Requirements: 5+ years Java experience 2+ practical experience in Spring Boot Microservices Architecture Experience in 3 or more of the following: TDD Automated acceptance testing/BDD/Cucumber Performance and scalability testing, e.g. JMeter Penetrationtesting knowledge/OWASP Kubernetes/Container orchestration platform experience more »
Belfast, Northern Ireland, United Kingdom Hybrid / WFH Options
Areti Group
Requirements: 5+ years Java experience 2+ practical experience in Spring Boot Microservices Architecture Experience in 3 or more of the following: TDD Automated acceptance testing/BDD/Cucumber Performance and scalability testing, e.g. JMeter Penetrationtesting knowledge/OWASP Kubernetes/Container orchestration platform experience more »
Develop and implement an overall cyber security strategy and framework aligned with the organization's goals and objectives. 2. Conduct regular vulnerability assessments and penetration tests to identify potential security risks. 3. Develop and maintain incident response plans to minimize the impact of security breaches and ensure timely resolution. … as ISO 27001, NIST, and GDPR. 4. Familiarity with network security protocols, firewalls, VPNs, and other security technologies. 5. Knowledge of vulnerability assessment and penetrationtesting tools and techniques. 6. Experience in incident response and managing security incidents. 7. Strong analytical and problem-solving skills. 8. Excellent communication more »
Key Responsibilities: Monitor and analyze network traffic for unusual or suspicious activity. Investigate security breaches and other cyber security incidents. Conduct vulnerability assessments and penetration testing. Develop and implement security measures to protect information systems. Maintain and update security systems and tools. Collaborate with IT and other departments to more »
South East London, London, United Kingdom Hybrid / WFH Options
The Fortune Group (Recruitment) Limited
Malware/Ransomware etc for Product/Platform DDos Protection Access Management/Review (IAM) Threat modelling Setup Bug Bounty program Application Security/Testing Brand monitoring (domans etc) Whitelist client access Encryption in Transit (confirm 100%) Social Engineering testing Spear Phishing Secure Code Training Pre-Release code … analysis IDS/IPS Application/Infrastructure Hardening Advanced Penetrationtesting Essential experience Previous experience in a senior security role at an API focused company. At least one industry certificate such as CISSP, OSCP, CEH. Understanding of security practices for cloud platforms such as GCP and AWS Certification more »
Role: Penetration Test Manager opportunity! Location: 3 days on-site in Crawley I am currently recruiting for an industry leader that has recently made a multi-million-pound investment to have the best in class in cybersecurity function in their industry. The Cyber Test Manager will be a pivotal … company assets by driving remediation actions and countermeasures to address identified weaknesses and vulnerabilities. Set up and enhance a comprehensive red and purple team penetrationtesting program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise … and weaknesses in accordance with UKPN policy. Ensure that robust IT disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such more »
Role: Penetration Test Manager opportunity! Location: 3 days on-site in Crawley I am currently recruiting for an industry leader that has recently made a multi-million-pound investment to have the best in class in cybersecurity function in their industry. The Cyber Test Manager will be a pivotal … company assets by driving remediation actions and countermeasures to address identified weaknesses and vulnerabilities. Set up and enhance a comprehensive red and purple team penetrationtesting program, aligning it with major threat information and industry cybersecurity intelligence. Establish and maintain a vulnerability management process to identify, assess, prioritise … and weaknesses in accordance with UKPN policy. Ensure that robust IT disaster recovery and business continuity strategies and plans are in place, with regular testing to verify their effectiveness. Key Skills and Qualifications Leadership and Management: Experience: in a leadership role within a Cybersecurity Assurance function or similar, such more »
proactive, confident, credible, and persuasive team player. Collaborate and support developers, analysts, and data scientists to continually improve and innovate. Conduct SAST and DAST testing as well as penetrationtesting and threat simulations to identify potential risks. Have a practical understanding of firewall networking, ingress, VPNs, and more »
vulnerabilities. Compliance with the patching process. Monitoring security systems (IDS, Firewall, Anti-Virus) and event logs. Reporting IT KRIs/KPIs. Conduct periodic internal penetrationtesting and vulnerability assessments. Report status and exceptions to the Information Security Officer. Standard and Procedure Management: Ensure security procedures are met and … knowledge of Firewall (Cisco), IDS, and log monitoring software. Understanding of ITIL practices, ISO 27001 standards. (Preferred) Knowledge of EDR software, privileged access management, penetration and vulnerability tools, Change Auditor, ServiceNow. Ability to understand business processes and work effectively in cross-functional teams. Degree in Technology. 3-5 years … Support. Experience in developing and monitoring IT infrastructure system standards. Experience in firewall/IDS monitoring. (Preferred) Certifications: CISM, CISSP, CEH. (Preferred) Experience in penetration and vulnerability testing. (Optional) Experience in patch monitoring. more »
both achieve the desired security outcome and are operationally viable; Supporting change initiatives in navigating and utilising our central security services, including security monitoring, penetrationtesting and access management; Assuring that security control requirements are met, in conjunction with our Application Security Testing team, through the project more »
London, England, United Kingdom Hybrid / WFH Options
Jobleads-UK
depth knowledge of AWS and Azure cloud services, architecture, and security controls You have hands-on experience with security assessment tools and techniques, and penetrationtesting frameworks. Strong knowledge of ISO governance and compliance requirements. Experience with security tools and technologies, including vulnerability management andendpoint security Excellent problem … other better. You'll deliver a short-task back, detailing how you'd tackle a risk assessment and mitigation plan, compliance and governance, and penetration testing. This will be presented to Kuvera, Ashish, and an external consultant. #J-18808-Ljbffr more »
Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth security assessments, penetrationtesting, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for more »
Base Web Security Gateway Email Security Data Loss Prevention Anti-Virus Preferred Qualifications Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetrationtesting, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security + more »
and vulnerabilities, working with IT team and business users to make the Sonance network as secure as possible. Conduct risk assessments, vulnerability scans, and penetrationtesting to identify security gaps and vulnerabilities. Managing, monitoring, and updating malware prevention systems, email routing and fishing detection and response practices Be more »
organization's network and systems. Employing various security tools and methodologies to address potential weaknesses before exploitation. Vulnerability Management: Assisting in vulnerability assessments and penetration testing. Collaborating with IT and system administrators to prioritize and remediate identified vulnerabilities. Security Reporting and Documentation: Generating detailed reports on security incidents, response more »
threats and technologies. 2. Incident Response and Security Operations: Develop incident response plans and coordinate security incident handling. Oversee security monitoring, vulnerability assessments, and penetration testing. Manage security incidents and coordinate with relevant teams. 3. Security Awareness and Training: Promote security awareness across the SGS. Conduct training sessions for more »
London, England, United Kingdom Hybrid / WFH Options
Client Server
a Red Brick/Russel Group, top tier university - Computer Science, Engineering, Physics or Mathematics; MSc or PhD advantageous You have commercial experience with Penetrationtesting, Offensive Security, Red Team testing You have a good understanding (and interest in) low level concepts including operating systems and networking more »
vulnerabilities Fix detected vulnerabilities to maintain a high-security standard Support in the development of company-wide best practices for IT security Perform internal penetrationtesting if required Help colleagues install security software and understand information security management Be an escalation point for the service desk, resolving security more »
technical assessments and recommend standards and baselines. Coordinate and provide technical input for security services, including: Vulnerability Management Security Information and Event Management (SIEM) PenetrationTesting Security Training and Communication Incident and Emergency Response Threat and Risk Management Business Continuity & Disaster Recovery : Plan, document, and schedule annual business more »
of Information Security frameworks including NIST, ISO27001/17 and STRIDE Threat Modelling Framework. Understanding of general security practices such as encryption, IAM, PAM, penetrationtesting, container security, security information and event management etc. and supporting technologies. Ability to take ownership and work proactively . Organised with a more »
of Information Security frameworks including NIST, ISO27001/17 and STRIDE Threat Modelling Framework. Understanding of general security practices such as encryption, IAM, PAM, penetrationtesting, container security, security information and event management etc. and supporting technologies. Ability to take ownership and work proactively . Organised with a more »
attacks or attempts to infiltrate company email, data, e-commerce and web-based systems. May advise on security controls for projects. May advise on penetrationtesting and vulnerability assessments of applications, operating systems and/or networks. May conduct complex cleanup of legacy environments Researches and evaluates cybersecurity more »
Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetrationtesting, incident management, BCP, and/or DRP Broad knowledge of cybersecurity technologies throughout organizational and acquisition lifecycle Working knowledge of at least more »
Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetrationtesting, incident management, BCP, and/or DRP Broad knowledge of cybersecurity technologies throughout organizational and acquisition lifecycle Working knowledge of at least more »
Performing continuous monitoring activities such as using SIEM tools, APT hunting, implementing UBA, etc. Designing/implementing vulnerability management, including conducting vulnerability assessments Performing penetrationtesting, incident management, BCP, and/or DRP Broad knowledge of cybersecurity technologies throughout organizational and acquisition lifecycle Working knowledge of at least more »