on prevailing (sometimes conflicting) evidence. Support and manage budget Responsibility Responsibility of information security incident management Responsibility for security assessments and assurance activities (e.g. penetrationtesting) and when to use them. Oversee and management of security compliance management and reporting in relation to any relevant regulatory or legal More ❯
on prevailing (sometimes conflicting) evidence. Support and manage budget Responsibility Responsibility of information security incident management Responsibility for security assessments and assurance activities (e.g. penetrationtesting) and when to use them. Oversee and management of security compliance management and reporting in relation to any relevant regulatory or legal More ❯
Security analyst to join their growing and dedicated team in providing some the UKs largest organisations with a range of services such as, pen testing, major incident response, digital forensics, and more. This is a great opportunity for an individual to further their security career in a focused environment More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
YourCode Recruitment
. Nice-to-Have Skills: Hands-on experience with SIEM, Google Cloud, and advanced endpoint security solutions. Proficiency in PowerShell scripting, patch management, and penetration testing. Experience with Azure conditional access policies. Understanding of PKI, including Active Directory-integrated certification management. Relevant industry certifications such as ITIL, MCSA, or More ❯
courses of action, achieving goals by non-standard means if necessary. System Regression. Protocol Analysis. Load Testing. Availability and Resilience Optimisation. Lockdowns and Basic Penetration Testing. Technologies: Operating Systems and Virtualisation (Windows and Linux). Infrastructure as Code and Operational Automation (e.g. Terraform, Ansible). Message Queueing and Streaming More ❯
using a risk-based approach with a focus on following areas Automation of security controls, security hardening of the developer and IaC processes (building, testing, release), supply chain security (part of the build process), related metrics and monitoring/audits Network, VM & container image and system hardening, Cloud issues … and misconfigurations Endpoint Security, Infrastructure Identity and Access Management, SIEM, Threat intelligence, common misconfigs (DNS, email, networking, etc.) Organising and performing penetrationtesting of our infrastructure, and collaborating with external parties on those tests. Picking tools, methods and approaches to maintain and improve the security stance of the More ❯
or AWS Write clean, maintainable code following best practices and team standards Participate in code reviews and contribute to improving development processes Implement robust testing strategies and maintain high code quality Collaborate with Data Science and Delivery teams to understand and deliver business requirements Apply security-first development practices … with healthcare technology and regulatory requirements (ISO13485, ISO27001) Desired Skills: Experience in building mobile apps Experience working in a healthcare technology company Experience of penetrationtestingMore ❯
or AWS Write clean, maintainable code following best practices and team standards Participate in code reviews and contribute to improving development processes Implement robust testing strategies and maintain high code quality Collaborate with Data Science and Delivery teams to understand and deliver business requirements Apply security-first development practices … with healthcare technology and regulatory requirements (ISO13485, ISO27001) Desired Skills: Experience in building mobile apps Experience working in a healthcare technology company Experience of penetrationtestingMore ❯
Horsham, West Sussex, South East, United Kingdom Hybrid / WFH Options
Adria Solutions
patches. Manage and audit security compliance with external vendors and third-party suppliers. Ensure network and system security, including databases, firewalls, and encryption. Conduct penetrationtesting and security audits to identify vulnerabilities. Provide on-call security support and lead junior team members. Technical Requirements: Extensive hands-on experience More ❯
monitoring the uptime of IT systems, servers, and services to address outages as they arise. Key Responsibilities: - Participate in proactive IT upgrades and scheduled penetration testing. - Support service delivery with management reports around KPIs. - Operate on a rotating 24/7 shift pattern, including two 12-hour shifts and More ❯
monitoring the uptime of IT systems, servers, and services to address outages as they arise. Key Responsibilities: - Participate in proactive IT upgrades and scheduled penetration testing. - Support service delivery with management reports around KPIs. - Operate on a rotating 24/7 shift pattern, including two 12-hour shifts and More ❯
monitoring the uptime of IT systems, servers, and services to address outages as they arise. Key Responsibilities: - Participate in proactive IT upgrades and scheduled penetration testing. - Support service delivery with management reports around KPIs. - Operate on a rotating 24/7 shift pattern, including two 12-hour shifts and More ❯
Southampton, Hampshire, South East, United Kingdom Hybrid / WFH Options
Spectrum It Recruitment Limited
monitoring the uptime of IT systems, servers, and services to address outages as they arise. Key Responsibilities: - Participate in proactive IT upgrades and scheduled penetration testing. - Support service delivery with management reports around KPIs. - Operate on a rotating 24/7 shift pattern, including two 12-hour shifts and More ❯
monitoring the uptime of IT systems, servers, and services to address outages as they arise. Key Responsibilities: - Participate in proactive IT upgrades and scheduled penetration testing. - Support service delivery with management reports around KPIs. - Operate on a rotating 24/7 shift pattern, including two 12-hour shifts and More ❯
Employment Type: Permanent
Salary: £35000 - £40000/annum 25 Days holiday, Pension Scheme
and services, along with training for popular phone brands. Partnered with top mobile forensic tool providers, we offer solutions for data recovery and pen testing, including advanced reading equipment and Faraday bags for data protection. More ❯
new domains Provide domain knowledge for technical analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerability assessment techniques such as fuzzing and code More ❯
or Microsoft Azure) In-depth knowledge of modern security concepts, common attack vectors, malware, security analytics and threat intelligence. A good understanding of security testing and vulnerability management is important (including pen testing/ITHC, CVSS/CVE) Experience working with security standards such as ISO More ❯
Bolton, Greater Manchester, North West, United Kingdom Hybrid / WFH Options
Reed Technology
ensure internal stakeholder needs are met Project Delivery background CISSP, CISM or other equivalent foundational security qualifications or experience CEH, OSCP, GIAC or other penetrationtesting security qualifications or experience SABSA, SANS or other technical architecture qualifications SAFE, Scrum, or other Agile methodology experience Data Protection, Risk, Legal More ❯
SRE processes and policies Recommending and implementing ways of driving operational efficiency and driving down our cost to run, without impacting service Assisting in penetrationtesting for Cloud through liaising with our provider, providing technical details, and environment setup Incident management Here's what we're looking for More ❯
Months (Possible Extension) What You Will Be Doing Tech Breakdown: 50% Automation 50% Manual Daily Responsibilities SQL Injection & Cross-site scripting Grey box penetrationtesting, and perform access control Identify and exploit vulnerabilities to assess security risks. Communicate with clients about security issues and provide tailored solutions. Collaborate More ❯
in safeguarding our environment. You'll also contribute to building custom security tools to enhance our capabilities and support security assessments, threat modelling, and penetration testing. You'll come with hands-on experience with AWS and Cloudflare and be comfortable working with Infrastructure as Code tools like Terraform. A More ❯
practices in compliance with FDA, IEC 62304, and ISO 27001. Implement identity management, authentication, and data encryption strategies. Conduct threat modeling, vulnerability assessments, and penetration testing. Address cybersecurity challenges in connected medical devices and healthcare IoT. Unit Testing, Quality Assurance & Documentation Implement automated testing frameworks for backend … frontend, and cloud-based applications. Perform unit testing, debugging, and troubleshooting to ensure software quality and regulatory compliance. Write clear and comprehensive documentation for system designs, APIs, and regulatory submissions. Qualifications & Skills: Required: Bachelor's or Master's degree in Computer Science, Software Engineering, or related field. 5+ years … leadership experience in regulated industries (medical devices preferred). Deep understanding of IEC 62304, FDA software regulations, and cybersecurity best practices. Experience in unit testing, DevOps, CI/CD pipelines, and cloud security. Strong knowledge of microservices architecture, RESTful APIs, and database management (SQL/NoSQL). Preferred: Cloud More ❯
Incident Response: Own and manage critical security processes, including threat detection and incident response, vulnerability and patch management, security advisory and consultancy, and security testing, including the scoping and organisation of external penetration testing. Strategic Reporting and Collaboration: Collaborate closely with the leadership team, providing insightful reports on More ❯
West Midlands, United Kingdom Hybrid / WFH Options
Arthur J. Gallagher & Co
encourage you to apply. Overview Are you ready to take your cybersecurity skills to the next level? We're seeking a dynamic Mid-Level Penetration Tester to join our growing team within a large organisation. This is a client-facing, fully remote role with exciting travel opportunities for internal … engagements, wireless assessments, and red teaming. This opportunity sits withing our Cyber Risk Management Division and will part of a team of 4 Penertration Testing experts. This is mainly a remote based role however travel to clients locations and also Gallagher offices in the UK will be a requirement. … How you'll make an impact Conduct external, internal, web application, WiFi, cloud, and red team penetration tests. Engage in OSINT, phishing campaigns, Cyber Essentials audits, and governance projects. Provide cyber awareness training and network hardening consultations for clients. About you Experience as a Penetration tester with proven More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
慨正橡扯
the Company's hybrid working from home policy. Preferred skills and experience Excellent understanding and demonstrable experience of automated, dynamic and static application security testing tools. Excellent understanding and experience with manual security testing to find vulnerabilities and logical issues. Knowledge and understanding of OWASP and its utilisation … languages. Working knowledge of CI and CD pipelines and associated security tooling. Use of planned structured methodologies for conducting and reporting on Web Application Penetration Testing. Strong documentation skills. Excellent communication skills. Main Responsibilities Providing support to technical leads and mentoring junior members of the team. Taking a lead … the project process to ensure that information security aspects are considered up front and throughout the project lifecycle. Contributing to and utilising our security testing methodologies, creating and updating technical documentation as necessary. Conducting manual and automated source code review. Liaising with the software development function to ensure that More ❯