expert advice and guidance on security best practices for AI development and deployment. Stay up to date on the latest AI security threats and vulnerabilities. Conduct security audits and penetrationtesting of AI systems. Collaborate with data scientists, AI engineers, and other stakeholders to ensure security is integrated throughout the AI lifecycle. Communicate security risks and recommendations effectively More ❯
Code (Terraform, CloudFormation) Experience with Jira or similar ticketing systems Technical architecture review skills Vulnerability identification (CWE, OWASP) Operating systems and hardening techniques Development concepts like CICD, Pipelines, SDLC Penetrationtesting knowledge (useful) Familiarity with Cloud Development Kit (CDK), GitOps Experience in DevOps/agile environments Docker, Kubernetes, serverless, Helm Platforms like Snowflake, MongoDB, Terraform Cloud, GitHub, Databricks More ❯
IP Experience programming in Python, Ruby, Go, Swift, Java, .Net, C++ or similar object-oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions at the business division level More ❯
Security Tooling: Contribute to the creation and maintenance of in-house tools that enhance our security capabilities and automation. Product Security Support: Assist in security assessments, threat modeling, and penetrationtesting, working closely with the Product Security team. Secure Development Lifecycle: Help implement and improve security gates within the SDLC. Adapt & Collaborate: Be prepared to dive into any More ❯
ideas and technical skills will directly impact the security of our systems and services Key Responsibilities Support the development and implementation of secure coding practices. Assist in application security testing and vulnerability assessments. Collaborate with developers to embed security into the SDLC. Help design and maintain automated security testing workflows. Contribute to vulnerability reporting and security recommendations. Apply … multitasking abilities. Effective communicator across technical and non-technical teams. Driven, proactive, and committed to continuous improvement. You will have Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threat modelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx … please let us know Geographical area Europe, United Kingdom City London Bachelor Degree/BSc Degree or equivalent Degree Experience Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threat modelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx More ❯
Logic Apps. Administering security tools, including firewalls, endpoint protection, and vulnerability management systems. Ensuring data security by managing encryption, access controls, and compliance requirements. Performing security assessments, audits, and penetration testing. Developing security automation processes for identity and access management (IAM), network security, and patch management. Collaborating with stakeholders to ensure security best practices are integrated into new and More ❯
South Croydon, London, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
Consultant - SC Cleared - Inside IR35 Remote with travel to Croydon 6 months+ contract ASAP Start £600-650 per day The Role Our client is currently developing an internal Security Testing capability that will operate out of the Quality Assurance and Testing function. As a Principle Cyber Security Professional, your role will be embedded in the Cyber Security function … working day to day with senior security stakeholders to lead the continued development of the security testing service and represent security testing for the client. Communication and professionalism are critical for this role as you will be working collaboratively with senior Security colleagues across the organisation on a day-to-day basis. Working within Security Testing, you … will play a leading role in delivering security testing, vulnerability assessment and continual security compliance capabilities in order to secure services and to ensure the best possible technical security risk-based advice is given to our customers. You will work collaboratively with key business & technical stakeholders, to deliver appropriate security testing risk based technical security advice and guidance More ❯
overall security posture. Key responsibilities: Conducting comprehensive security assessments: This involves evaluating an organization's IT infrastructure, networks, systems, and applications to identify potential weaknesses and vulnerabilities. Performing vulnerability testing and penetrationtesting: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threat analysis schedules and staying More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Global TechForce
overall security posture. Key responsibilities: Conducting comprehensive security assessments: This involves evaluating an organization's IT infrastructure, networks, systems, and applications to identify potential weaknesses and vulnerabilities. Performing vulnerability testing and penetrationtesting: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threat analysis schedules and staying More ❯
of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetrationtesting activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security … as Tenable SME and guiding teams with best practice and training. Essential Experience of the Vulnerability Analyst: Proven hands-on Tenable experience is Essential. Experience conducting vulnerability assessments and penetration testing. Strong background in Threat and Vulnerability management. Experience with frameworks such as ISO27001, NIST and CIS. Comfort working with stakeholders or independently. Build VM functions from scratch. Strong More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetrationtesting activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security … as Tenable SME and guiding teams with best practice and training. Essential Experience of the Vulnerability Analyst: Proven hands-on Tenable experience is Essential. Experience conducting vulnerability assessments and penetration testing. Strong background in Threat and Vulnerability management. Experience with frameworks such as ISO27001, NIST and CIS. Comfort working with stakeholders or independently. Build VM functions from scratch. Strong More ❯
cyber domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetrationtesting and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why More ❯
City of London, London, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
cyber domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetrationtesting and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why More ❯
South East London, England, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
cyber domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetrationtesting and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why More ❯
expertise in AI security . Deep understanding of machine learning, neural networks, and adversarial attacks . Proficiency in cryptographic techniques and secure AI model development . Strong experience with penetrationtesting, threat intelligence, and security auditing . Familiarity with frameworks such as NIST AI Risk Management and Secure AI development guidelines. Excellent problem-solving skills and ability to … service, and other categories protected by federal, state or local law. Reasonable Accommodations If you require a reasonable accommodation in completing a job application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please fill out the accommodations form by clicking on this link Accommodation for disability form . If you're unable to More ❯
potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for NAC upgrades and troubleshooting. 4. IP Telephony Support More ❯
potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for NAC upgrades and troubleshooting. 4. IP Telephony Support More ❯
A global quantitative trading firm specializing in algorithmic and high-frequency trading (HFT) is hiring a Cyber Security Engineer (2-4 years' experience) to operate in a broad, vendor-agnostic security environment. This fully onsite role (5 days per week More ❯
Responsibilities Plan, research, and execute testing of computer systems and applications to simulate real-world attacks on Microsoft's services and infrastructure. Assess existing security capabilities to detect and respond to emerging threats. Outline and document risk impacts in executive summary reports and communicate findings to relevant stakeholders. Perform research to stay current with penetrationtesting tools … methodologies, tactics, and mitigations. Participate as an infrastructure/operation specialist in overt penetrationtesting engagements, including Purple Team exercises where we emulate real-world adversaries. Develop and maintain penetrationtesting procedures and methodologies. Conduct research to remain updated with the latest in application security, both offensive and defensive techniques, and share findings within the Microsoft … Security Community. Qualifications Experience in identifying security vulnerabilities, software development lifecycle, large-scale computing, modeling, cyber security, and anomaly detection. Experience with penetrationtesting/red-teaming, cloud, services, and network security. Strong coding skills in languages such as C#, Python, C++, Go, PowerShell, ASP.NET, JavaScript. Preferred: Master's degree in computer science, software engineering, information security, or More ❯
PenetrationTesting Team Lead - AVP PenetrationTesting Team Lead - AVP Apply locations London time type Full time posted on Posted 3 Days Ago job requisition id -WD Do you want your voice heard and your actions to count? Discover your opportunity with Mitsubishi UFJ Financial Group (MUFG), one of the world's leading financial groups. Across … securities business under a dual-hat arrangement. Develop and maintain governance structure of red team operations and train, and mentor other members of the Red Team. Develop and execute penetrationtesting plans, including network, web application, and social engineering assessments. Collaborate with SOC team and selected vendor to plan and execute annual purple team testing. Identify security risks … and vulnerabilities through simulated attacks, and helping the organization understand the potential impact. Manage Red Team tools and the Security Testing & Validation Platform. Lead and manage a team of security professionals and vendor resources to conduct regular risk assessments to identify and exploit vulnerabilities, mis-configurations within EMEA internal & external infrastructure. Implement and maintain governance of any assessments finding More ❯
Synack's PenetrationTesting as a Service platform manages customers' attack surfaces by discovering new assets, pentesting for critical vulnerabilities and gaining visibility into the root causes of security risks. We are committed to making the world more secure by harnessing a talented, vetted community of security researchers to deliver continuous penetrationtesting and vulnerability management … Technical Account Manager (TAM) serves as a technical advisor and advocate, helping our customers achieve maximum value from our product and services. You will have a deep understanding of penetrationtesting attack surfaces and a knack for developing unique solutions that align to customer goals. Your technical knowledge and client-focused approach enable you to scope and monitor … penetration tests executed by our Synack Red Team (SRT). The Senior TAM partners with customers to ensure health and quality of engagements, as well as identify and articulate how our solutions can enhance their overall strategic security testing goals. The ideal candidate will have experience in the cyber security industry, a consultative approach to working with customer More ❯
Pentest People is a UK-based security consultancy specialising in providing PenetrationTesting as a Service to all its clients. Our innovative approach to security testing merges the benefits of consultant-led penetrationtesting with ongoing vulnerability assurance through our advanced SecurePortal. We are expanding our Incident Response team and are looking for a DFIR More ❯
Conditional Access systems Maintain security certificates, encryption keys, and IDS/IPS systems Deliver cybersecurity awareness training and lead ad-hoc security projects Support and resolve issues identified during penetrationtesting Ideal Experience We’re looking for someone with strong hands-on experience in most of the following technologies: Essential: CrowdStrike EDR Mimecast Duo, Okta Rapid7 IVM, Tenable … patching Kali Linux, Metasploit, NMAP, BurpSuite Candidate Profile Professional certifications such as CISM, MS SC100/200/900, OSCP are advantageous Background in financial services, SOC environments, or penetrationtesting preferred Strong interpersonal and communication skills, with the ability to engage across teams and deliver training effectively Able to manage multiple priorities and collaborate cross-functionally What More ❯