applied knowledge within relevant area. Apply link Copy link Bachelor's degree or equivalent practical experience. 5 years of experience in cybersecurity, with an offensive security (e.g., Red Teaming, PenetrationTesting, or Adversary Simulation) or threat modeling. Experience in a Security Operations Centre (SOC) or similar environment, with modern threat landscapes and attack techniques. Experience in technical troubleshooting … cluster configuration, workload hardening, and threat detection in containerised environments. Experience in building or maturing security culture initiatives, including awareness programs, gamified training, or executive engagement. Experience with security testing tools and frameworks (e.g., MITRE ATT&CK, Cobalt Strike, Metasploit, Burp Suite, or similar). About the job The UK Security Operations (SecOps) team in Google Public Sector delivers More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetrationtesting, vulnerability assessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
83zero Ltd
line with ITIL processes Monitor and enhance network security controls including web security gateways, NAC, endpoint security, and perimeter defense Contribute to internal reviews, security audits, vulnerability assessments, and penetrationtesting Support firewall rule changes, VPN access, network segmentation, and performance improvements Participate in on-call rotation for high-priority issues and assist during major incidents Create and More ❯
Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetrationtesting basics Qualifications: Working towards or holding certifications such as SC-200, SC-900, OSCP, or similar. Strong communication skills and an eagerness to learn and grow. Experience More ❯
of SOC and security services managed through the IT function and external partners. Embed secure-by-design and privacy-by-design principles across IT and product teams; oversee SDLC, penetrationtesting, and coordinated disclosure. Direct 24 7 SOC operations, threat hunting, red/blue teaming, and crisis response through internal and external teams. Collaborate with data and legal More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Pardoe Wray
Join a leading Cyber Security provider, established in early 2018 and rapidly growing in the UK. They specialize in a wide array of security services including PenetrationTesting, Cloud Security, Continuous Security Testing, Adversarial Emulation, End Point Detection and Response, Backup & Restore solutions, and more. Role: Graduate Sales Development Representative Location: Newcastle or Leeds Responsibilities: Learn and More ❯
all things security management-able to "pull the plug" on a feature, application, or other business function if it presents a significant risk to the company. You will: Conduct penetration tests against web applications infrastructure Validate security on new hardware and software infrastructure Assist front-line company representatives with security questions Manage firewall rules and internal pentesting Manage SOC … pentesting Manage priorities through backlog management system (Jira) Come to work, do great things, then go home! What You Need to Get the Job Done 3+ years experience performing penetrationtesting (against web applications) Experience securing cloud-based infrastructures and solutions Previous experience working on an information security team Advanced knowledge of common security vulnerabilities (OWASP) and best More ❯
implemented. Investigate and respond to security incidents and queries, coordinating with relevant teams. Continuously monitor IT infrastructure for vulnerabilities, anomalies, and other potential security issues. Plan and coordinate external penetration tests to identify and address security weaknesses. Compile and deliver regular reports (monthly and quarterly) on the organisation's security status and risk landscape. Manage and maintain content on … Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetrationtesting and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are an advantage Solid hands-on experience managing and administering SIEM platforms for threat detection and incident More ❯
IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerability scanning, and penetrationtesting of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and compliance teams to More ❯
IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerability scanning, and penetrationtesting of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and compliance teams to More ❯
lifecycle. You'll help establish a robust security culture as we unlock Granola for the next 100x users. In this role, you will: Conduct security assessments, code reviews, and penetrationtesting to identify vulnerabilities in our applications Design and implement security tools, frameworks, and methodologies to protect against security threats Work closely with development teams to ensure secure More ❯
written and verbal communication - able to simplify complex concepts for clients Confident producing clear documentation and reporting Desirable Skills: Certifications: Security+, SC-200, CEH, ISO 27001 Lead Implementer, PCIP Penetrationtesting or red teaming exposure Experience with SIEM/SOAR platforms (e.g., Microsoft Sentinel) Familiarity with MSP toolsets (Autotask, IT Glue, Rewst) or automation experience Personal Attributes: Friendly More ❯
written and verbal communication - able to simplify complex concepts for clients Confident producing clear documentation and reporting Desirable Skills: Certifications: Security+, SC-200, CEH, ISO 27001 Lead Implementer, PCIP Penetrationtesting or red teaming exposure Experience with SIEM/SOAR platforms (e.g., Microsoft Sentinel) Familiarity with MSP toolsets (Autotask, IT Glue, Rewst) or automation experience Personal Attributes: Friendly More ❯
/7 shift-based role) Desirable Qualifications and Experience Experience in a client-facing technical or consulting role Background in one or more of the following areas: SOC, Pen Testing, InfoSec, Networking, Systems Administration Knowledge of cybersecurity concepts including BGP, WAF, and CDN Familiarity with cloud platforms (AWS, Azure, GCP) Scripting abilities (e.g., Python, Bash) for automation or data More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Harnham - Data & Analytics Recruitment
approaches Excellent communication skills with ability to influence technical and executive stakeholders Preferred Background Experience in software or SaaS environments Previous consulting/advisory roles Technical background in engineering, penetrationtesting, or security operations More ❯
Cyber Security Assessments and audits across Microsoft 365 and Azure environments Performing Cyber Essentials and Cyber Essentials PLUS audits in line with IASME standards Delivering vulnerability assessments, remediation, and penetrationtesting across infrastructure, networks, and applications Contributing to client reporting, assurance audits, and scoping security solutions Acting as an escalation point for security-related technical queries and pre More ❯
Vulnerability Management/SOC Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of SOC/Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting More ❯
part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve. BASIC QUALIFICATIONS Extensive experience performing security investigations, penetrationtesting, and/or incident response in the context of large organizations. In-depth understanding of security threats, hands-on experience detecting and defending from cyber attacks, and More ❯
engineering practices. In this role you will be responsible for: Advising clients on complex cybersecurity issues and building robust solutions collaboratively Performing risk and threat analyses, as well as penetration tests to uncover vulnerabilities Supporting internal and client teams with best practices for secure system and process development Facilitating workshops and security training sessions across interdisciplinary teams Clearly communicating … with developers, product owners, and stakeholders This role is remote in Germany with occasional travel to client site Essential: Professional experience in a similar role such as Security Engineer, Penetration Tester, DevSecOps etc. Knowledge of the following areas: PenetrationTesting, Threat Modelling, Application Security, Security by Design etc. Solid understanding of software development and system architecture basics More ❯