cheltenham, south west england, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerabilityMore ❯
Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat More ❯
Key Responsibilities: Lead and manage a cybersecurity team, overseeing the implementation of security strategies. Develop and enforce cybersecurity policies, standards, and best practices. Conduct vulnerability assessments and manage compliance with security frameworks. Oversee security incident response, forensic investigations, and risk mitigation strategies. Monitor networks and systems, ensuring proactive threat More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
PURVIEW
automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
PURVIEW
automation capabilities that are aligned to the strategic goals of the business and IT. TYPICAL RESPONSIBILITIES: Conduct regular security assessments, including penetration testing and vulnerability assessments, to identify and remediate potential security risks. Design and implement secure network architectures, including firewalls, intrusion detection/prevention systems, and encryption technologies. More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & VulnerabilityAssessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
Digital Waffle
and recommend hardware/software upgrades. Security & Compliance; Implement and manage network security policies, firewalls, and intrusion detection systems (IDS/IPS). Perform vulnerability assessments and network penetration testing. Ensure compliance with ISO 27001, GDPR, SOC 2, and other industry standards. Cloud & Virtualization Networking; Manage cloud networking (AWS More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
in security threats and vulnerabilities , staying ahead of emerging risks and continuously refining response strategies to mitigate future incidents. Participate in threat hunting and vulnerability assessments, working with cross-functional teams to identify and close gaps in security while ensuring business operations run smoothly. Support internal and external stakeholders More ❯
in security threats and vulnerabilities , staying ahead of emerging risks and continuously refining response strategies to mitigate future incidents. Participate in threat hunting and vulnerability assessments, working with cross-functional teams to identify and close gaps in security while ensuring business operations run smoothly. Support internal and external stakeholders More ❯
supporting bids and proposals. An operational cyber researcher has broad skills which generally involve, but are not limited to, the following activities: Exploratory Research Vulnerability & Technical Research Experimental Development Key Responsibilities Researchers undertaking exploratory research are expected to: Rapidly summarise and assess new domains Provide domain knowledge for technical … analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerabilityassessment techniques such as fuzzing and code injection Researchers undertaking experimental development … experience in at least one of the areas below. An ideal candidate will cover several areas. Skills Technical Analysis: Network traffic analysis Reverse engineering Vulnerability analysis Exploit development Exploratory Research: OSINT and interacting with SMEs Developing new research skills as appropriate General: Technical Leadership Team management Knowledge Exploratory Research More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerabilityassessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
Sentinel
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
Sentinel
in GCP. • Proven background in marketing data environments, understanding infrastructure needs for marketing analytics and CDPs. • Demonstrable experience leading/contributing to security audits, vulnerability assessments, and compliance initiatives (GDPR, ISO 27001) within GCP. • Expertise in IaC with a strong preference for Terraform. • Profound understanding of GCP networking, security More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
gloucester, south west england, United Kingdom Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing VulnerabilityAssessment and Penetration Testing (VAPT) Test Management Selenium More ❯
cheltenham, south west england, United Kingdom Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing VulnerabilityAssessment and Penetration Testing (VAPT) Test Management Selenium More ❯