Remote Vulnerability Assessment Jobs in Gloucestershire

17 of 17 Remote Vulnerability Assessment Jobs in Gloucestershire

Penetration Tester

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Penetration Tester

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Harrington Starr
Harrington Starr have partnered with a global multi billion pound business in Belfast as they seek a Vulnerability and Penetration Testing Engineer to join their Belfast Centre team in providing security architecture, vulnerability and risk assessment. We are open to speaking to suitable canddiates who may be open … for secure system design. This includes meeting requirements outlines in the ISMS Policy, client contracts, regulatory expectations, and professional obligations. Architect, implement, and support assessment solutions identified as necessary for the protection of firms assets. Continually evaluate relevant products, tools, scripts, and techniques that improve existing assessment capabilities. … Essential Criteria: r+ years in a pen test role Excellent knowledge of Vulnerability and Penetrating Testing concepts and best practices, including the requirements for WhiteHat/Ethical Hacking. Experience with automated tools such as Nessus, Appscan, Burp Suite, Nipper, and Trustwave. Expert understanding of the difference between a vulnerability More ❯
Posted:

Information Security Analyst

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Information Security Analyst

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Intec Select
and systems for security breaches, intrusions, and abnormal system behavior Investigate security incidents, perform root cause analysis, and provide incident response support Conduct regular vulnerability assessments and penetration testing; assist in remediation efforts Maintain and manage SIEM (Security Information and Event Management) tools and log analysis Develop and enforce … e.g., CIA triad, defense in depth) Experience with SIEM tools, intrusion detection/prevention systems (IDS/IPS), firewalls, and endpoint protection Familiarity with vulnerability scanning tools (e.g., Nessus, Qualys) and remediation processes Knowledge of networking protocols, operating systems (Windows, Linux), and cloud platforms Excellent analytical, problem-solving, and More ❯
Posted:

Product Security Engineer

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST More ❯
Employment Type: Permanent
Salary: GBP 60,000 Annual
Posted:

Product Security Engineer

Bristol, Kendleshire, Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetration testing, vulnerability assessments, and remediation activities. Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST More ❯
Employment Type: Permanent
Salary: £60000/annum
Posted:

Cyber Security Engineer

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Sparta Global Limited
role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. Penetration Testing & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

IT Network Engineer

Bristol, Gloucestershire, United Kingdom
Hybrid / WFH Options
Michael Page (UK)
detection/prevention systems (IDS/IPS). Ensure compliance with industry regulations and best-practices (GDPR, HIPAA, PCI-DSS, CIS). Conduct regular vulnerability assessments and implement security patches and updates. Collaboration and Documentation Work closely with other IT teams across the business and across the wider organisation More ❯
Employment Type: Permanent
Salary: GBP Annual
Posted:

Technical Support Engineer Tier I

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Technical Support Engineer Tier I

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Action1
the first 200 endpoints, with no functional limits. Featuring unified OS and third-party patching with peer-to-peer patch distribution and real-time vulnerability assessment with no VPN needed, it enables autonomous endpoint management that preempts ransomware and security risks, all while eliminating costly routine labor. Trusted More ❯
Posted:

Software Tester / UK

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Software Tester / UK

gloucester, south west england, United Kingdom
Hybrid / WFH Options
G&L Consulting
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing Vulnerability Assessment and Penetration Testing (VAPT) Test Management Selenium More ❯
Posted:

Security Architect

Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Employment Type: Permanent
Salary: GBP 85,000 Annual
Posted:

Security Architect

Bristol, Kendleshire, Gloucestershire, United Kingdom
Hybrid / WFH Options
SSR General & Management
ensuring products meet regulatory and industry standards. Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Employment Type: Permanent
Salary: £85000/annum
Posted:

Security Analyst

gloucester, south west england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

Security Analyst

cheltenham, south west england, United Kingdom
Hybrid / WFH Options
Accelerant
for improvement, and implement changes aligned with best practices. Monitor and address emerging threats, vulnerabilities, and security trends, ensuring timely implementation of countermeasures. Perform vulnerability assessments, threat analysis, and incident response. Participate in Incident response efforts by conducting log analysis, gathering evidence, and executing remediation tasks. Work closely with … background in another technical area such as helpdesk, systems administration, or development. Experience managing the security of endpoints to include endpoint protection, baselines, and vulnerability management. Previous experience implementing and/or managing DLP tools such as Microsoft Purview or DTEX. Experience working in a cloud environment with a More ❯
Posted:

RF Engineer - Defence

Gloucester, Gloucestershire, South West, United Kingdom
Hybrid / WFH Options
Anson Mccade
support the development of next-generation RF systems. This role involves contributing to a variety of secure, high-impact projects focused on RF communications, vulnerability analysis, and mission system design. The position provides exposure to the full RF engineering lifecycle, from circuit modelling and antenna design through to system … to meet specific system requirements Select and optimise antennas for specialised applications Perform real-time RF testing using spectrum and vector network analysers Conduct vulnerability assessments on embedded RF systems Develop specialist RF research and test tools Support system development and verification activities, including trial involvement Required Experience: Practical … with software-defined radios and associated development workflows Desirable Skills: Digital Signal Processing (DSP) and RF algorithm development Antenna optimisation and characterisation Embedded systems vulnerability analysis Working knowledge of tools such as OpenCPI, GnuRadio, VHDL, Python, C/C++ Development experience on Linux platforms and familiarity with Git-based More ❯
Employment Type: Permanent, Work From Home
Salary: £75,000
Posted: