Reading, England, United Kingdom Hybrid / WFH Options
THAMES WATER UTILITIES LIMITED
As a Senior Security Penetration Tester , you will be responsible for supporting the design, implementation, and maintenance of TVM (Threat & Vulnerability Management) solutions, controls and processes across the organisation. You will be liaising with Digital teams to ensure appropriate mitigation and remediation of vulnerabilities detected across our IT estate. This role requires an understanding of TVM concepts, technologies, and … Tester Help support and develop an internal penetration testing function. Conduct network, application penetration testing, code and security reviews. Identify and exploit vulnerabilities through proof-of-concept testing. Support vulnerability management across the enterprise, ensuring that a framework for identification, categorisation and mitigation exists and is implemented and maintained. Responsible for supporting the creation of the operating model for … vulnerability management, that it is shared, agreed and operates effectively across the business. Develop and maintain penetration testing documentation, policies, and procedures. Integrate cybersecurity solutions (e.g. vulnerabilityscanning tools) with existing systems, applications, and infrastructure. Evaluate and recommend technologies, tools, and vendors to meet business needs. Investigate newly identified cybersecurity vulnerabilities and provide appropriate mitigation actions. Liaise More ❯
XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Strong analytical and problem-solving skills. Good verbal and written communication skills, with the ability to tailor messages to different audiences. Commitment to More ❯
XDR, Email protection, DLP, SOAR, Cloud Security etc.) Knowledge of Cyber Security domains (e.g., Identity and access Management, Network Security, Incident Response etc) Understanding of security testing principles, including vulnerabilityscanning, risk identification, and mitigation. Strong analytical and problem-solving skills. Good verbal and written communication skills, with the ability to tailor messages to different audiences. Commitment to More ❯
and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) VulnerabilityScanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical More ❯
and contributing across a broad range of responsibilities, such as: Threat Management Endpoint Detection Security Assurance (Security by Design Controls) Framework Governance and Compliance (ISO 27001, NIST, PCI-DSS) VulnerabilityScanning Risk Analysis Cybersecurity Awareness Campaigns Phishing Campaigns Experience The ideal candidate will bring hands-on experience in the above Cyber Security responsibilities, coupled with a strong analytical More ❯
including executive briefings, and actionable recommendations to technical and non-technical stakeholders Set yourself apart: Monitoring, incident response and playbook development Detection creation within SIEM tools and using GitHub Vulnerabilityscanning, management and reporting Core cybersecurity concepts such as network security, cryptography, cloud security, forensics Understanding of network protocols and how they can be abused by attackers Ability More ❯
technical matters into user friendly language.•Ability to lead with innovative ideas, and proactively create and drive a ‘business benefits’ approach•Life-long learner.Experience in system technology security testing (vulnerabilityscanning and penetration testing, facilitating red team exercise etc.). Desirable •Relevant certifications such as CISSP (Certified Information Systems Security Professional), CISM (Certified Information Security Manager), or CompTIA More ❯
between teams. Networking & Security Networking Concepts: Knowledge in TCP/IP, DNS, VPN, load balancing, and firewalls. Security Best Practices: Implementing security in DevOps (e.g., IAM policies, network security, vulnerabilityscanning, encryption). Zero Trust, OAuth, OpenID, TLS/SSL: Experience with modern security protocols and practices. Agile Methodologies Experience with Agile, Scrum, and Kanban for iterative and More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
in secure practices Respond to escalated incidents as part of a 24/7 on-call rotation Develop and enforce security best practices, aligned with industry standards Conduct regular vulnerability assessments and implement mitigation strategies Support audit and compliance initiatives to maintain certifications Collaborate with cross-functional teams to embed security in infrastructure and code Stay current on evolving … security engineering, including operations, blue team, DevOps, and architecture Strong knowledge of incident response, threat patterns, and mitigation strategies Hands-on experience with security tools: SIEM, IDS, DLP, MFA, vulnerability scanners, WAFs Proficient in AWS security best practices and Infrastructure as Code (e.g., Terraform, Ansible) Deep understanding of securing Windows, macOS, Linux, and virtualized environments Experience in automation/ More ❯
London, England, United Kingdom Hybrid / WFH Options
Air IT Limited
management system Conduct investigations and security audits on a variety of software and cloud systems Carry out security assessments for clients once qualified such as Cyber Essentials assessments and vulnerability assessments. Analyse data from multiple sources to identify anomaly and security threats Manage the creation, maintenance and delivery of cyber security awareness training and phishing campaigns Support customers and … related certifications in Cyber Security. Knowledge and experience of Cyber Essentials Accreditation, or other information security standards. Experience in offensive security such as CTF or bug bounty Experience with vulnerability scanners Experience in conducting security training or phishing simulation We will invest significantly in your training, with the requirement that you will commit a portion of your own time More ❯
London, England, United Kingdom Hybrid / WFH Options
ZipRecruiter
testing, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity with key security tools—EDR, DLP, vulnerability scanners, firewalls, email gateways. Degree in Computer Science, Engineering, or a related STEM field. If you think that this could be a good fit for you, then please apply More ❯
maintaining, and configuring a wide range of security technologies, including SIEM solutions, DLP solutions, firewall solutions, cloud security centers, IPS (Intrusion Prevention Systems), CTI (Cyber Threat Intelligence) solutions, and vulnerability scanners. Proxy solutions like Zscaler are essential. At least one professional certification; CISSP, CISM, CCSP. What we offer you 18% Bonus Car allowance (or cash alternative) Hybrid Working More ❯
Xcede Greater London, England, United Kingdom Lead Vulnerability Management Engineer A leading financial technology and data science firm requires a Lead Vulnerability Management Engineer who will be responsible for delivering a "greenfield" global vulnerability management programme. The role entails delivering the technical aspects of vulnerability management; identification and prioritisation, as well as the non-technical side … management. The position reports directly to the Head of Security. Please note: the role requires at least 3 days in the office. Responsibilities 5 -10 years of experience in vulnerability management or a similar security role in globally distributed financial (or complex) technology environment Strong technical knowledge with hands-on experience using vulnerabilityscanning/assessment tools More ❯
Threat and Vulnerability Engineer The successful candidate for this position will be a subject matter expert in Information Security, possessing a wide range of experience in various technologies, tools, and methodologies. The primary responsibilities of this role include identifying, analyzing, and prioritizing vulnerabilities within the organization. The candidate will be expected to provide proactive security recommendations and engage in … a best-in-class program to partner with the business to protect the Firm’s information and computer systems. Principal Responsibilities Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications, and Cloud services to identify security vulnerabilities. Document, prioritize, and formally report on asset and vulnerability status as remediation activities progress. Analyze cyber … and improve security posture. Perform threat hunting and look-backs on IOC’s. Partner with Infrastructure teams in Networking, Desktop Engineering, Compute, and others to track and report on vulnerability remediation activities. Perform data analysis using scripting, databases, and Excel. Maintain and create metrics reporting for governance purposes. Qualifications Bachelor’s degree in Cyber Security, Computer Science, or Engineering More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software … or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be exploited. More ❯
applications. You will be responsible for identifying vulnerabilities, conducting security assessments, and implementing robust security measures to protect our systems and client data. Key Responsibilities: Perform security assessments and vulnerabilityscanning for web applications, APIs, and infrastructure. Collaborate with development teams to implement secure coding practices and address vulnerabilities. Review and advise on secure architecture and design for … testing, and secure software development practices. Strong understanding of security vulnerabilities (OWASP Top 10, etc.) and secure coding techniques. Experience with security tools (e.g., static/dynamic analysis tools, vulnerability scanners). Familiarity with common web technologies (e.g., Java, Python, JavaScript, SQL). Knowledge of security frameworks and standards (e.g., NIST, ISO 27001). Strong problem-solving skills and More ❯
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerabilityscanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Adria Solutions
infrastructure Familiarity with industry security standards and compliance frameworks Strong documentation, communication, and leadership skills Desirable qualifications and experience: Industry certifications or working toward one Experience with Microsoft Defender, vulnerabilityscanning, and disaster recovery planning Understanding of ITIL and service management methodologies Why consider this role? Join a forward-thinking, values-led organisation with a strong public service More ❯
Brighton, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
per week in their Brighton office. What You’ll Be Doing: Collaborate with engineering and DevOps teams to embed secure-by-design principles across platforms and services Perform regular vulnerabilityscanning, threat assessments , and maintain security tooling Monitor systems for potential risks and produce incident and compliance reports Support the definition and upkeep of security policies, standards, and More ❯
Manage day-to-day IT & Engineering needs (system administration, help desk support). Monitor security tools and respond to alerts and incidents. COMPLIANCE ACTIVITIES: Change Management Incident Management Maintenance Vulnerabilityscanning Implement NIST SP 800-171 for internal systems. Establish a System Security Plan (SSP) . The SSP needs to go through each NIST SP 800-171 control More ❯
Cambridge, Cambridgeshire, United Kingdom Hybrid / WFH Options
MealSuite
Management Establish and maintain internal IT security policies and access controls. Oversee endpoint security and identity & access management (IAM). Implement and maintain security team tools, such as SIEM, vulnerabilityscanning, and endpoint detection solutions. Training & Awareness Develop and run organization-wide security training programs to foster a strong security culture company-wide. Educate employees on phishing, data More ❯
London, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
SyOps, DPIAs, threat models, and continuous threat assessments. Ensuring compliance with assurance frameworks like Government Security Classifications (GSC), NCSC guidance, Cabinet Office requirements, GDPR, and ISO27001. Conducting threat and vulnerability assessments for macOS devices, MDM platforms, developer tooling, remote access, and cloud-native infrastructure. Promoting secure-by-design practices in collaboration with security architects, engineering, DevOps, and testing teams. … Security principles, GDS Service Standards, and government accreditation processes. Hands-on experience producing RMADS, SyOps, DPIAs, and similar artifacts. Experience with security tooling for risk assessments, threat modeling, and vulnerability scanning. Active Security Clearance. Additional preferred skills include experience in DevSecOps or agile environments, knowledge of Zero Trust architecture, IAM, and cloud-native security practices. #J-18808-Ljbffr More ❯
London, England, United Kingdom Hybrid / WFH Options
VE3
monitoring using tools like Ansible, Chef, or Puppet. Monitor system performance and troubleshoot issues across infrastructure and applications. Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. Collaborate with development teams to support deployment, testing, and release management. Create and maintain documentation related to infrastructure, policies, and procedures. Provide on-call support and participate in … monitoring using tools like Ansible, Chef, or Puppet. • Monitor system performance and troubleshoot issues across infrastructure and applications. • Implement and enforce security best practices, including IAM policies, encryption, and vulnerability scanning. • Collaborate with development teams to support deployment, testing, and release management. • Create and maintain documentation related to infrastructure, policies, and procedures. • Provide on-call support and participate in More ❯
and frameworks (HMG SPF and ISO27001). Experience with public sector programmes. Desirable: PCiIAA, SABSA, TOGAF, and enterprise architecture expertise. Knowledge of identity management, PKI, SIEM, cryptography, firewalls, and vulnerability scanning. A security-based master's or STEM degree preferred. Eligibility and willingness to gain UK Security Clearance. Additional Information Seniority level: Mid-Senior level Employment type: Full-time More ❯