implementation Information Security Maturity Audits/CMMI Certification or alignment with recognised industry standards Compliance with applicable regulations & legislation Building and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threat intelligence reports and research Supply Chain Risk Management Consultants must possess and be … limited oversight. There is a base requirement to demonstrate understanding of and find ways to integrate activity with BlueVoyant colleagues across the globe, specifically Digital Forensics, Incident Response and PenetrationTesting specialists as well as wider BlueVoyant service offerings when appropriate, to produce threat-aware products, services and outputs that are impactful, efficient, cohesive, and are enhanced with More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Agoda
great challenge for those who want to work with the best technology in a dynamic and advanced environment. The Opportunity/Role Summary: Conduct application security reviews and perform penetrationtesting, ensuring alignment with compliance standards. Engage in projects, research, and security tool development to enhance security measures and meet compliance requirements. Scale security processes using automation. Provide … techniques, and methodologies to naturally build secure products. What you'll Need to Succeed/Role Requirements: Strong foundations in secure design reviews, threat modeling experience, code reviews, pen-testing Minimum of 3 years of technical experience with any combination of the following: threat modeling experience, secure coding, identity management and authentication, software development, cryptography, system administration and network More ❯
Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/7 operations More ❯
across our technology stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetrationtesting, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead incident response efforts, coordinating with stakeholders More ❯
expert advice and guidance on security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaboration: Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate security risks and recommendations More ❯
verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability to work independently. Willingness to work More ❯
vulnerability management, firewalls, and network security. Hands-on experience in security control implementation and maintenance (e.g. ISO27001, Cyber Essentials). Familiarity with MITRE ATT&CK, incident response methodologies, and penetration testing. Experience in risk management, vendor security assessments, and compliance. Understanding of UK regulations, including Cyber Essentials, ISO27001, NIST CSF, and GDPR. Ability to support internal/external audits More ❯
for you to cut your teeth on and a friendly, passionate team to develop and grow. The KPMG’s Cyber Defence (CDS) Team conducts client facing technical assurance and penetrationtesting and has a long and successful history in KPMG. Our clients are diverse and we cover many sectors with particular specialisms in Financial Services, High-end Defence … Assurance and Telecommunications. We work closely with the NCSC developing new schemes such as Cross Domain Solutions Testing (https://www.ncsc.gov.uk/blog-post/ncsc-cross-domain-industry-pilot-stage-2) and are members of all current NCSC and CREST testing schemes - as a result we conduct interesting and challenging work that isn’t on offer … we are able to offer flexibility in base location, as well as embracing remote working. What will you be doing? Aspects of the role include: HACKING! Learning and developing penetrationtesting skills in: Infrastructure, Application (web, mobile, desktop), Cloud and AI. Working through a clear and defined certification pathway. Delivering penetration tests to some of our most More ❯
London, England, United Kingdom Hybrid / WFH Options
KPMG UK
for you to cut your teeth on and a friendly, passionate team to develop and grow. The KPMG’s Cyber Defence (CDS) Team conducts client facing technical assurance and penetrationtesting and has a long and successful history in KPMG. Our clients are diverse and we cover many sectors with particular specialisms in Financial Services, High-end Defence … Assurance and Telecommunications. We work closely with the NCSC developing new schemes such as Cross Domain Solutions Testing (https://www.ncsc.gov.uk/blog-post/ncsc-cross-domain-industry-pilot-stage-2) and are members of all current NCSC and CREST testing schemes - as a result we conduct interesting and challenging work that isn’t on offer … we are able to offer flexibility in base location, as well as embracing remote working. What will you be doing? Aspects of the role include: HACKING! Learning and developing penetrationtesting skills in: Infrastructure, Application (web, mobile, desktop), Cloud and AI. Working through a clear and defined certification pathway. Delivering penetration tests to some of our most More ❯
design principles across applications and infrastructure. Conduct architectural reviews and ensure security controls are implemented across all systems, with a focus on privacy and compliance. Define and oversee security testing requirements, including penetrationtesting, and provide actionable feedback to stakeholders. Lead, facilitate, and participate in technical steering group meetings, change management processes, and project discussions to ensure More ❯
is. SIEM, IDS/IPS, ASM, WAF) to safeguard against security breaches, cyber threats and unauthorized access Report on and assist with all security events and incidents. Oversee Security testing, including penetrationtesting and vulnerability scanning Ensure products compliance with security standards and regulations Ensure NAVBLUE Security strategy deployment within technical operations Ensure effective synchronization and alignment … Excellent management, analytical and problem-resolution skills Working knowledge of the SDLC and AWS network architecture Knowledge of the SAFe Agile method would be an asset Understanding of security testing in the software pipeline (SAST, DAST, SCA, RASP) Knowledge of STRIDE, DICE and other threat and risk frameworks Knowledge of AWS tools Proven experience managing multiple projects simultaneously Practical More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Matchtech
for product teams. Support system accreditation, liaising with security accreditors and assurance teams. Prepare security documentation including Protection Profiles, Security Targets, and TEMPEST Control Plans. Assist with platform lockdown, penetrationtesting, and vulnerability management. Lead incident response efforts and support product security training. Skills & Experience: Background in securing defence or commercial systems. Degree in engineering, computer science, or More ❯
Macclesfield, Cheshire, North West, United Kingdom Hybrid / WFH Options
Purview Consultancy Services Ltd
design and implement end to end network infrastructure automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetrationtesting and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. Adhere More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. PenetrationTesting & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to … review your application and invite you to the next stage if you showcase the right aptitude for success. Complete online assessments and a first-stage interview - These assessments are testing your aptitude for learning. Show us your potential and then your personality in a telephone interview. Final competency-based interview - Demonstrate your collaborative skills, problem-solving abilities, and growth More ❯
expert advice and guidance on security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate security risks and recommendations effectively More ❯
Code (Terraform, CloudFormation) Experience with Jira or similar ticketing systems Technical architecture review skills Vulnerability identification (CWE, OWASP) Operating systems and hardening techniques Development concepts like CICD, Pipelines, SDLC Penetrationtesting knowledge (useful) Familiarity with Cloud Development Kit (CDK), GitOps Experience in DevOps/agile environments Docker, Kubernetes, serverless, Helm Platforms like Snowflake, MongoDB, Terraform Cloud, GitHub, Databricks More ❯
of the Institute of Information Security Professionals), or commensurate experience. Outsourcing and Cloud service provision including eg: PaaS, SaaS, IaaS. Understanding of SIEM, IDS/IPS, Vulnerability Scanning/PenetrationTesting, Mobile Device Management. More ❯
IP Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object-oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions at the business division level More ❯
Security Tooling: Contribute to the creation and maintenance of in-house tools that enhance our security capabilities and automation. Product Security Support: Assist in security assessments, threat modeling, and penetrationtesting, working closely with the Product Security team. Secure Development Lifecycle: Help implement and improve security gates within the SDLC. Adapt & Collaborate: Be prepared to dive into any More ❯
governance to incident response planning and 62443 assessments. We also provide bespoke services tailored to the specific needs of organizations, including managed services, security architecture review, SOC, monitoring, DFIR, PenetrationTesting, Safety reviews, and cyber transformation programs. The role within our OT division offers an exciting opportunity for individuals with prior relevant experience in the cyber and assurance More ❯
ideas and technical skills will directly impact the security of our systems and services Key Responsibilities Support the development and implementation of secure coding practices. Assist in application security testing and vulnerability assessments. Collaborate with developers to embed security into the SDLC. Help design and maintain automated security testing workflows. Contribute to vulnerability reporting and security recommendations. Apply … multitasking abilities. Effective communicator across technical and non-technical teams. Driven, proactive, and committed to continuous improvement. You will have Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threat modelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx … please let us know Geographical area Europe, United Kingdom City London Bachelor Degree/BSc Degree or equivalent Degree Experience Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threat modelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx More ❯
Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identity and access management (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and More ❯
configuration & maintenance; PowerShell; Windows IIS security & management; Event Log analysis and troubleshooting; Working with external cloud and security providers; Cyber Security experience including resolving issues raised from external PEN testing; Analytical skills in monitoring, evaluating and reporting on risk scenarios; Strong report-writing skills both for policy management and for Team/Board reporting purposes; Communication skills: confidence and More ❯