifications are: o Offensive Security Experienced Pentester (OSEP), Advanced Windows Exploitation (OSEE), Exploit Researcher and Advanced Penetration Tester (GXPN), Reverse Engineering Malware (GREM) Security Clearance Requirement: An active Top Secret SCI security clearance is required for this position. This position is part of our Federal Solutions team. The Federal Solutions segment More ❯
and adhered to. Work with stakeholders to ensure that technical security patterns, standards, and sub-standards are developed and maintained. Lead and further develop and mature our extensive Pen testing & other testing programmes. Undertake assurance reviews and assessments, including 3rd Parties, new technical solutions and processes, producing relevant recommendations and reporting. Understand the business and information risk context … required. Ensure compliance with company and other relevant standards/regulations at all times. Experience & Knowledge: Extensive Information & IT Cyber Security experience. Experience of maturing extensive Pen test & other testing programmes. Proficiency in technical security controls and frameworks, including experience and proficiency in cloud security. Experience and expertise in Azure environment security, vulnerability management, and associated processes. Detailed knowledge More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
delivering, and driving the security of our mobile platform. The key aspect of this role is the design and delivery of a world-class security framework, including associated services (penetrationtesting, research, consultancy etc.). What we need from you/essential skills & experience: Experience of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular … reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and automation frameworks. Have deep knowledge and experience using the mobile security tools. Good More ❯
london (city of london), south east england, united kingdom
Bonhill Partners
Role: Red Team Operator Rate: TBC Location: London, City. Contract length: 5 months -> Perm Conversion Requirements: 3+ years of experience in offensive security, including red teaming and penetrationtesting Strong understanding of the MITRE ATT&CK framework and threat emulation methodologies Proficiency in offensive tools (Cobalt Strike, Sliver, Metasploit, etc.) and custom payload development Experience with evasion techniques More ❯
cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetrationtesting (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware, software, networks, cloud, etc. More ❯
and Android internal processing and kernels (OS and apps) DESIRED QUALIFICATIONS Familiarity with Android OS and mobile device debugging techniques Experience analyzing APK files Experience in threat hunting or penetrationtesting Experience with electrical hardware and circuit board analysis Proficient with benchtop equipment: Oscilloscopes Signal/power analyzers Multimeters Experience performing micro-soldering Experience with unmanned systems such More ❯
and DevOps Containerization. We also provide customer solutions in the areas of CND, CNE, and CNO by providing our customers with assessments and solutions in Threat Mitigation, Vulnerability Exposure, PenetrationTesting, Threat Hunting, and Preventing Advanced Persistent Threat. More ❯
You will also lead on third-party supply chain reviews, prepare the business for certifications, and run engaging training sessions to keep compliance front of mind! You’ll manage penetrationtesting with external providers, support IT audits, and investigations, and work closely with internal teams to identify and close compliance gaps. Ideally experience in OT – Operational technology environments. More ❯
network-based forensics, cyber incident response, cyber-criminal investigations, intrusion detection/analysis, and designing countermeasures and mitigations for programming language weaknesses and vulnerabilities. Advanced cyber red teaming, network penetrationtesting, security operations center analysis, defensive and offensive cyber operations. Malware development and analysis, including binary disassembly, binary decomplication, dynamic analysis, and network/communication protocol analysis. Software More ❯
APIs. Experience working with containers at a technical level. Experience leveraging interfaces and protocols such as I2C, JTAG, UART, SPI, USB, and Ethernet. DESIRED SKILLS AND EXPERIENCE: Experience with penetrationtesting or threat hunting. Experience with digital forensics tools such as (FTK, Autopsy, EnCase). Experience with binary analysis tools and techniques such as Ghidra. Familiarity with Android More ❯
page: VORPAL Jobs . Qualifications: Required: An active TS/SCI with Poly clearance University Degree (BA/BS) or equivalent experience Experience of operations management processes Familiar with PenetrationTesting life cycle Strong written communication Familiar with variety of Computer Operating Systems Desired : Experience with Kali Linux tools This position is contingent on funding and may not More ❯
Arlington, Virginia, United States Hybrid / WFH Options
SRC
Our client has deep expertise in Vulnerability Research, CNO Development, Reverse Engineering, and Penetration Testing. They support the defense and intelligence communities along with commercial clients. Founded by engineers, they have their own fixed, firm contract, and they work out of their own space. They have strong salaries and team incentive bonuses, provide excellent benefits, and offer More ❯
Leicester, Leicestershire, East Midlands, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
cycles, QA, CI/CD, and DevOps . Technical knowledge: Development : C# , JavaScript, JSON, GitHub workflows Platform : Azure, Microsoft stack Data : CRM data models & integration Infrastructure : Security, cyber, pen-testing, scalable environment If this role sounds of interest and you would like to know more, do not hesitate to contact me on Reasonable Adjustments: Respect and equality are core More ❯