large-scale international security programme, delivering high-quality offensive security assessments across applications, infrastructure, and networks. You'll be joining a specialist team responsible for delivering structured penetration tests, vulnerability assessments and security design reviews. Working within a defined AGILE sprint model, you will plan, execute and report on testing activities, producing clear technical findings, risk assessments and remediation More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
MFK Recruitment
and unauthorised access events. Monitor, analyse, and respond to alerts from client security platforms (MDR/XDR, SentinelOne, Huntress, Fortinet, Mimecast, Avanan, Defender) to ensure rapid threat mitigation. Conduct vulnerability assessments, risk analyses and security audits across client environments, providing actionable recommendations and remediation guidance. Implement and maintain security hardening across infrastructure, cloud services, endpoints, and networks, in alignment … platforms, email security, RMM tools, and centralised monitoring systems. Familiarity with security frameworks and compliance standards, including Cyber Essentials, Cyber Essentials Plus, ISO27001, NIST, and GDPR requirements. Skilled in vulnerability management, threat detection, incident response, and remediation planning, including experience with ransomware and phishing mitigation. Ability to analyse complex technical and security issues, identify root causes and implement long More ❯
BAE Systems, 1st Floor, Main Shipyard Offices, Barrow-in-Furness, Cumbria, England
BAE SYSTEMS PLC
operating systems (Java, .NET, Linux, Windows, mobile platforms) Software design, development lifecycle, and quality assurance Security principles including risk analysis, threat mitigation, and regulatory compliance Support with security analysis, vulnerability assessments, and the integration of secure engineering solutions into products and systems Communication, problem-solving, and project collaboration skills Training Digital and Technology Solutions Professional Level 6. An apprenticeship More ❯
BAE Systems, 1st Floor, Main Shipyard Offices, Barrow-in-Furness, Cumbria, England
BAE SYSTEMS PLC
art vessels. Role You will support the design, development, testing, and implementation of software applications using technologies such as Java, C#, C++, and web platforms Assisting with security analysis, vulnerability assessments, and the integration of secure engineering solutions into products and systems Collaborate with multidisciplinary teams to deliver innovative and secure digital solutions Produce technical documentation, troubleshoot issues, and More ❯
Automate deployment, configuration, and infrastructure provisioning (Infrastructure as Code) Work with virtualisation (VMware/vSphere, etc.) Configure/manage SAN/storage, Fibre Channel, zoning, LUN provisioning Participate in vulnerability assessments, patches, security hardening, and incident response Required Skills & Experience NPPV3 clearance, either current or active within the last 12 months (non-negotiable) Strong track record with Windows More ❯
BAE Systems, Lyon Way, Frimley, Camberley, England
BAE SYSTEMS PLC
of-the-art vessels. Role • Support the design, development, testing, and implementation of software applications using technologies such as Java, C#, C++, and web platforms • Assist with security analysis, vulnerability assessments, and the integration of secure engineering solutions into products and systems • Collaborate with multidisciplinary teams to deliver innovative and secure digital solutions • Produce technical documentation, troubleshoot issues, and More ❯
Cheltenham, England, United Kingdom Hybrid/Remote Options
Searchability NS&D
forums The Operational Cyber Researcher Role As an Operational Cyber Researcher, you will conduct exploratory research across emerging technologies and security-critical systems. You will apply advanced techniques including vulnerability research, fuzzing, reverse engineering, and code analysis to uncover weaknesses in complex environments. The role also involves supporting prototype development, advising stakeholders, and contributing to experimental capability growth. Operational … understanding of computer fundamentals, memory structures, and OS behaviour Experience with Python scripting and rapid prototyping in C Sharp or similar languages Ability to conduct deep technical research including vulnerabilityassessment, debugging, and analysis Clear and confident technical communication skills Collaborative approach and curiosity for learning Experience in areas such as reverse engineering, exploit development, protocol or data … applying for this role, you give express consent for us to process and submit your application to our client in conjunction with this vacancy only. Key Skills Cyber Researcher, Vulnerability Research, Reverse Engineering, Python, C Sharp, OS Internals, Fuzzing, Technical Analysis, Prototype Development, Low Level Research, NSD More ❯
Risk Register. Coordinate client security audits and support external certifications (e.g., TPN). Complete and manage client security questionnaires during bidding or audit processes. Conduct internal penetration tests and vulnerability assessments to proactively identify and mitigate security risks. Infrastructure & Systems Security Manage the firewall whitelisting and approval process. Oversee vulnerability and patch management workflows. Maintain sandbox and production … enterprise environment. Familiarity with enterprise information security standards such as Cyber Essentials, ISO 27001, 27002, Data Protection Act, and GDPR. Proficiency in Microsoft O365 Security solutions, Networking, Security operations, Vulnerability Management, and Security Auditing. Experience in security testing, vulnerability scanning, and risk management. Ability to create formal documents such as reports or procedures. Detailed knowledge of Microsoft O365 More ❯
BAE Systems, Lyon Way, Frimley, Camberley, England
BAE SYSTEMS PLC
of-the-art vessels. Role Support the design, development, testing, and implementation of software applications using technologies such as Java, C#, C++, and web platforms Assist with security analysis, vulnerability assessments, and the integration of secure engineering solutions into products and systems Collaborate with multidisciplinary teams to deliver innovative and secure digital solutions Produce technical documentation, troubleshoot issues, and More ❯
e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk Assessment and Risk Treatment Plans Establish security requirements for cloud-based solutions by evaluating business strategies and requirements, implementing security standards such as ISO 27000 series, NIST, CSF, and CSA … development of patterns and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk More ❯
Poole, Dorset, England, United Kingdom Hybrid/Remote Options
Mexa Solutions LTD
week in the office) Scope : Work across IT, application, cloud, and physical security, no siloed remits here Responsibility : Be the go-to person for penetration testing, compliance audits, and vulnerability management Environment : Modern SaaS product environment, working alongside DevOps, engineering, and IT Growth : Get stuck into a wide variety of work, with support from leadership and autonomy to make … a real impact What you’ll be doing: Leading vulnerability assessments and coordinating regular penetration testing across systems and products Owning risk remediation actions, from security audits to PCI scans and compliance reporting Working across cloud (AWS), infrastructure, and software environments to ensure security best practices are embedded throughout Supporting the secure design of products and infrastructure, providing input More ❯
London, South East, England, United Kingdom Hybrid/Remote Options
DMS Computer Recruitment
of the position include: Design and build resilient Cloud infrastructures that are protected against security threats Develop and assess Cloud security solutions to secure systems, databases and networks Conduct assessment and make recommendations to ensure that appropriate controls are in place Gain insight into security incidents and threats by monitoring/analyzing logs and performing vulnerability assessments Participate More ❯
controls, monitoring AWS environments, and responding to security incidents. The successful candidate will play a key role in strengthening the security posture of our clients' AWS estates through automation, assessment, and remediation activities. Key Responsibilities: Deploy and maintain AWS security services such as GuardDuty, AWS Inspector, Security Hub, WAF, CloudTrail, KMS, and AWS Config. Monitor cloud environments for anomalies … and respond to security events in accordance with defined procedures. Automate compliance checks and security enforcement using scripting and Infrastructure as Code tools. Perform vulnerability assessments and lead remediation efforts across AWS assets. Support internal and external audits by providing security evidence and documentation. Work alongside platform and development teams to resolve identified security issues. Maintain detailed documentation of … security services. Strong scripting skills in Python, Bash, or similar for automation purposes. Understanding of IAM principles, encryption techniques, and secure cloud networking. Practical knowledge of incident response and vulnerability management processes. AWS certification such as AWS Certified Security – Specialty or AWS Certified SysOps Administrator. Strong troubleshooting abilities and attention to detail in technical documentation. Desirable Attributes: Experience securing More ❯
Key Responsibilities Operate within a Security Operations Centre (SOC) or equivalent environment Monitor and respond to incidents using SIEM platforms Conduct system log analysis and threat detection Assist in vulnerability assessments and management Support incident resolution and reporting Required Skills & Experience At least 2 years' experience in a dedicated Security Analyst role Hands-on experience with: SOC operations SIEM … tools Vulnerability management Incident response and investigation Log and event analysis Preferred Qualifications Industry certifications such as CompTIA Security+ or equivalent (desirable) Practical experience preferred over formal education Security Clearance Requirements UK Nationals only Current SC clearance required DV preferred - or must be DV-eligible (as DV clearance will be needed) DV Bonus: 10% of base salary upon clearance More ❯
keep up with the high demand. In this varied role you will be accountable for a broad range of Security Operations activities, including proactive monitoring, incident response, threat and vulnerability management, managing the external Security Operations Centre (SOC) partnership and developing security capabilities. You will also play a key part in providing expert technical advice for risk assessments and … compliance initiatives. The ideal candidate will possess strong experience in managing and delivering security operations, including planning vulnerability assessments and penetration testing, investigating security breaches, maintaining operational security processes, maturity assessments and actively contributing technical expertise to risk management. An understanding of ISO27001 and Power BI would be beneficial and having previous experience with government policies such as GovAssure More ❯
Employment Type: Contract
Rate: £500 - £550 per day + Inside IR35 + ASAP Start
Basingstoke, Hampshire, South East, United Kingdom Hybrid/Remote Options
Corriculo Ltd
joining the internal security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation …/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetration testing/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet all of the criteria More ❯
recent experience of using Vulcan, to be considered for the role, you will need Vulcan and the following: - Assist with the deployment of Vulcan Cyber for orchestrating and automating vulnerability management workflows, prioritisation, and remediation tracking. Assist with the vulnerability management lifecycle, from detection to remediation, ensuring robust protection against threats. Operate and optimise vulnerability management tools … including Vulcan Cyber, to conduct comprehensive vulnerability assessments and generate actionable reports. Develop and deliver regular vulnerability reporting, metrics, and dashboards for management and technical teams via Vulcan Cyber, Tenable and Defender. Collaborate with incident response teams using CrowdStrike and Microsoft Defender to correlate vulnerability data with threat intelligence and active security incidents. Maintain up-to-date … business stakeholders. Work closely with IT operations, development, and compliance teams to ensure timely remediation of identified vulnerabilities and adherence to regulatory standards. Contribute to the continuous improvement of vulnerability management processes and integration with other security platforms. If this could be your next role, please forward your CV in the first instance. Due to the volume of applications More ❯
ethical hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills.Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice.Role: Junior Penetration TesterLocation … London/HybridSalary: £30,000 - £50,000 (DOE)Ideally, you’ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to achieve them More ❯
City, London, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills. Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice. Role: Junior Penetration … Location: London/Hybrid Salary: £30,000 - £50,000 (DOE) Ideally, you ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to More ❯
London, Fleet Street, United Kingdom Hybrid/Remote Options
Big Red Recruitment Midlands Limited
hackers, helping test systems, applications, and networks for vulnerabilities - working alongside seasoned professionals while sharpening your offensive security skills. Expect to contribute to hands-on pen testing engagements, conduct vulnerability assessments, and support threat hunting within a well-established SOC. You'll develop your skills using industry-standard tools, investigate incidents, and provide actionable remediation advice. Role: Junior Penetration … Location: London/Hybrid Salary: £30,000 - £50,000 (DOE) Ideally, you’ll have: 6+ months of proven penetration or security testing experience Knowledge of Metasploit, Burp Suite, and vulnerability scanning tools Experience with Windows, Linux and Mac operating systems Interest in threat hunting, incident response, and security monitoring CRT/OSCP/Cyber Scheme training or aspirations to More ❯
Luton, Bedfordshire, South East, United Kingdom Hybrid/Remote Options
Crimson
data will be the core responsibility of this position. Key Skills and Responsibilities: Oversee security operations, implementing tools and processes to enhance proactive monitoring, incident response, threat management, and vulnerability management. Maintain security processes, handle support requests, and investigate breaches as required. Monitor external security environments, identify emerging threats, and communicate findings to leadership when necessary Plan and coordinate … vulnerability assessments and penetration testing, providing expert advice on tools and techniques. Support risk assessments, recommend mitigations, and ensure compliance with security policies and standards. Drive improvements within the external Security Operations Centre and act as an escalation point for complex or sensitive issues. Manage the design, delivery, and continuous improvement of IT Security Operations capabilities aligned with business More ❯