place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication and Reporting. Leadership and Team Accountability. Skills & Experience Mininum of … Defender. In-depth knowledge of security frameworks and compliance standards, such as ISO 27001, NIST, GDPR, and PCI-DSS. Experience in coordinating or conducting penetrationtesting, red teaming, and handling security incidents. Experience with managing security projects and teams. Interview Process Recruiter Call Hiring Manager Intro Final Interview More ❯
london, south east england, united kingdom Hybrid / WFH Options
Merlin Entertainments
place to protect critical systems and data. Responsibilities Develop and implement Vulnerability Management Strategy. Lead Threat Intelligence and Threat Modelling. Oversee Vulnerability Assessments and Penetration Testing. Collaborate on Security Incident Response. Ensure Compliance with Security Standards. Stakeholder Communication and Reporting. Leadership and Team Accountability. Skills & Experience Mininum of … Defender. In-depth knowledge of security frameworks and compliance standards, such as ISO 27001, NIST, GDPR, and PCI-DSS. Experience in coordinating or conducting penetrationtesting, red teaming, and handling security incidents. Experience with managing security projects and teams. Interview Process Recruiter Call Hiring Manager Intro Final Interview More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
RSM UK
for you! We value diverse experiences and perspectives. Here's what we're looking for in our ideal candidate: Experience delivering offensive security and penetrationtesting engagements. Experience of delivering and leading cyber security advisory and offensive security testing engagements in a professional services context. Understanding of … technology trends, cyber threats, and industry issues. Excellent written and oral communication, report writing, and presentation skills. Experience of executing security testing techniques such as threat modelling, reconnaissance, social engineering, enumeration, attack path mapping, exploitation, and clean up from a variety of adversarial perspectives (white/grey/black … box testing). What we can offer you: We recognise that our people are our most important assets. That's why we offer a flexible reward and benefits package that will help you have a fulfilling experience, both in and out of work. Hybrid working 26 Days Holiday Lifestyle More ❯
Basingstoke, Hampshire, United Kingdom Hybrid / WFH Options
Corriculo Ltd
mail filtering, and other security products Experience with Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So More ❯
implementation in GCP. In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetrationtesting tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/CD pipelines More ❯
nation-state threats, ransomware transformation, and automated security controls. Building a resilient cybersecurity culture within the organization to combat cyber threats. Micromanaging cybersecurity engineers, penetrationtesting engineers, cyber architects, and other related roles. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilizing necessary equipment More ❯
or risks. Collaborate with engineering teams to embed secure coding practices and tackle vulnerabilities. Manage security assessments, audit responses, and incident investigations. Run regular penetrationtesting, disaster recovery simulations, and security awareness training. Streamline access controls, onboarding/offboarding processes, and device compliance using SSO/SCIM and More ❯
london, south east england, United Kingdom Hybrid / WFH Options
Inara
or risks. Collaborate with engineering teams to embed secure coding practices and tackle vulnerabilities. Manage security assessments, audit responses, and incident investigations. Run regular penetrationtesting, disaster recovery simulations, and security awareness training. Streamline access controls, onboarding/offboarding processes, and device compliance using SSO/SCIM and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Gold Group Limited
party security providers. Prepare reports on security incidents and recommend improvements. Develop threat intelligence relevant to the business. Conduct threat hunting, vulnerability analysis, and penetrationtesting to identify risks. Continually assess security systems, suggesting appropriate tools and countermeasures. Prepare and maintain security and incident response documentation. Collaborate with More ❯
team. Define, document, and maintain operational processes. Ensure the effective support and maintenance of security systems used by the team. Run vulnerability management and penetrationtesting programs. Develop and implement strategies to enhance the scope and capability of the Security Operations function. Set and measure KPIs for the More ❯
team. Define, document, and maintain operational processes. Ensure the effective support and maintenance of security systems used by the team. Run vulnerability management and penetrationtesting programs. Develop and implement strategies to enhance the scope and capability of the Security Operations function. Set and measure KPIs for the More ❯
and engineers from non-traditional backgrounds through one-on-one mentoring and thorough, but kind, code reviews. BASIC QUALIFICATIONS • Extensive experience performing security investigations, penetrationtesting, and/or incident response in the context of large organisations. • In-depth understanding of security threats, hands-on experience detecting and More ❯
experience, including Cloud Identity & Access Management (IAM) and solutions (e.g. SailPoint) Data Loss Protection and Data protection Security assessments related to threat, vulnerability and penetrationtesting (e.g. MITRE, CBEST, Tiber) What we look for We look for candidates with experience in the industry, that can prove their knowledge More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
FSP Retail Team
in the UK, Tech and the South East in 2023. We are ISO27001 and ISO9001 Certified by UKAS. We are also a CREST approved penetrationtesting and SOC company, IASME Cyber Essentials Certification body and Cyber Essentials Plus certified. Find out more about our awards here: Why work More ❯
When we feel supported in the workplace and at home, there's nothing we can't achieve. Minimum Requirements Extensive experience performing security investigations, penetrationtesting, and/or incident response in the context of large organisations. In-depth understanding of security threats, hands-on experience detecting and More ❯
manchester, north west england, United Kingdom Hybrid / WFH Options
Senitor Associates
and application landscapes. What you’ll need: 3+ years in a security architecture or cyber consulting role Deep knowledge of enterprise security services – Pen Testing, Threat Modelling, Logging, Vulnerability Mgmt, and Incident Response Proven ability to produce secure design templates and influence technical direction Excellent communication, stakeholder management, and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Apacheix
and able to produce a security documentation including; Security Architecture Documents, RMADS and SyOPs Advising on suitable methods of assessing cyber security e.g. Pen Testing Providing assurance on effective cyber security implementation Developing incident response plans to security breaches, and provide crisis management support to help respond to incidents More ❯
delivery (CI/CD) pipelines, ensuring rapid, secure, and reliable deployment of JavaScript applications. Develop and maintain automated security tools for static code analysis, penetrationtesting, and threat modelling. Implement real-time monitoring, alerting, and response strategies for security incidents. About You: Strong proficiency in Cloud Environment ideally More ❯
and the ability to clearly identify key issues. Desirable: CISSP, CISM or other equivalent foundational security qualifications or experience. CEH, OSCP, GIAC or other penetrationtesting security qualifications or experience. SABSA, SANS or other technical architecture qualifications. SAFE, Scrum, or other Agile methodology experience. Data Protection, Risk, Legal More ❯
logical accreditations, education, awareness and training, assurance, and cyber security. BASIC QUALIFICATIONS Degree or Equivalent experience in a technical field. Experience performing security investigations, penetrationtesting and/or incident response in the context of large organisations. Understanding of security threats, hands-on experience detecting and defending from More ❯
Experience with cloud, endpoint, and infrastructure securityproducts. (Desirable - m365, Lacework, Snyk, Defender, ForcePoint). Recognised cyber security certifications or qualifications desirable. Offensive security experience, penetrationtesting etc. desirable. Proven track record of providing successful support in the field and of enabling and facilitating a culture of continual improvement More ❯
measures that are "secure-by-design" and "secure-by-default." This engineering excellence has driven ControlPlane deeper into cybersecurity providing services like threat modelling, penetrationtesting, and supply chain security to ensure robust protection against cyberattacks in containerised and cloud-native environments. We are acclaimed for our contributions More ❯
Knutsford, Cheshire, North West, United Kingdom Hybrid / WFH Options
Eteam Workforce Limited
the life cycle, from data ingestion to model deployment. Skills and Qualifications: Security Expertise: Strong understanding of cybersecurity principles, threat modelling, vulnerability assessment, and penetration testing. Cloud Computing: Familiarity with cloud platforms (AWS, Azure, GCP) and their security features. Data Privacy and Compliance: Knowledge of data privacy regulations (GDPR More ❯
the cloud 5+ years of experience in application security with any combination of the following: threat modeling experience, secure design reviews, code reviews, pen-testing Expertise in multiple security domains such as identity management and authentication, cryptography, networking, web protocols. PREFERRED QUALIFICATIONS Experience with EC2 AWS products and services More ❯