London, United Kingdom Posted on 24/02/2025 Job Description: Security Testing Engineer Location: Remote with occasional travel as required Employment Type: Permanent About the Role Scrumconnect Consulting is looking for a Security Testing Engineer to ensure the security, resilience, and compliance of GOV.UK digital … services . This role involves identifying vulnerabilities, mitigating security risks, and ensuring adherence to government security policies and DDAT frameworks . You will work closely with developers, security architects, and business stakeholders to embed security testing into Agile development workflows and DevSecOps pipelines. As a Security Testing Engineer , you will conduct static and dynamic security assessments, penetration testing, and vulnerability analysis , ensuring that applications meet the highest security standards. Key Responsibilities 1. Security Test Planning & Execution Develop, implement, and execute comprehensive security test plans for GOV.UK digital services. Identify securityMore ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
from Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps … pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate will have a strong background in cloud security best practices, automation, and a proactive approach to integrating security across their software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing … structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure-based infrastructure using Terraform, ensuring More ❯
Loughton, Essex, South East, United Kingdom Hybrid / WFH Options
Profile 29
from Office (WFO) role. This role will focus on creating a business strategy, gap analysis and implementation, for securing their Azure-based infrastructure, integrating security automation, ensuring PCI DSS compliance, vulnerability and penetration testing and incident response. This role will focus on developing and maintaining secure, scalable Azure DevOps … pipelines and Infrastructure as Code (IaC) using Terraform. Their ideal candidate will have a strong background in cloud security best practices, automation, and a proactive approach to integrating security across their software delivery lifecycle. A key part of this position will also involve mentoring an internal engineer, developing … structured security policies, and managing Sentinel, Defender and SOAR solutions for automated threat response. Additionally, the role requires liaising with third-party support partners to coordinate security solutions, manage incidents, and enhance overall cybersecurity posture. Responsibilities Infrastructure Security: Architect and secure Azure-based infrastructure using Terraform, ensuring More ❯
About PentenAmio PentenAmio is a multi-award winning cyber technology company dedicated to strengthening our nation’s security and prosperity through new and innovative technology. Our advanced hardware and software products and services support our clients with Secure Mobility, Applied Artificial Intelligence and Innovation and Technical Services Solutions. To … Ubuntu/RHEL). Administering AWS Cloud environments. Working with cross domain solutions. Writing Ansible playbooks to deploy and manage virtual infrastructure. Implementing CIS security controls and compliance measures (securityhardening) to Linux systems. Integrating and testing of new products to enhance new and existing infrastructure. Creating … and maintaining high-level system architecture diagrams/documentation. Ensuring securityhardening best practices are followed and that these remain up to date in various environments. What we're looking for: Demonstrated knowledge of PKI principles, certificate management, and cryptographic systems. Working knowledge of AWS Cloud Technologies. Strong More ❯
About PentenAmio PentenAmio is a multi-award winning cyber technology company dedicated to strengthening our nation’s security and prosperity through new and innovative technology. Our advanced hardware and software products and services support our clients with Secure Mobility, Applied Artificial Intelligence and Innovation and Technical Services Solutions. To … Ubuntu/RHEL). Administering AWS Cloud environments. Working with cross domain solutions. Writing Ansible playbooks to deploy and manage virtual infrastructure. Implementing CIS security controls and compliance measures (securityhardening) to Linux systems. Integrating and testing of new products to enhance new and existing infrastructure. Creating … and maintaining high-level system architecture diagrams/documentation. Ensuring securityhardening best practices are followed and that these remain up to date in various environments. What we're looking for: Demonstrated knowledge of PKI principles, certificate management, and cryptographic systems. Working knowledge of AWS Cloud Technologies. Strong More ❯
is pivotal in helping infrastructure and Release management teams to secure our networks, operating systems, containers, pipelines and code. We are part of the Security team with a mission of reducing the impact of threats to Parity and its products, bolstering their resilience against potential cyber threats. About the … position This is a crucial role where your understanding of people, systems and security will allow you to advocate for and influence best practices in a diverse free thinking organisation while facilitating smooth development and implementation processes. It is a unique opportunity to help secure an innovative organisation where … is direct and honest and understands that a check box approach doesn't get results. It involves Advising Infra Engineering and IT teams on security topics and supporting their work from the security standpoint - maintaining things practical using a risk-based approach with a focus on following areas More ❯
About PentenAmio PentenAmio is a multi-award winning cyber technology company dedicated to strengthening our nation’s security and prosperity through new and innovative technology. Our advanced hardware and software products and services support our clients with Secure Mobility, Applied Artificial Intelligence and Innovation and Technical Services Solutions. To … maintaining advanced routing solutions with protocols such as BGP and OSPF. Managing cloud networking in AWS including hybrid deployments, e.g. AWS Direct Connect. Applying securityhardening and baselines to network appliances. Implementing and maintaining firewalls & VPN configurations. Analyzing traffic patterns using industry standard tools to support fault finding … assist with capacity Creating and maintaining network diagrams including both HLDs and LLDs. Applying patches and updates to network hardware and software to maintain security and performance. Deploying and maintaining air gapped networks. Ensuring securityhardening best practices are followed and that these remain up to date More ❯
About PentenAmio PentenAmio is a multi-award winning cyber technology company dedicated to strengthening our nation’s security and prosperity through new and innovative technology. Our advanced hardware and software products and services support our clients with Secure Mobility, Applied Artificial Intelligence and Innovation and Technical Services Solutions. To … maintaining advanced routing solutions with protocols such as BGP and OSPF. Managing cloud networking in AWS including hybrid deployments, e.g. AWS Direct Connect. Applying securityhardening and baselines to network appliances. Implementing and maintaining firewalls & VPN configurations. Analyzing traffic patterns using industry standard tools to support fault finding … assist with capacity Creating and maintaining network diagrams including both HLDs and LLDs. Applying patches and updates to network hardware and software to maintain security and performance. Deploying and maintaining air gapped networks. Ensuring securityhardening best practices are followed and that these remain up to date More ❯
with development teams to streamline application releases. Leveraging your expertise in modern IaaS operational tools, you'll help shape cloud-ready infrastructure while maintaining security and compliance standards across the deployment lifecycle. Job Responsibilities Automate cloud deployments using best-in-class IaaS tools. Lead operational and infrastructure aspects of … experience. Desirable Skills Experience with Terraform, ADO DevOps, or RKE2 (secure Kubernetes). Familiarity with Rancher, Packer, FluentD, and logging tools. Strong knowledge of security best practices, including system and OS-level securityhardening (e.g., CISCAT benchmarking). Security Clearance Requirements The successful candidate must be … eligible to go through a SC level security clearance. Location The role will be required onsite in our Horsham offices 2 days a month and travel to client sites when required. What it's like to work at Envitia At Envitia, we believe that our greatest asset is our More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Manchester Digital
play a critical role in supporting that mission by collaborating with infrastructure, cloud, and engineering teams to build, maintain, and continuously enhance the availability, security, and performance of our production and test environments. In this role, you will be responsible for: Ensure platform security, reliability, and performance across … Bash, PowerShell. - Understanding of containerization, microservice architecture and cloud/software design patterns, GitLab or similar for CI/CD. - Understanding and implementation of securityhardening and vulnerability management. - Understanding and management of identity providers and SSO configurations (Azure AD , Ory, Cognito, Firebase) - Understanding of Site Reliability Engineering … MySQL, MariaDB, or Cassandra. -Understanding of monitoring tools (New Relic, CloudWatch, Nagios). -Awareness of ITIL frameworks and structured service operations. -NISC2 or similar security qualifications or knowledge Why should you join us? Brand new collaborative, open-concept office for those days when you want to work collaboratively in More ❯
Wintel Engineer - SC Cleared Location: Stevenage, Hertfordshire (100% On-Site Role) Salary: Up to £55,000 per annum + Benefits Security Clearance: Must be UK National and eligible for SC Clearance CBSbutler are excited to partner with a leading global technology services provider to recruit a skilled Wintel Engineer. … This is a fantastic opportunity to join a dedicated team providing critical IT services directly into a prestigious, high-security client environment in Stevenage. Please note: Due to the secure nature of this role and client requirements, this position requires 5 days per week on-site in Stevenage and … is open only to UK Nationals who are eligible to obtain and maintain Security Clearance (SC). About the Role: As a Wintel Engineer, you will be a key technical specialist within the service delivery team. You'll leverage your deep understanding of Windows environments to ensure the stability More ❯
Reading, England, United Kingdom Hybrid / WFH Options
Mastek
WAFS, SQSBYOK, Helm, Kubernetes, Docker, Ingress, Kafka, Elastic Search, Pega experience is a MUS Understanding of the Linux Operating System, standard network protocols and security hardening. Proven experience using AWS Cloud Solutions and services such as Ec2, S3, Lambda, EKS, API Gateway, ALB, API Gateway, Auto scaling etc In More ❯
a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is More ❯
a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is More ❯
a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is More ❯
Amazing Career Opportunity for a Systems Implementation Engineer Location: Basingstoke, UK Citizen ID Technologies: As the fastest growing solution provider in citizen identity, TOPPAN Security is challenging the status quo with its collaborative approach to solutions delivery. We are positioned to deliver complex, scalable and future proof government programs … Docker and Kubernetes for scalable, resilient application deployment. Strong expertise in server, PC, and network administration, including: Routine maintenance, troubleshooting, and performance tuning. System securityhardening and compliance best practices. Proficiency in high-availability virtualization technologies such as Hyper-V, VMware and Proxmox. Strong knowledge of database technologies … MCSE), VMware (VCP), or Cisco (CCNA/CCNP) are highly advantageous. Expectations Willingness to learn about new technologies on the job such as Hardware Security Modules, Document signers, and Public Key Infrastructure. To demonstrate strong customer facing skills and ability to gain in-depth product knowledge. Knowledge of securityMore ❯
depth experience with RedHat Ansible and AWX RedHat Satellite Python, Perl and Bash scripting DevOps mentality, CI/CD pipelines and other automation concepts Securityhardening principles in line with CIS industry benchmarks Project focussed, experience taking ownership of projects (end-to-end) Data security governance and More ❯
London, England, United Kingdom Hybrid / WFH Options
McGregor Boyall
depth experience with RedHat Ansible and AWX RedHat Satellite Python, Perl and Bash scripting DevOps mentality, CI/CD pipelines and other automation concepts Securityhardening principles in line with CIS industry benchmarks Project focussed, experience taking ownership of projects (end-to-end) Data security governance and More ❯
Abingdon, Oxfordshire, South East, United Kingdom Hybrid / WFH Options
Robert Half
working closely with other Linux Administrators, providing support on the their applications/infrastructure responding promptly to tickets, troubleshooting and problem solving patch management, securityhardening, optimisation utilising Ansible for automation monitoring systems, ensuring a proactive response to any issues ensuring compliance with cyber security standards, documentation More ❯
deploy integrations using BizTalk Server. Perform BizTalk upgrades and migration. Monitor and optimize BizTalk applications for performance and reliability. Ensure compliance with best practices, security policies, and integration standards. Requirements Essential: Proven experience with Microsoft BizTalk Server (2004/2006/2010/2013/2020). A technical … background and working knowledge and experience of Windows Server Experience of application support, securityhardening and performance tuning Ability to troubleshoot low-level issues Excellent communication skills including an ability to influence senior stakeholders Previous experience working in a regulated environment Hands-on experience with BizTalk upgrades and More ❯
Migrate from custom auth to Auth0 (or similar), with social login + MFA Data governance: Apply labelling to Postgres, S3 and BigQuery data Web securityhardening: Audit React, GraphQL and FastAPI layers to eliminate XSS/CSRF and strengthen CSP Static analysis remediation: Triage and address SAST findings … access controls Audit logging: Structure and surface user action logs in the app 💻 Tech Stack Frontend: React, Apollo GraphQL Backend: FastAPI (Python) Infra/Security: GitHub Actions, SAST tools, Auth0 (or equivalent), RBAC, CSP ✅ What We’re Looking For Must-haves: 5+ years building production-grade web apps (React … a must Bonus points for: Experience migrating to managed auth Exposure to Kubernetes, Terraform or Helm Working in early-stage, high-growth startups under security constraints 💬 How We Work You’ll ship iteratively, demo weekly, and document your work for long-term sustainability. We value clean code, proactive ownership More ❯
Bath, Somerset, South West, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
Infrastructure Security Analyst, SCCM, Vulnerability, Patch management, Qualys/Nessus Our client, a leading private sector business based in Bath, is looking to hire contractor with a background in infrastructure and related security. The successful candidate will be responsible for ensuring security and integrity for our clients IT … infrastructure, taking responsibility for patching and vulnerability remediation for both physical and virtual environments. This will include proactive identification, assessment, and mitigation of security vulnerabilities across Windows servers, legacy applications and cloud environments. Hybrid working - 3/2-day split. Engagement is via umbrella company only. General responsibilities: Deploy … patches to Windows servers to address vulnerabilities, ensuring compliance with security policies. Manage patching windows and downtime coordination with various business units to minimize disruption during updates. Monitor patch management systems to ensure all systems are up to date and protected from security threats. Server hardening to More ❯
and services that enable the Enterprise Server Systems to operate on a daily basis for all Business Lines within. Distributed Compute consists of Engineering, ‘Security Risk and Compliance’, and Build and Deploy functions. Distributed Compute acts as the face of Unix/Linux/Windows platforms within IT Infrastructure … a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber SecurityMore ❯
and services that enable the Enterprise Server Systems to operate on a daily basis for all Business Lines within. Distributed Compute consists of Engineering, ‘Security Risk and Compliance’, and Build and Deploy functions. Distributed Compute acts as the face of Unix/Linux/Windows platforms within IT Infrastructure … a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber SecurityMore ❯
and services that enable the Enterprise Server Systems to operate on a daily basis for all Business Lines within. Distributed Compute consists of Engineering, ‘Security Risk and Compliance’, and Build and Deploy functions. Distributed Compute acts as the face of Unix/Linux/Windows platforms within IT Infrastructure … a standardized and automated process to support the migration of infrastructure included in the sale of Business Units. Infrastructure needs to be sanitized and security hardened when being sold or prepared for data migration to third parties. Sanitization includes uninstalling software and proprietary information, certificates and configuration that is … phased removal and restoration if necessary, of specific software and files and network configuration. Auditing of Software and OS versions to provide evidence to Security teams. Working with security and system logs to review for vulnerabilities and issues highlighted by Cyber Security teams Consult on Cyber SecurityMore ❯