to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Reed Technology
to monitor, analyse, and respond to evolving cyber threats, lead forensic investigations, and support wider resilience initiatives. Key Responsibilities: Design, implement, and manage secure network architectures Perform vulnerability assessments , penetrationtesting , and remediation strategy delivery Lead and coordinate incident response , forensic analysis, and post-incident reporting Use and optimise security tooling (e.g. firewalls, IDS/IPS , endpoint protection More ❯
Ashford, Kent, United Kingdom Hybrid / WFH Options
MAF Australia
role in protecting our digital infrastructure. You'll lead the implementation and management of SIEM systems, Fortinet security tools, and endpoint detection & response (EDR) while conducting vulnerability assessments and penetrationtesting to stay ahead of cyber threats. You'll enhance identity and access management (IAM) by maintaining Active Directory, Entra ID, MFA, and Zero Trust security principles. Your More ❯
Are you a Penetration Tester with a passion for working in the government and defense sectors? Join a global consultancy specializing in security and risk management, helping organizations understand threats to their critical assets and implement intelligent security solutions. With a strong presence in the UK and operations worldwide, the company enable clients to navigate complex security challenges, ensuring … the safety of their people, data, and reputation. The company is looking for a skilled Penetration Tester/Vulnerability Assessor to join the growing security team. If you would like to learn more about this opportunity, feel free to reach out and apply today! Key Responsibilities: Perform vulnerability assessments and penetration tests against infrastructure, web applications, and cloud … and knowledge sharing within the team Stay up to date with emerging threats, tools, and techniques in the offensive security space Essential Skills and Experience: Hands-on experience with penetrationtesting or vulnerability assessments (commercial or demonstrable practical knowledge) Familiarity with tools such as Burp Suite, Nmap, Nessus, Metasploit, etc. Understanding of OWASP Top 10 and common exploitation More ❯
support the business and technology teams delivery of the security change programme. Provide support to the business and technology teams to understand and address vulnerabilities within SLA, identified through penetrationtesting, vulnerability scanning and red team exercises Foster relationships with internal business units to enhance cyber security communication, including knowledge of threats, vulnerabilities, and mitigation strategies. Provide strategic … to changes. Lead the information security updates at business and technology governance forums. The Requirements Technical skills: A comprehensive understanding of information security services (security operations and offensive security testing) Experience of strategic planning and oversight of cyber incident response and crisis management Strong understanding of cybersecurity standards and frameworks (e.g. ISO27001, NIST, CIS) and their application in strategic More ❯
to work in a business where you stand to work alongside some very talented testers? CND are working with a boutique Cyber Security consultancy who are focused on the PenetrationTesting market. What makes them stand out? They are not interested in flashy marketing and would never be caught trying to pass off a Nessus scan as a … Penetration Test. The business has been built on delivering excellent testing and reports as well as ensuring that clients see the real benefits of their testing outputs. The company have an office in Cheltenham however you are welcome to work where is best for you. Key Responsibilities Lean into non-CHECK work where necessary. Work with the … team to flesh out technical input as needed. Deliver quality reports to customers. Stay up to date with industry trends and new attack methods. Take a broad approach to testing, working on INF, APP, Mobile, AD, or Cloud tests. Currently holds a CHECK equivalency certification. Eligibility to hold or currently hold clearance. Experience working with Linux and Windows OS. More ❯
Peterborough, Cambridgeshire, England, United Kingdom
INTEC SELECT LIMITED
system audits, and compliance validation Knowledge of SIEM platforms (Elastic SIEM) and log analysis Hands-on experience with Windows Server, VMware, Citrix VDI, and Active Directory Practical knowledge of penetrationtesting tools and methodologies Ability to investigate security incidents, perform forensics, and communicate findings clearly Strong documentation, analytical, and communication skills Desirable Experience in managed services or multi More ❯
join a new team to help grow and define your career! Key Responsibilities Monitor, detect, and respond to cybersecurity threats across enterprise and operational networks. Conduct vulnerability assessments and penetrationtesting to identify and mitigate risks. Support the development and implementation of cybersecurity policies, procedures, and standards. Collaborate with engineering and IT teams to ensure secure-by-design More ❯
or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and PenetrationTesting (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security More ❯
or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and PenetrationTesting (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security More ❯
or comfortable teaching (or able to learn) in the following areas: Network Security (e.g., Firewalls, IDS/IPS, VPNs) Operating System Security (e.g., Windows, Linux hardening) Ethical Hacking and PenetrationTesting (e.g., reconnaissance, vulnerability scanning, exploitation) Security Operations (e.g., SIEM, SOC analysis) Incident Response and Digital Forensics Cryptography and Secure Communications Cloud Security (e.g., AWS, Azure, GCP security More ❯
and Mitigation : Collaborate with cross-functional teams to perform threat modelling, identify security risks, and implement effective countermeasures. Proactively assess the security posture of applications through code reviews, manual penetrationtesting, and static/dynamic security testing (SAST/DAST). Security Tooling and Automation : Implement and maintain security tools used in the development and deployment processes … from you if you have Application Security Expertise: Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge … and Implementation experience: Direct experience with threat modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as OWASP, BSIMM, PCI DSS, ISO 27001, and GDPR. Security Integration experience: Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC More ❯
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
OpenSourced Ltd
with an innovative and growing UK-based cybersecurity consultancy to recruit an Incident Response Analyst . This is an exciting opportunity to join a forward-thinking organisation that provides penetrationtesting and continuous vulnerability management services to a wide range of clients across sectors. As part of the expanding Incident Response team, the successful candidate will play a More ❯
and regulatory requirements (ISO 27001, NIST, GDPR). Proactively monitor, detect, and respond to security threats, vulnerabilities, and breaches, leading incident response and forensic investigations. Conduct regular security audits, penetrationtesting, and risk assessments, implementing corrective actions to strengthen defences. Oversee firewalls, IDS/IPS, endpoint protection, encryption, and secure access controls to safeguard data and systems. Ensure More ❯
scanners, and other security tooling Collaborate with DevOps and Engineering to embed security into CI/CD pipelines and cloud infrastructure (Azure) Manage processes for regular vulnerability assessments and penetrationtesting (internal or third-party) Support internal audits, ISO 27001 compliance, and customer security questionnaires Maintain documentation and training to improve security awareness and operational readiness Stay ahead More ❯
to network security, application security, operating systems, cloud security and threat intelligence. Strong Cyber and Information Security knowledge and understanding including Good technical knowledge of SIEM systems and security penetrationtesting as a minimum. Desired Previous Experience: Extensive experience of working within a Cyber Security function, specifically with experience of Operational Security or management of a Security Operations More ❯
PCI, NIST CSF etc.) Experience working on implementation in a SOC environment. Experience working in Microsoft Defender, Microsoft Purview and Microsoft Sentinel is essential. Experience in or understanding of penetrationtesting and hacking techniques. Experience across applying NIST CSF, ITIL, ISO 27001, ISO and other best practice standards Desirable Experience/Skills: In-depth knowledge of architecture, engineering More ❯
or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetrationtesting, Threat Hunting, Red Teaming methodologies Familiarity with application security and OWASP Top Ten Scripting languages Experience with capture-the-flags Familiarity with audit principles and different information More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
a security architecture design Risk assessment and balancing security risks with business requirements. Extensive Knowledge of Inforamtation Security in the following areas Desirable Windows and Linux operating Systems Virtualisation PenetrationTesting Risk Management Process Public Services Network (PSN) and NHS N3 Security monitoring and auditing Computer Forensics Database Security Employer details Employer name NHS Business Services Authority Address More ❯
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯