Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯
support the business and technology teams delivery of the security change programme. Provide support to the business and technology teams to understand and address vulnerabilities within SLA, identified through penetrationtesting, vulnerability scanning and red team exercises Foster relationships with internal business units to enhance cyber security communication, including knowledge of threats, vulnerabilities, and mitigation strategies. Provide strategic … to changes. Lead the information security updates at business and technology governance forums. The Requirements Technical skills: A comprehensive understanding of information security services (security operations and offensive security testing) Experience of strategic planning and oversight of cyber incident response and crisis management Strong understanding of cybersecurity standards and frameworks (e.g. ISO27001, NIST, CIS) and their application in strategic More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
POA&Ms, deviation lists, and ensure systems maintain Authority to Operate (ATO). Provide FRCS cybersecurity engineering support and continuous monitoring in accordance with DoD and Army standards. Perform penetrationtesting, threat analysis, and security risk assessments in lab/test environments. Collaborate with stakeholders to improve system hardening, respond to ICS-CERT alerts, and mitigate CAT More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
demonstrating expertise across various areas (e.g., CISM, CISA, OSCP, GPEN). Experience Industry Experience: Minimum of 3-5 years of professional experience in cybersecurity roles such as security analyst, penetration tester, security consultant, or security architect. Teaching Experience: Prior teaching experience in higher education or corporate training environments preferred. Experience with online course platforms and virtual learning environments is … IDS/IPS, network monitoring tools, threat intelligence platforms, and security protocols. Skills and Expectations: Technical Expertise In-depth knowledge of cybersecurity frameworks, tools, and protocols. Practical experience with penetrationtesting, vulnerability assessments, and security operations. Familiarity with incident response procedures, risk management, and security compliance. Instructional Skills Ability to convey complex technical information clearly and effectively to More ❯
Experience with NIST Risk Management Framework or other similar control framework • Knowledge of vulnerability assessment tools including Nessus, Wireshark, Kali Linux, Nmap, Metasploit, and Lin/WinPEAS • Experience with penetrationtesting, adversarial emulation, or red teaming 2) Cloud Engineer A candidate must meet ALL of the below criteria. The candidate must: • Have one of the following o A More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
engineering, and compliance, while leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerability management efforts, penetrationtesting, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO 27001 and supporting audits More ❯
london (city of london), south east england, united kingdom
AirSearch
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
practices, and common attack vectors. • Knowledge of security compliance frameworks and regulations such as GDPR, HIPAA, PCI DSS, and SOC 2. • Ability to conduct risk assessments, vulnerability assessments, and penetration testing. • Proficiency in scripting languages like Python, PowerShell, or Bash for automation and orchestration tasks. Certifications: (Nice to have, not required: ) • Relevant certifications can be advantageous, such as Certified More ❯
Responsibilities Partner with development, operations, and security teams to integrate security protocols seamlessly into the software development lifecycle. Design, build, and maintain CI/CD pipelines incorporating automated security testing, vulnerability assessments, and compliance checks. Develop and manage infrastructure as code (IaC) configurations, ensuring secure and scalable cloud resources and infrastructure. Conduct security assessments, code reviews, and penetrationtesting to identify and resolve application, code, and infrastructure vulnerabilities. Monitor system and application logs to detect and address potential security incidents. Implement and oversee identity and access management (IAM) systems to ensure secure authentication and authorization. Provide secure coding guidance to software engineers and assist in remediating security issues. Lead incident response efforts, investigating and mitigating security … code tools, including Terraform, CloudFormation, or Ansible. Strong scripting skills in languages such as Python and Bash for automation and integration. Proficiency with static code analysis, dynamic application security testing (DAST), and vulnerability scanning tools like Fortify and Acunetix. Knowledge: In-depth understanding of security frameworks (e.g., OWASP, NIST) and best practices for mitigating vulnerabilities. Familiarity with common threat More ❯
Overview: Personnel assigned to this role will serve primarily on the Operations & Response (O&R) Team; however, this role may also support the Vulnerability Assessment and Penetration Test (VAPT) and Engineering teams. This role is also responsible for coordinating with both the Cybersecurity Services Section and other sections or divisions within the organization. Job Duties: -Perform network security monitoring … and mitigation; analyzing security system logs, security tools, and data; network monitoring, and intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/incident response events; architecting, engineering … developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. -3 years of experience using one or more of the following security tools: SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. -3 years of penetrationtesting experience for More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetrationtesting, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical perspective. Desirable More ❯
critical systems. RESPONSIBILITIES & DUTIES: Design, deploy and manage cloud security architectures in AWS, Azure and/or other commercial or private cloud environments. Conduct risk assessments, vulnerability scans, and penetrationtesting to identify and mitigate security weaknesses. Implement and monitor cloud-native security controls, such as firewall, encryption, IAM policies, and logging/monitoring solutions/Develop and More ❯
Horsham, West Sussex, South East, United Kingdom Hybrid / WFH Options
Platform Recruitment Limited
platforms (Office 365, Azure, AWS) Experience working with or managing a SOC Practical 3rd line operational security background Familiarity with audits, compliance frameworks, and risk management Knowledge of pen testing, vulnerability scanning, and networking best practices Confident project management skills and ability to lead from the front This is an opportunity to be the go-to security expert in More ❯
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
expectations. Responsibilities Collaborate with cross-functional teams to integrate robust security measures throughout the software development lifecycle. Design, implement, and manage CI/CD pipelines that include automated security testing, vulnerability scanning, and compliance validation. Develop and maintain infrastructure as code (IaC) configurations to ensure secure, scalable cloud and infrastructure deployments. Conduct comprehensive security assessments, code reviews, and penetrationtesting to identify and mitigate vulnerabilities. Monitor system and application logs for potential security threats and respond to incidents promptly. Implement and oversee identity and access management (IAM) solutions, maintaining secure authentication and authorization processes. Advise software engineers on secure coding practices and assist in addressing security vulnerabilities. Contribute to incident response activities by investigating and mitigating breaches More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
london (city of london), south east england, united kingdom
InterQuest Group
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯