Cambridge, Cambridgeshire, East Anglia, United Kingdom
Morson Talent
coding. Collaborating with architects and developers to review designs and code for vulnerabilities. Embedding/improving threat modelling and secure development practices into the SDLC. Designing and integrating security testing plans. Performing and overseeing application security testing and driving remediation. Managing end-to-end vulnerability workflows, including bug bounty findings. Supporting incident response activities when needed. Monitoring and … in an on-call rotation. What we're looking for 3+ years in software engineering plus 2+ years in application security. Strong knowledge of OWASP, application vulnerabilities, and security testing techniques. Experience with secure web application development and Agile/DevOps methodologies. Familiarity with pen testing, bug bounty, or hacker community collaboration. Strong communication skills – able to influence More ❯
our lab's goals and priorities. What you'll do Be responsible for all aspects of delivery of new solutions and features, creating low detail designs, lead software development, testing and operational stability, balancing priorities and ensuring adherence to group standards. Be responsible for leading a talented group of engineers, guiding and working alongside them on entire software development … lifecycle and manage the delivery of robust, scalable data applications and features. Ensure applications and code alignment with security principles, secure coding practices, addressing code vulnerabilities and PEN testing resolutions. Work with your team to deliver functional and non-functional requirements ensuring these are being met during design, software development and testing. Be solving technical problems at pace, identify More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Lloyds Banking Group
our lab's goals and priorities. What you'll do Be responsible for all aspects of delivery of new solutions and features, creating low detail designs, lead software development, testing and operational stability, balancing priorities and ensuring adherence to group standards. Be responsible for leading a talented group of engineers, guiding and working alongside them on entire software development … lifecycle and manage the delivery of robust, scalable data applications and features. Ensure applications and code alignment with security principles, secure coding practices, addressing code vulnerabilities and PEN testing resolutions. Work with your team to deliver functional and non-functional requirements ensuring these are being met during design, software development and testing. Be solving technical problems at pace, identify More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it … scalable, secure Python applications, APIs, and microservices - Design, implement, and manage cloud infrastructure using common cloud providers - Utilize DevOps best practices to integrate CI/CD pipelines for automated testing and deployment - Optimize and troubleshoot system performance, scalability, and reliability in cloud environments - Collaborate with cross-functional teams, including product, QA, and data engineering, to ensure applications and infrastructure More ❯
phishing campaigns to gain internal network access. Conduct exploitation of external facing assets to gain internal network access. Conduct post-exploitation actions towards exercise objectives. Conduct on-site physical penetration assessments at various federal courthouses and other Court locations to obtain access to internal networks. Use custom code and/or commercial-off-the-shelf (COTS) exploitation frameworks to … and troubleshoot Windows, Linux, and MacOS systems. Minimum 4 years of experience scripting in Bash, C#, Ruby, Perl, Python, PHP, etc. Minimum 4 years of social engineering and physical penetration testing. Minimum 4 years of experience writing cybersecurity assessment reports. Additional Preferred Qualifications: Experience with Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST), including … integrating results into developer workflows is preferred Knowledge of OWASP Top 10 & SANS Top 25 vulnerabilities, with ability to exploit/remediate is preferred Experience with application security testing for web, mobile, and API endpoints is preferred Preferred Certifications CRTO certification (or ability to obtain within 3 months of onboarding) is required. OSCP and/or GPEN certifications are More ❯
Contract Pen Tester – SC Cleared 🚨 I'm on the search for a INF/APP or CSTM certified consultants to deliver ITHCs and penetration testing. 🔹 £700 p/d (Outside IR35) 🔹 6 months (with extension) 🔹 Manchester & Newcastle (mix of on-site + remote) 🔹 SC clearance required If you’re a seasoned tester with these certifications and strong AWS/ More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
Responsibilities Kroll Cyber and Data Resilience is seeking a Sales Manager, Enterprise Sales, responsible for end-to-end sales of new business opportunities to the largest clients in the region including FTSE 100 companies. The Kroll Cyber and Data Resilience More ❯
and review security-sensitive design decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerability scanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it … embedded software products - Create, update, and maintain documentation on developed software and techniques - Develop and maintain support tools/software for interfacing with embedded systems - Perform developer and integration testing on all developed software Requirements for your new career - Bachelor's degree in a technical discipline. (Additional 4 years of experience may substitute degree) - 10 years of experience in More ❯
Must be a US Citizen to meet customer and compliance requirements, including potential access to classified information. Applicants in the County of Los Angeles: Qualified applications with arrest or conviction records will be considered for employment in accordance with the More ❯
to rapidly identify and solve mission capability gaps playing a critical role in defending our nation's cyber infrastructure & providing expertise in malware analysis, attribution, mapping adversarial infrastructure, pen testing, and operational planning. Our open-door leadership team fosters a supportive culture, where internal growth and promotion opportunities are the norm. Don't just take our word for it … Your contributions are - Design, develop, and execute manual and automated test procedures for service layer and web-tier applications - Build and maintain automated test scripts to support functional regression testing - Document and refine repeatable, detailed bug reports with supporting logs and data - Conduct load and performance testing while collaborating with engineers to tune system configurations - Perform security testing to ensure APIs and interfaces comply with requirements - Manage test activities within an agile sprint lifecycle, including feature validation, regression testing, and reporting - Create and maintain dashboards, test documentation, and release verification deliverables Requirements for your new career - Bachelor's degree in a technical discipline. (Additional higher education may substitute years of experience) - 3-10 years of experience More ❯
Offensive Security Researcher/Security Consultant | Elite Cybersecurity Scale-Up | Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator , backed by funding, recognised by More ❯
Good skills with Python & Jupyter, as well as HTML to help maintain previous web page build. Evaluate and help enhance content analytics for machine translation systems using modern methods. Evaluate Natural Language Processing software to see which works best on More ❯
Offensive Security Researcher/Security Consultant Elite Cybersecurity Scale-Up Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator, backed by $29M funding, recognised More ❯
HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Xact Placements Limited
Offensive Security Researcher/Security Consultant | Elite Cybersecurity Scale-Up | Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator , backed by funding, recognised by More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Xact Placements Limited
Offensive Security Researcher/Security Consultant | Elite Cybersecurity Scale-Up | Fully Remote (Global) Ready to take your offensive security skills to the next level? This is your chance to join a fast-scaling cybersecurity innovator , backed by funding, recognised by More ❯