right role and our obligations under the law. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
City of London, London, United Kingdom Hybrid / WFH Options
Akkodis
solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in PenetrationTesting and/or Security Monitoring Understanding of networking and infrastructure design Active or ability to obtain SC clearance Knowledge/experience of more »
help customers implement incident response plans, which outline steps to take in case of a security breach. 3. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required 4.Recommend, design and implement security tools and technologies such more »
distributed teams across multiple regions and time zones. SSDLC practices in DevOps, CI/CD environment. OWASP Top 10, SANS CWE, OpenSAMM, BSIMM, etc. Penetrationtesting, vulnerability scanning Implementation of security monitoring tools. Implementing pipelines that make use of SCA, SAST, DAST, IAST and RASP solutions. Qualifications SANS more »
Terraform, CloudFormation, or ARM. Conduct security reviews and audits of IAC templates to identify and mitigate risks. Perform regular security assessments, vulnerability management, and penetration testing. Risk Management and Compliance Identify and assess security risks and develop mitigation strategies. Ensure compliance with relevant security standards and regulations Maintain and more »
and customer contractual requirements, managing and updating business continuity and disaster recovery plans, supporting 3rd party audits and liaising with partners to conduct external penetration testing. Location/WFH: You can work from home most of the time, meeting up with colleagues in the London office once a week. more »
for this role - please do not contact us. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
development life cycle (SDLC) processes and methodologies.Knowledge of authentication mechanisms, encryption technologies, and security protocols such as IPSec, SSL, and SSH.Experience in developing and testing software using Python, C++, and Java.Excellent problem-solving skills and the ability to work well under pressure.Ability to communicate technical ideas and issues to … both technical and non-technical audiences.ResponsibilitiesCreating and implementing security protocols to ensure the security of IoT devices and applications.Developing and testing software to detect and prevent security breaches.Reviewing code and conducting risk assessments to identify vulnerabilities.Collaborating with cross-functional teams to ensure security and compliance are implemented throughout the … awareness programs to increase security awareness among employees.Leadership skills, ability to manage and develop a team.Identifying and managing threats and breaches to security infrastructure.Conducting penetrationtesting of IoT devices and applications to test security measures.Experience in developing and driving capability growth.Automotive cyber expertise would be desirable.Experience in securing more »
teams to identify security threats to their business. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
Stanmore, England, United Kingdom Hybrid / WFH Options
Sky
all right here at Sky. What you'll do Working with the business to drive down the number of open vulnerabilities identified by pen testing, SCA, SAST and Secrets scanning and ASM platforms. Formalising internal processes and documentation in relation to the relevant internal services provided. Vendor liaison and more »
date for applications is Tuesday 18th June 2024 Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
measures for cloud-based applications and services. Develop security strategies to protect sensitive data, including encryption, masking, and tokenization. Contribute to the design and testing of endpoint and network security tools. Collaborate with the security governance teams to create and maintain security policies and procedures. Design and implement network … employees, or any other part of our company. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
level with 3+ years experience in a similar role. Required: 3+ years' experience Experience with stakeholder management. Vulnerability management including incident priority. Incident management Penetrationtesting experience Knowledge of multiple technologies encompassing cloud Experience with Microsoft tech stack This client has a great company culture as well as more »
environmentYou have previous software development experience and a good understanding of modern programming approachesYou have worked with or lead various security exercises for example, penetrationtesting, security researching, red teaming or bug bounty programs;You have experience in architectural design of complex engineering solutions, in particular to security more »
achievers, you'll enjoy your career with us! Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
Security Engineer will join a highly skilled team of engineers to ensure the security of software systems by reviewing designs, auditing code, and performing penetration tests. The role involves developing and implementing vulnerability mitigation strategies, conducting risk assessments and threat modelling, and managing vulnerabilities using industry standards. You will … scheme What's required of the Software Security Engineer? Extensive software security experience, covering applications, networks and system security Experience with security protocols and penetrationtesting, if this has been with tools such as Burp Suite then even better! Ideally a relevant certification such as CISSP, CEH, OSCP more »
Engineer, preferably in the fintech industry. Have a deep understanding of web application security vulnerabilities, attack vectors, and mitigation strategies. Master the art of penetrationtesting with tools like Burp Suite, OWASP ZAP, and/or Kali Linux. Have experience with secure coding practices, threat modeling, and API more »
pen test, prof services) etc, and clients. They are looking for an experienced Delivery Operations Manager with a strong background in professional services (ideally penetrationtesting) and a proven track record in managing client engagements and service delivery. You will be responsible for overseeing the delivery of professional more »
the Smart Metering infrastructure, as well as how it is governed, is therefore essential to the role. There are five Technical Sub-Committees covering testing, governance, technical architecture, operations, communications, and device assurance.Our Technical Sub-Committees comprise key industry stakeholders (SEC Parties) representing Energy Suppliers, Equipment Manufacturers, Network Operators … planning for the Scheme, oversight of technical projects related to the Scheme, ensuring Scheme Documents are maintained, and effectively managing the delivery of external testing capability, both contractually and from a service perspective, ensuring any procurements or contract extensions are put in place. Line Management of technical Consultants Competitive … Summer and Christmas parties, along with monthly Gembar Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in Ethical Hacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title or skills, toolset and more »
Are you a cyber security expert with a passion for consulting and presales? Do you have experience with HLD (High Level Designs) and customer presentations? Do you have a broad technical background within Cyber Security? Type: Permanent Salary: Commission - Â more »