decisions around authentication, cryptography, and logging. You'll also ensure that tools such as SAST, DAST, and SCA are effective and efficient, and that testing programmes - including pen testing, vulnerabilityscanning, and bug bounty - are delivering value. You'll triage vulnerabilities, support engineering teams with practical mitigations, and contribute to documentation that strengthens our internal standards and processes. More ❯
scripts. Experience migrating applications and operators between OpenShift clusters. Hands-on familiarity with the following operators: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - container image vulnerabilityscanning Keycloak - identity and access management OpenShift Service Mesh (Istio) - microservices communications Additional Skills: Infrastructure as Code (Ansible/Terraform) CI/CD and GitOps (e.g. Jenkins, ArgoCD More ❯
Newcastle upon Tyne, Tyne and Wear, Tyne & Wear, United Kingdom Hybrid / WFH Options
CBSbutler Holdings Limited trading as CBSbutler
scripts. Experience migrating applications and operators between OpenShift clusters. Hands-on familiarity with the following operators: HashiCorp Vault - secrets management Red Hat Quay - internal container registry Clair - container image vulnerabilityscanning Keycloak - identity and access management OpenShift Service Mesh (Istio) - microservices communications Additional Skills: Infrastructure as Code (Ansible/Terraform) CI/CD and GitOps (e.g. Jenkins, ArgoCD More ❯
Malvern, Worcestershire, West Midlands, United Kingdom
Experis
IP, DNS, AV services) Security hardening & enterprise-grade monitoring Familiarity with SolarWinds Orion, VMware, and Dell server infrastructure Desirable Extras Unix/Linux administration Cisco networking & multicast streaming understanding Vulnerabilityscanning (Nessus) Agile delivery mindset Confidence working independently and collaboratively in technical scenarios If this is the role for you please submit your CV at your earliest convenience. More ❯
skills, clean coding habits, git workflows, and excellent communication skills. Nice to Have Experience with auto-update flows, code-signed installers, and desktop-browser interoperability. Knowledge of security/vulnerabilityscanning pipelines for desktop agents. Exposure to BDD tooling (Cucumber, SpecFlow). Benefits Competitive salary Flexible, remote-first environment (occasional in-person sessions fully expensed) 25 days annual More ❯
Experience with Web, Mobile, API & Network Pentesting Education and awareness of current vulnerabilities, tools, and exploitationtechniques Designing proof of concepts, demonstrating vulnerabilities to the wider business Utilising automation and vulnerabilityscanning where available Producing reports in a timely manner, to agreed standards Ensuring that penetration tests performed by the whole team are effective and scoped correctly Line managing More ❯
by design, resilient to threats, and aligned with best-in-class standards (including ISO 27001 and SOC 2). You'll play a key role in monitoring, incident response, vulnerability management, and secure DevOps practices-helping us maintain customer trust and regulatory compliance as we scale. What You'll Do Monitor systems and infrastructure for potential vulnerabilities, threats, and … breaches Own and improve incident detection, response, and recovery processes Implement and manage SIEM, intrusion detection, vulnerability scanners, and other security tooling Collaborate with DevOps and Engineering to embed security into CI/CD pipelines and cloud infrastructure (Azure) Manage processes for regular vulnerability assessments and penetration testing (internal or third-party) Support internal audits, ISO 27001 compliance … best practices What We're Looking For Extensive experience in security operations roles, preferably in SaaS or cloud-native environments Proficiency in security monitoring tools such as SIEM, EDR, vulnerability management tools, and log aggregation platforms Strong knowledge of security frameworks, standards, and best practices (ISO 27001, SOC 2, GDPR) Proven incident response, threat detection, and investigation experience Experience More ❯
you'll be doing from day one Design and implement robust, forward-thinking security strategies, policies, and procedures to safeguard our systems, networks, and data. Lead regular security assessments, vulnerability scans, and penetration tests to identify risks and deploy effective remediation measures. Monitor systems, networks, and logs then Investigate security breaches, incidents, and other cybersecurity events. Oversight of compliance … and GCP environments (Azure experience is a plus), especially in multi-region and data-rich setups Security-minded problem solver - You have hands-on experience with firewalls, SIEM tools, vulnerability scanners, and other security technologies that protect systems Risk assessment pro - You enjoy identifying vulnerabilities, evaluating threats, and making informed security decisions backed by solid data Technical communicator - You More ❯
offensive security testing . You will lead manual and automated penetration testing, manage AppSec tooling (SAST, DAST, SCA), and build developer enablement programs. You'll also be responsible for vulnerability management, incident response for application-layer events, and ensuring compliance alignment for SOC 2, ISO 27001, and privacy requirements. This role blends offensive and defensive expertise with strategic influence … Simulate adversary attack scenarios to validate controls and identify gaps. Secure SDLC Integration Embed security into every stage of development; implement automated security tooling in CI/CD pipelines. Vulnerability Management Triage and prioritize application-layer vulnerabilities and guide engineering teams through remediation. Developer Enablemen t Deliver secure development and coding training; create resources to reduce recurring vulnerabilities. Bug … security. Deep expertise securing multi-tenant SaaS platforms and features. Strong communication and ability to influence software engineers and product managers. Advanced experience conducting penetration tests, code reviews, and vulnerability assessments. Expert knowledge of OWASP Top 10, web application and API security, and common vulnerability classes with practical remediation strategies. Hands-on experience with AppSec tooling (SAST, DAST More ❯
on in architecture, engineering, and compliance, while leading the charge on modern, cloud-first security strategy. Responsibilties: Designing and implementing robust security policies, controls, and infrastructure protection strategies. Leading vulnerability management efforts, penetration testing, and remediation plans. Monitoring and investigating security events, managing incident response processes end-to-end. Ensuring compliance with security standards such as ISO 27001 and … or high-trust industries). Hands-on expertise in cloud security (preferably AWS), including securing hybrid and multi-region architectures. Practical knowledge of security tooling: IDS/IPS, SIEM, vulnerability scanners, encryption, SAST/DAST tools, OWASP ZAP, etc. Strong understanding of network security protocols and best practices. Scripting and automation experience (e.g. Python). Proven experience with incident More ❯
modelling and architecture reviews are consistently applied across all development efforts. You will work closely with engineering, and platform teams to integrate security into CI/CD pipelines, automate vulnerability detection, and drive continuous improvement in application security posture. Responsibilities Secure Development Lifecycle (SDLC) Embed security controls into CI/CD pipelines and development workflows. Implement and manage SAST … in application security or secure software development. Strong understanding of OWASP Top 10, secure coding techniques, and threat modelling. Experience with security tools such as SAST, DAST, SCA, and vulnerability scanners. Familiarity with cloud platforms (Azure or AWS), CI/CD pipelines, and DevOps practices. Knowledge of regulatory frameworks (ISO 27001, FCA, NIST). Excellent communication skills and ability More ❯
Trust in digital transactions and financial technologies is crucial for the smooth functioning of modern society. Neelam Kadbane, our next pathbreaker, Senior Vulnerability Analyst at Mastercard, identifies and addresses security vulnerabilities within Mastercard's environment & products by conducting network penetration tests. Neelam talks to Shyam Krishnamurthy fromThe Interview Portal about the innumerable challenges and the satisfacation of her work … . It was a significant achievement for me, especially since it's rare for companies to hire freshers directly into the InfoSec domain. At Qualys, I worked with the Vulnerability Management team, where we researched new CVEs and zero-day vulnerabilities, and developed signatures for vulnerability scanners. A zero-day vulnerability is a security flaw in software … or hardware that is unknown to the vendor or developer. Since the vendor is unaware of the vulnerability, no patch or fix is available, making it highly dangerous. The term "zero-day" comes from the fact that once the vulnerability is discovered by malicious actors, the vendor has zero days to fix it before it can be exploited. More ❯
policies and standards are applied through a hands-on, consultative approach Translate technical risk into business-friendly language for a range of audiences Scope and support penetration testing and vulnerability assessments, ensuring timely remediation Conduct impact assessments in line with Smart Energy Code, GDPR, and internal policy Deliver artefacts such as Supplier Security Assessments, Software Security Reviews, and Business … security assurance in complex, fast-paced environments Broad knowledge of IT and security frameworks, regulations, and best practices (e.g., ISO 27001, DPA, GDPR) Familiarity with security tools such as vulnerability scanners, SIEM, DDoS protection, remote access, authentication/authorisation technologies, and data loss prevention Understanding of OWASP top vulnerabilities and methodologies Technical knowledge of cloud, networking, virtualisation, mobile technologies More ❯
trustworthy security configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations More ❯