Electrical Engineering, Information systems, Information Technology, Cybersecurity, or a closely related discipline. Four years of additional demonstrated work experience in Security Control Assessor (SCA) and Defensive Cyber Operations (DCO)Testing will be accepted in lieu of a bachelor's degree. A Master's degree in an applicable discipline be substituted for three years of demonstrated work experience • Three … a cloud computing environment. • Strong writing skills. • Write final reports and defend all findings, including risk or vulnerability, mitigation strategies, and references. • Report vulnerabilities identified during security assessments. • Write penetrationtesting Rules of Engagement (ROE), Test Plans, and Standard Operating Procedures (SOP). • Conducted security reviews, technical research and provided reporting to increase security defense mechanisms. • Travel Domestic More ❯
for product teams. Support system accreditation, liaising with security accreditors and assurance teams. Prepare security documentation including Protection Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetrationtesting, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or More ❯
Analyst Location: Newport, RI Full Time (Y/N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/SCI Primary Responsibilities: • Analysis, documentation and development of integration, testing, operations, and maintenance of system security. • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events from environments to … Detection System, policy server, IAVA management, Defense Information Systems Agency, Host Based Security System, Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetrationtesting, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. PenetrationTesting & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to … review your application and invite you to the next stage if you showcase the right aptitude for success. Complete online assessments and a first-stage interview - These assessments are testing your aptitude for learning. Show us your potential and then your personality in a telephone interview. Final competency-based interview - Demonstrate your collaborative skills, problem-solving abilities, and growth More ❯
expert advice and guidance on security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate security risks and recommendations effectively More ❯
and system security Cybersecurity Service Providers (CSSP) Cyber Red Teams With at least 3 of the following 6 focus areas: Vulnerability Analysis Network Security Monitoring Incident Response/Forensics PenetrationTesting/Red Teaming CND Infrastructure Support CND Incident Response EDUCATION: Bachelor's degree in computer science, Information Technology, or an equivalent degree from an accredited college or More ❯
with Splunk Enterprise Security (accreditation preferred) - Experience with other Splunk premium security tools or products (UBA, RBA, Phantom) is a plus. • Extensive experience in threat hunting, red teaming, or penetrationtesting, with a deep understanding of common attack vectors and methodologies. • Strong analytical and problem-solving skills, with the ability to analyze large datasets and identify actionable insights. More ❯
Code (Terraform, CloudFormation) Experience with Jira or similar ticketing systems Technical architecture review skills Vulnerability identification (CWE, OWASP) Operating systems and hardening techniques Development concepts like CICD, Pipelines, SDLC Penetrationtesting knowledge (useful) Familiarity with Cloud Development Kit (CDK), GitOps Experience in DevOps/agile environments Docker, Kubernetes, serverless, Helm Platforms like Snowflake, MongoDB, Terraform Cloud, GitHub, Databricks More ❯
cybersecurity controls in accordance with the Risk Management Framework (RMF). •Maintain and update System Security Plans (SSPs), POA&Ms, risk assessments, and continuous monitoring documentation. •Perform vulnerability assessments, penetrationtesting, and security audits using tools such as Nessus, SCAP/STIG, or PowerShell. •Collaborate with the CFO and IT Manager to ensure compliance with NIST SP More ❯
Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identity and access management (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies, standards, and procedures. Lead security assessments, vulnerability scanning, and penetration testing. Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization More ❯
services, storage, networking, and security components. -Monitor and optimize system performance, and implement corrective actions on a hybrid/private cloud-based platform. -Conduct regular cybersecurity vulnerability assessments and penetration testing. -Develop and maintain security incident response plans and procedures. -Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. -Deploy and manage machines More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
GoDefend is a growing UK-based cyber security company based in Newcastle upon Tyne, offering a wide-spectrum of cyber solutions whilst specialising in continuous vulnerability scanning and penetration testing. We are seeking a Penetration Tester with over three years of hands-on experience in offensive security. Youll join a growing, fast-paced cyber security team where your … remote working), is ideal for a technically skilled professional who is also confident communicating with clients and translating complex risks into clear business language. What Youll Be Doing: Conduct penetrationtesting across web applications, mobile apps, cloud platforms, and internal networks. Perform detailed vulnerability assessments and provide actionable remediation guidance. Create professional, jargon-free reports suitable for both … technical and non-technical audiences. Lead or support scoping calls with clients to define the scope and objectives of testing engagements. Act as a trusted advisor, clearly communicating findings, risk implications, and recommendations to stakeholders. Mentor junior testers and contribute to internal training and documentation. Investigate post-incident root causes and propose preventative security controls. Keep abreast of emerging More ❯
Security Engineer, you will implement and maintain robust security systems and protocols across our IT infrastructure. Your responsibilities include conducting risk assessments and vulnerability scans, mitigating vulnerabilities identified in penetrationtesting, and implementing preventative measures to protect against cyber threats. You will monitor the security infrastructure, detect and respond to potential threats, mentor and develop the IT security … SSO Manage MDM/MAM and Conditional Access Manage security certificates and keys Manage IDS and IPS Manage PAM systems Deliver Cyber Security Awareness Training Remediate vulnerabilities identified during penetrationtesting Handle ad-hoc IT security projects Experience - Essential The successful candidate will have good working knowledge and experience with the following technology stack: CrowdStrike EDR Mimecast Mail … Menlo Web Security Gateway KnowBe4 Digicert Certificates and Microsoft Certificate Services Ivanti or Automox patching AppCheck or Tenable WAS Desired Education: CISM, MS SC100, 200, 900, OSCP or other penetrationtesting qualifications. Industry: Financial services, SOC, Pentesting is desirable Personal Skills: Excellent interpersonal, written, and verbal communication skills Ability to handle multiple priorities, tasks, and projects simultaneously Clear More ❯
Security Control Assessor Test Engineer (SCATE) Level 4 LV8D Solutions is looking for a Security Control Assessor Test Engineer (SCATE) to support red team/penetration tester activities in Step 4 of the Risk Management Framework (RMF) process to help ensure the secure operations of critical mission systems. This SCATE is an individual contributor and member of a team … 10+ years of relevant experience Clearance: TS/SCI with CI Polygraph Requirements/Responsibilities: Experience evaluating systems and recommending changes to improve the systems' security posture Experience in penetrationtesting, red team, system/network configuration, and familiarity with different operating systems and virtualization platforms Willingness to obtain an associated certification such as CEH, PenTest, OSCP, OSCE … tools Experience using computer and network forensics techniques Knowledgeable in hardening techniques Experience in network and web related protocol analysis Experience using industry standard security scanning tools Perform security testing in conjunction with the Security Control Assessment (SCA) team to achieve ATO (Authorization to Operate) Perform application security testing on mission critical IC systems Identify and analyze anomalies More ❯
enterprise information security and in-depth knowledge of standards including Cyber Essentials, ISO 27001, 27002 etc., Data Protection Act and the General Data Protection Regulation. Good understanding of security testing principles, including experience of penetrationtesting, identifying, resolving and reporting risks. Technical security experience with the following - Microsoft core OS; Networking; Security operations; Penetrationtesting … Security. Propose changes to existing policies and procedures to ensure operating efficiency and regulatory compliance. Identifying security non-conformities, patching or reconfiguring systems to resolve issues and building and testing new security technologies. Research and propose appropriate security solutions. Design, co-ordinate and manage security testing procedures to verify the security of systems, networks and applications, and manage More ❯
clearly to both technical and non-technical audiences and hold strong team ethos that encourages diversity. IT WOULD BE GREAT IF YOU ALSO HAD ANY Experience of conducting control testing, technical reviews or audits to understand cyber compliance needs aligned to technical and regulatory standards. Experience of cyber risk management, security frameworks (NIST, ISO27001) cyber compliance, assurance, and attestation … work. Exposure to facilitating penetrationtesting, security risk assessments, driving the remediation of cyber vulnerabilities and remediating or mitigating cyber risks. Experience of security testing services e.g., penetrationtesting, ZAP testing, Burp Suite, Attack & Breach simulation, or similar. Knowledge of emerging threats e.g. Quantum, AI and Digital Ledger Financial Services Regulation and Payments Scheme More ❯
with engineers and information security teams to address security risks and provide mitigation recommendations within the Software Development Lifecycle (SDLC). Support security assurance audits of our Product Security testing to help internal and external customers navigate and validate security compliance. Perform activities such as security testing reviews with teams, product demos and trainings, and building documentation to … embedded into their SDLC. Regularly interact with internal and external customers on security-related projects and operational tasks. Design, build and deploy automation to scale the orchestration of security testing across all TWDC applications and platforms. Must Have: Minimum 3+ years of experience in cybersecurity, application security, or related information technology disciplines. Programming/scripting skills with a language … as Python to automate work. Proven experience collaborating with teams on security and building trust through delivery and data. Strong understanding of at least two of the following security testing principles and practices, such as SAST, SCA, DAST, API, Mobile and Penetration testing. Excellent communication and collaboration skills. Ability to work in a fast paced, dynamic environment. Nice More ❯
clearly to both technical and non-technical audiences and hold strong team ethos that encourages diversity. IT WOULD BE GREAT IF YOU ALSO HAD ANY Experience of conducting control testing, technical reviews or audits to understand cyber compliance needs aligned to technical and regulatory standards. Experience of cyber risk management, security frameworks (NIST, ISO27001) cyber compliance, assurance, and attestation … work. Exposure to facilitating penetrationtesting, security risk assessments, driving the remediation of cyber vulnerabilities and remediating or mitigating cyber risks. Experience of security testing services e.g., penetrationtesting, ZAP testing, Burp Suite, Attack & Breach simulation, or similar. Knowledge of emerging threats e.g. Quantum, AI and Digital Ledger Financial Services Regulation and Payments Scheme More ❯
Senior, FIPS 140 Security Engineer & CVP Certified Tester Work model: REMOTE Department: FIPS/Testing Location: Columbia, MD Role Type: Contract No Clearance Required Not available on C2C basis Not able to provide sponsorship About Our Client Our client offers an exciting opportunity to work in the rapidly expanding IT Security field, integral to supporting national defense initiatives. This … security analysis and product architecture review to hands-on vulnerability and physical security testing. You will apply your technical expertise to conduct system-level logical analysis, rigorous cryptographic algorithm testing, and detailed source code reviews, all while ensuring products meet stringent security standard requirements. This role offers the opportunity to directly contribute to securing critical communication systems for national … defense, providing an impactful career in a growing industry. You will collaborate closely within a team environment, sharing knowledge with experts, and your work will involve not only testing but also the development of applications and automation scripts to enhance testing capabilities, culminating in precise technical report writing. The ideal candidate is passionate about cybersecurity, cryptology, and ensuring More ❯
/systems required to meet operational needs. • Devise new techniques by applying technical capabilities in innovative scenarios. • Provide technical feedback to ongoing development activities. DESIRED SKILLS • Prior experience in penetrationtesting, red team operations, incident response or computer forensics. • Experience with wireless communications protocols and technologies, including cellular, Wifi and bluetooth • Previous overseas travel experience, including engaging with … sound judgment, good administrative and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetrationtesting or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA More ❯
like SAST and DAST deployments. Provide technical support with risk assessments on PHI, and steering improvements to our environment in line with common standards such as NIST. Support External PenetrationTesting and application vulnerability efforts, delivering assessments and prioritizing remediation activities across the organization. Be across Threat Intelligence relevant to our industry and geographic regions, and translating that … with our technology teams. Who You Are - some of the essential things required to be successful in the role At least 4 years' experience in securing software or infrastructure, penetrationtesting or pure product or application security Strong expertise in offensive security techniques and methodologies, including ethical security testing Deep understanding of secure coding practices, common vulnerabilities More ❯