ensure the security posture of Material IT Suppliers, ensuring compliance with security standards and contractual obligations. Risk Assessment: Conduct risk assessments, analyze vulnerability and penetrationtesting reports, and develop risk mitigation strategies. Access Management: Help develop and maintain a robust Role-Based Access Control Framework, ensuring efficient management More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetrationtesting, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetrationtesting, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. More ❯
and ensure compliance with IEC 62443, NIST SP 800-82, NERC CIP, ISO 27001, and NIS2 frameworks. Vulnerability & Risk Management: Perform vulnerability analysis and penetrationtesting, and implement risk mitigation strategies tailored for ICS/SCADA and IoT environments. IT-OT Integration: Work closely with IT, engineering, and More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom
Vanquis Bank Limited
services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution More ❯
involves leading security assurance initiatives, conducting risk assessments, driving compliance activities, and implementing controls to enhance the organisation's security. Key accountabilities: Assurance and Testing: Develop and improve security policies and guidance related to security assurance testing. Coordinate and manage vulnerability assessments, penetrationtesting, and other technical … incidents. Prepare and execute simulated exercises to test resilience. About you We are looking for a candidate with: 5+ years of experience in security testing and assurance. A degree in computer science or similar experience. Relevant professional qualifications such as CISSP or Accredited Security Testing Professional. Strong understanding More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005 … NIST 800-53). Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005 … NIST 800-53). Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer More ❯
/CMMI Certification or alignment with recognised industry standards Compliance with applicable regulations & legislation Building and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threat intelligence reports and research Supply Chain Risk Management … base requirement to demonstrate understanding of and find ways to integrate activity with BlueVoyant colleagues across the globe, specifically Digital Forensics, Incident Response and PenetrationTesting specialists as well as wider BlueVoyant service offerings when appropriate, to produce threat-aware products, services and outputs that are impactful, efficient More ❯
Building Automation Cybersecurity team, gaining hands-on experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetrationtesting, and participating in cyber assessments while learning about standards such as … systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of cyber assessment vulnerability assessment and penetration testing. Assist in detailed design documents for various cyber solutions. Participate in design discussions with end customers and vendors. Manage existing cybersecurity platforms. Key … configuring Microsoft operating systems, firewall switches. Desirable Certifications: MCTS/MCSA (Microsoft) VCP (VMware) CCNA Offensive Security Certified Professional (OSCP) Practical Junior/Network Penetration Tester (PJPT/PNTP) Nice to have: Strong passion for cybersecurity and a desire to learn and grow in the field. Basic knowledge of More ❯
a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetrationtesting tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, DNS More ❯
and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetrationtesting, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering, vulnerability scanning and More ❯
and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetrationtesting, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering, vulnerability scanning and More ❯
cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetrationtesting tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security More ❯
performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root More ❯
incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security More ❯
be responsible for conducting security reviews, threat modeling, developing tooling that will help detect security issues at scale, and hands-on security evaluations (pen-testing). The successful candidate must be comfortable diving into complex engineering discussions and leveraging deep security expertise to ensure proper risk assessment and threat … opportunities as you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetrationtesting & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS … ROM, microcode, custom ASIC/FPGA) - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe) - Physical security testing at the machine level. Security testing of compute platforms (Server, PC or Mobile). Working with diverse physical tamper resistance and/or More ❯
threats Knowledge and experience of network protocols, traffic analysis, and cyber-attack methodologies Knowledge and experience of threat intelligence, risk management, vulnerability management, and penetrationtesting Please note sponsorship is not available for this position, and you must be able to obtain a Security Clearance. Your new employer More ❯
security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaboration: Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. More ❯
provide 24x7x365 operations/Familiar with networking fundamentals, protocols and network components/Experience with cloud security/Understanding of security tools, vulnerability management, penetrationtesting and remediation/Working knowledge of Qualys, Defender, Knowbe4 are essential./Exposure to MS Sentinel and Expel MDR are desirable/ More ❯
and 62443 assessments. We also provide bespoke services tailored to the specific needs of organizations, including managed services, security architecture review, SOC, monitoring, DFIR, PenetrationTesting, Safety reviews, and cyber transformation programs. The role within our OT division offers an exciting opportunity for individuals with prior relevant experience More ❯
vulnerabilities and policy compliance violations are identified. Establish plans to identify OT vulnerabilities and policy compliance violations through vulnerability scanning, patch reporting, management, and penetration testing. Categorize and prioritize OT vulnerabilities. Assess the effectiveness of vulnerability dispositions. Maintain relationships with business unit stakeholders to assist with the remediation of More ❯
security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate More ❯
strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, PenetrationTesting (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able to recognise and manage More ❯
Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetrationtesting, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead incident More ❯