it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security PenetrationTesting Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management More ❯
equivalent in Computer Science or IT related discipline is desirable Any exposure to Security Standards (PCI or ISO) Involvement in Audits or Compliance Enforcement PenetrationTesting experience (Kali Linux) Experience supporting site-to-site VPNs Network design, VLANs, routing, NAT Creation of PCI digital keys or security access More ❯
into more technical security work, focusing on cloud environments, or gaining recognised certifications to deepen your expertise - with potential development pathways ranging from Pen Testing through to Compliance, it's safe to say the the world is your oyster. The team get together once a week in the Chorley More ❯
tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software. We're looking to grow our team of penetration testers in the UK. We test web and mobile applications, computer networks, cloud infrastructure, hardware devices, security awareness through social engineering, organizations through red … and deliver projects for our clients, large and small, across Europe and North America. You will perform various web application, API, mobile, and infrastructure penetration tests. You will also draft reports based on the assessment results and gathered evidence and help address client inquiries regarding these results. In addition … security assessments, you will participate in their refinement and improvement. In summary, you will: Execute offensive security and consultative engagements for our clients by testing their applications and infrastructure Author deliverables, such as technical and executive reports Engage with our clients to understand their requirements, update them on project More ❯
focused on enterprise clients. Proven track record of managing strategic relationships with enterprise organizations. Deep understanding of the cybersecurity landscape, vulnerability management, and security testing methodologies. Experience with enterprise security programs, compliance frameworks (ISO 27001, SOC 2, GDPR, etc.), and risk management. Strong business acumen and ability to translate … presentation, and negotiation skills. Ability to travel up to 15% of the time to meet with strategic clients. Preferred Experience in bug bounty programs, penetrationtesting, or vulnerability management platforms. Background in cybersecurity consulting or professional services. Experience with enterprise security tools and technologies. Certifications such as CISSP More ❯
Familiarity with security frameworks like NIST, OWASP, and industry-specific standards, such as FDA cybersecurity guidelines Experience in assessing and managing security risks through penetrationtesting, threat modeling, and other methods Knowledge of compliance standards such as ISO 27001, HIPAA, GDPR, and others, with an understanding of Quality … security risk assessments and recommend solutions tailored to both technical and business objectives Provide guidance on best practices for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed More ❯
Familiarity with security frameworks like NIST, OWASP, and industry-specific standards, such as FDA cybersecurity guidelines Experience in assessing and managing security risks through penetrationtesting, threat modeling, and other methods Knowledge of compliance standards such as ISO 27001, HIPAA, GDPR, and others, with an understanding of Quality … security risk assessments and recommend solutions tailored to both technical and business objectives Provide guidance on best practices for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and … mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So More ❯
Security reviews for new products, technologies, and services Secure design, architecture, and implementation Secure development life-cycle (SDLC) practices including threat modeling and security testing Influence decision-makers and stakeholders to achieve a consistently high security bar Conduct network and/or application penetrationtesting Create security More ❯
Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetrationtesting, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them More ❯
AN ABSOLUTE MUST. In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetrationtesting tools. Experience with Wiz and its integration for continuous security monitoring in GCP environments. Strong experience with infrastructure-as-code (IaC) using More ❯
application security industry experience with at least four of the following: threat modeling experience, secure coding, identity management and authentication, Web Application Security, cryptography, penetrationtesting, cloud security, mobile security, and network security Intimate knowledge and understanding of security engineering, web application security, system and network security, authentication More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Experis UK
since 2003 and our focus has always been on excellence in cyber security. We have teams that offer world class services in red teaming, penetrationtesting, threat intelligence, research and development, detection and response, governance, risk, and compliance, and plenty more. Our business is global and so are More ❯
with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
defined networking, routing, virtual private networks, load balancers, and firewalls. Experience with security concepts such as encryption, identity management, access control, attack vectors, and penetration testing. Excellent presentation, communication, and interpersonal skills. Ability to travel to customer sites as needed. Benefits Medical, Dental, Vision PTO Pension Professional Development Macbook More ❯
the cloud 5+ years of experience in application security with any combination of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services More ❯
operations, vulnerability management, Third Party supplier Risk Management, application security, physical security. Good knowledge of networking (switching, routing, firewalls) A good understanding of security testing and vulnerability management is important (including pen testing/ITHC, CVSS/CVE) Experience working with security standards such as ISO More ❯
Code principles Establish and maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and … best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure … teams Track record of building secure and compliant DevOps practices Desired Skills Experience with quality management systems in medical device software development Experience of penetrationtesting Background in implementing Agile methodologies Experience of startup environments More ❯
Code principles Establish and maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and … best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure … teams Track record of building secure and compliant DevOps practices Desired Skills Experience with quality management systems in medical device software development Experience of penetrationtesting Background in implementing Agile methodologies Experience of startup environments More ❯
or immigration status, employment history going back 3 continuous years, unspent criminal record check (known as Disclosure and Barring Service). Your role IoT Testing ensuring the device connectivity and security. Your skills and experience Candidate should have 5 8 years experience in QA testing role in embedded … and IoT products. Understanding embedded systems, IoT protocols (MQTT, CoAP, HTTP), and cloud integration. Testing hardware, firmware, and performance of IoT devices. Verifying communication protocols (Wi-Fi, Zigbee, Bluetooth) and network coverage. Ensuring secure authentication, data encryption, and penetrationtesting for IoT devices. Conducting security tests on … devices, ensuring data privacy and vulnerability assessments. Verifying data integrity, synchronization, and handling of big data in IoT systems. Knowledge of writing & automating IoT testing scripts and integrating with CI/CD pipelines (optional). Knowledge of cloud platforms like AWS IoT, Azure IoT for cloud-IoT device integration. More ❯
Publications (JSP) such as JSP 440, 604 and Defence Standards (Def stans) Produce security documentation like RMADS, Security Assurance Document, Security Management Plan Conduct penetrationtesting, vulnerability assessments and remediation activities Your skillset may include: Understanding and application of risk management frameworks and methodologies (e.g., ISO 27001/… NIST 800-53) Working knowledge of Defence Standards (e.g., JSPs, HMG, Def Stan 05-138, Def Stan 05-139) Experience with security testing tools, technologies and techniques If this all sounds like something you will be interested in then simply apply and we can discuss the opportunity further! Product More ❯