Join our dynamic Offensive Security Team! As we expand, we are looking for a Pentester/Red Teamer who is enthusiastic about undertaking a range of security assessments, including penetrationtesting, red team exercises, vulnerability scanning, and physical access evaluations for our clients. Key Responsibilities: Client Engagement Management: Lead client projects, ensuring clear communication, timely delivery, and exceeding … expectations. Act as the primary liaison, providing updates and guidance. Security Assessment Execution: Conduct detailed security assessments, including penetrationtesting and vulnerability analysis. Systematically identify and document vulnerabilities across network, application, and physical layers. Prepare concise reports for both technical and non-technical stakeholders. Red Team Challenges: Participate in red team simulations, encompassing social engineering attacks and advanced … penetration tactics. Post-initial access, perform internal testing to escalate privileges and gain high-level access. Document methodologies and outcomes, providing actionable insights for enhancing security. Technical Proficiencies: Python/Scripting: Demonstrate a high level of proficiency in Python, essential for writing custom scripts to automate tasks, analyze data, and develop unique tools for penetration testing. This More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive … environment for all our employees. If you require accommodations during the application process, let us know, and we'll work to meet your needs. What You'll Do • Conduct penetration tests across various environments, including web applications, APIs, Cloud, and network infrastructure. • Issue detailed reports outlining findings, risks, and recommendations for remediation. • Translate complex technical findings into actionable insights … engagements, as needed. What We're Looking For • Certifications: Relevant certifications such as CREST CRT, CREST CCT, OSCP, OSWE, OSCE, or equivalent level. • Experience: At least two years in penetrationtesting, covering network, web, and internal tests and customer engagements. • Tools: Proficiency with tools like Burpsuite Pro, Nessus, and other industry standards. • Communication: Strong verbal and written skills More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Oracle
assessments and vulnerability research across a broad range of on-premise software, cloud services and infrastructure Perform in-depth security assessments using results from static and dynamic analysis Create testing tools to help teams identify security-related weaknesses Collaborate with teams to help them triage and fix security issues What You’ll Bring Bachelor’s or Master’s degree … in Computer Science or related field (e.g. Electrical Engineering) 7+ years industry experience in one or more of the following areas: software/product security assessments, penetrationtesting, red teaming, web application assessments Aptitude for self-study, setting and achieving long term goals (for example, learning an unfamiliar programming language) Ability to effectively assess and communicate risks and … iOS/Android), Reverse Engineering (e.g. IDA Pro/Ghidra/Radare2), Fuzzing (e.g. Jazzer/AFL/Peach), Web Application assessment (e.g. Burp Suite Proxy, ZAP, REST API testing) Proficiency in manual penetrationtesting in at least TWO or more of the following areas - Mobile, API, Infrastructure, OS, Web Application Knowledge of common vulnerabilities in different More ❯
cloud infrastructure using Infrastructure as Code principles Establish and maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in … Deep understanding of cloud security best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure Strong communication skills with ability … collaborate on security requirements across teams Track record of building secure and compliant DevOps practices Desired Skills Experience with quality management systems in medical device software development Experience of penetrationtesting Background in implementing Agile methodologies Experience of startup environments More ❯
cloud infrastructure using Infrastructure as Code principles Establish and maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in … Deep understanding of cloud security best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure Strong communication skills with ability … collaborate on security requirements across teams Track record of building secure and compliant DevOps practices Desired Skills Experience with quality management systems in medical device software development Experience of penetrationtesting Background in implementing Agile methodologies Experience of startup environments More ❯
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
cloud infrastructure using Infrastructure as Code principles Establish and maintain security controls and monitoring systems aligned with ISO27001 requirements Build and maintain CI/CD pipelines with integrated security testing and compliance checks Implement automated security scanning and vulnerability management processes Develop and maintain disaster recovery and backup solutions for critical systems Configure and manage secure cloud environments in … Deep understanding of cloud security best practices and implementing Zero Trust architecture Experience with healthcare compliance requirements (ISO27001, ISO13485, HIPAA) and security controls Proven track record implementing automated security testing and vulnerability management Strong knowledge of monitoring and observability tools (Azure Monitor, Application Insights) Experience implementing secure networking and identity management solutions in Azure Strong communication skills with ability … collaborate on security requirements across teams Track record of building secure and compliant DevOps practices Desired Skills Experience with quality management systems in medical device software development Experience of penetrationtesting Background in implementing Agile methodologies Experience of startup environments More ❯
London, England, United Kingdom Hybrid / WFH Options
WeDo
You’re walking into a mature environment : The company already has Secure SDLC and DevSecOps practices in place. This isn’t a ground-up build – it’s about stress-testing and strengthening what’s already built. You’ll have impact and visibility : Reporting to the CIO , with close collaboration with the Head of Information Security (compliance), you’ll shape … You’ll Be Doing: Actively identifying vulnerabilities in applications, especially around authentication flows, payments, and sensitive data handling Thinking creatively and adversarially – “breaking the app” to protect it Performing penetrationtesting, threat modelling, and secure code reviews Working directly with developers to integrate security best practices into an already-operational DevSecOps pipeline Advising on product and architectural design … culture that prioritises customer trust and system integrity What We’re Looking For: Deep hands-on experience in application security – not just theory, but experience in secure coding, manual testing, and fixing complex vulnerabilities A proven background in credit cards, payments, or financial transaction systems Understanding of modern application architectures (APIs, microservices, cloud platforms – likely Azure) Familiarity with OWASP More ❯
security frameworks across multiple businesses. What You’ll Do Develop and implement end-to-end security strategies for IoT platforms and internal systems. Conduct risk assessments, vulnerability scans, and penetration tests. Align infrastructure security with broader group-level frameworks. Embed security into development lifecycles (IaaS and PaaS). Provide training and guidance to internal teams on security best practices. … tools. What You Bring Strong background in IoT security and cloud infrastructure (especially Azure). Experience with cybersecurity frameworks (e.g., ISO 27001, NIST). Hands-on with security tools, penetrationtesting, and compliance. Excellent communication and collaboration skills. Certifications like CISSP, CEH, or AZ-500 are a plus. Why Join Be part of a mission-driven, global company More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
5+ years with ForgeRock IAM stack: PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetrationtesting, threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure architecture Completion of More ❯
5+ years with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetrationtesting , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure architecture Completion of More ❯
City of London, London, United Kingdom Hybrid / WFH Options
JCW
5+ years with ForgeRock IAM stack : PingGateway, PingAM, PingIDM, PingDS Advanced cloud security knowledge (AWS CLI, security controls, policies) Strong experience with PKI, HSMs, certificate lifecycle management Proficiency in penetrationtesting , threat modeling, and vulnerability management Automating security with GitLab CI/CD, Chef, AWS CLI Collaborating with CISO, engineering, and product teams on secure architecture Completion of More ❯
cyber threat intelligence. Managing vulnerabilities, nation-state threats, ransomware transformation, and automated security controls. Building a resilient cybersecurity culture within the organization to combat cyber threats. Micromanaging cybersecurity engineers, penetrationtesting engineers, cyber architects, and other related roles. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilizing necessary equipment to perform the job. ENVIRONMENT More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
security into daily operations. Requirements: 5+ years of hands-on experience in InfoSec Strong grasp of security principles, best practices, and system hardening techniques. Solid experience with threat modeling, penetrationtesting, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR More ❯
South East London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
security into daily operations. Requirements: 5+ years of hands-on experience in InfoSec Strong grasp of security principles, best practices, and system hardening techniques. Solid experience with threat modeling, penetrationtesting, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR More ❯
to Methodically Find Faults and perform Root Cause Analysis • Able to evaluate multiple courses of action, achieving goals by non-standard means if necessary • System Regression • Protocol Analysis • Load Testing • Availability and Resilience Optimisation • Lockdowns and Basic PenetrationTesting Technologies • Operating Systems and Virtualisation (Windows and Linux) • Infrastructure as Code and Operational Automation (e.g. Terraform, Ansible) • Message More ❯
review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetrationtesting knowledge is also super useful •Familiarity with Cloud Development Kit (CDK) and GitOps •Experience operating in a DevOps/agile team environment •Understanding of docker, Kubernetes, serverless More ❯
review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetrationtesting knowledge is also super useful •Familiarity with Cloud Development Kit (CDK) and GitOps •Experience operating in a DevOps/agile team environment •Understanding of docker, Kubernetes, serverless More ❯
review skills – essential •Ability to identify vulnerabilities using CWE or OWASP •Knowledge of operating systems and their hardening techniques •Understanding of development concepts such as CICD, Pipelines, and SDLC •Penetrationtesting knowledge is also super useful •Familiarity with Cloud Development Kit (CDK) and GitOps •Experience operating in a DevOps/agile team environment •Understanding of docker, Kubernetes, serverless More ❯
and services that align with strategic needs, negotiating as necessary. Develop and implement security awareness training programs for employees to promote best practices and cultivate a vigilant workforce. Oversee penetrationtesting and vulnerability scanning to identify and remediate security vulnerabilities promptly. Data Privacy: Establish and maintain programs to ensure data handling, storage, and access comply with relevant privacy More ❯
Redhill, Surrey, United Kingdom Hybrid / WFH Options
FPSG
Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetrationtesting, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist More ❯
Lead, Cyber Security Lead, Information Security Consultant, Information Security Specialist, Security Subject Matter Expert, Senior Security Engineer, DevSecOps, CISSP, CISM, CEH, OSCP, GIAC, SABSA, SANS, TOGAF, SAFE, Scrum, Agile, penetrationtesting, Cloud We are Disability Confident and neurodiverse aware. If you have a disability, please tell us if there are any reasonable adjustments we can make to assist More ❯
to reduce risk and effort Practical experience working collaboratively with Engineering and IT teams to investigate, resolve, and prevent security issues Familiarity with application security principles, with exposure to penetrationtesting or ethical hacking (CEH or similar certification is a plus) Awareness of industry frameworks like ISO 27001, CIS, or similar, and ideally holding a CISMP certification A More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
Best Company To Work For in the UK, Tech and the South East in 2023. We are ISO27001 and ISO9001 Certified by UKAS. We are also a CREST approved penetrationtesting and SOC company, IASME Cyber Essentials Certification body and Cyber Essentials Plus certified. Find out more about our awards here: Why work for FSP? At FSP, we More ❯