applied knowledge within relevant area. Apply link Copy link Bachelor's degree or equivalent practical experience. 5 years of experience in cybersecurity, with an offensive security (e.g., Red Teaming, PenetrationTesting, or Adversary Simulation) or threat modeling. Experience in a Security Operations Centre (SOC) or similar environment, with modern threat landscapes and attack techniques. Experience in technical troubleshooting … cluster configuration, workload hardening, and threat detection in containerised environments. Experience in building or maturing security culture initiatives, including awareness programs, gamified training, or executive engagement. Experience with security testing tools and frameworks (e.g., MITRE ATT&CK, Cobalt Strike, Metasploit, Burp Suite, or similar). About the job The UK Security Operations (SecOps) team in Google Public Sector delivers More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Iceberg
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯
Responsibilities: Develop and refine security monitoring controls and use-cases to detect threats and anomalies. Investigate security incidents, conduct forensics analysis, and manage incident response processes. Collaborate with independent penetrationtesting programs and support risk assessment processes. Implement and mature threat intelligence capabilities and integrate with security monitoring frameworks. Develop and oversee vulnerability management programs, ensuring alignment with More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetrationtesting, vulnerability assessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
Mimecast) MFA/SSO (e.g., Duo, Okta) Vulnerability scanners (e.g., Rapid7, Tenable, Nessus) InTune and Conditional Access Exposure to: Imperva WAF KnowBe4 Certificate management tools Kali Linux toolset and penetrationtesting basics Qualifications: Working towards or holding certifications such as SC-200, SC-900, OSCP, or similar. Strong communication skills and an eagerness to learn and grow. Experience More ❯
of SOC and security services managed through the IT function and external partners. Embed secure-by-design and privacy-by-design principles across IT and product teams; oversee SDLC, penetrationtesting, and coordinated disclosure. Direct 24 7 SOC operations, threat hunting, red/blue teaming, and crisis response through internal and external teams. Collaborate with data and legal More ❯
all things security management-able to "pull the plug" on a feature, application, or other business function if it presents a significant risk to the company. You will: Conduct penetration tests against web applications infrastructure Validate security on new hardware and software infrastructure Assist front-line company representatives with security questions Manage firewall rules and internal pentesting Manage SOC … pentesting Manage priorities through backlog management system (Jira) Come to work, do great things, then go home! What You Need to Get the Job Done 3+ years experience performing penetrationtesting (against web applications) Experience securing cloud-based infrastructures and solutions Previous experience working on an information security team Advanced knowledge of common security vulnerabilities (OWASP) and best More ❯
implemented. Investigate and respond to security incidents and queries, coordinating with relevant teams. Continuously monitor IT infrastructure for vulnerabilities, anomalies, and other potential security issues. Plan and coordinate external penetration tests to identify and address security weaknesses. Compile and deliver regular reports (monthly and quarterly) on the organisation's security status and risk landscape. Manage and maintain content on … Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetrationtesting and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are an advantage Solid hands-on experience managing and administering SIEM platforms for threat detection and incident More ❯
IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerability scanning, and penetrationtesting of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and compliance teams to More ❯
IAM, Security Command Center, VPC Service Controls) and Azure/M365 (e.g., Azure Security Center, Azure AD, Microsoft Defender for Cloud). Conduct regular security assessments, vulnerability scanning, and penetrationtesting of cloud infrastructure and applications. Monitor cloud environments for security threats, anomalies, and incidents, and lead incident response efforts. Collaborate with development, operations, and compliance teams to More ❯
lifecycle. You'll help establish a robust security culture as we unlock Granola for the next 100x users. In this role, you will: Conduct security assessments, code reviews, and penetrationtesting to identify vulnerabilities in our applications Design and implement security tools, frameworks, and methodologies to protect against security threats Work closely with development teams to ensure secure More ❯
Cyber Security Assessments and audits across Microsoft 365 and Azure environments Performing Cyber Essentials and Cyber Essentials PLUS audits in line with IASME standards Delivering vulnerability assessments, remediation, and penetrationtesting across infrastructure, networks, and applications Contributing to client reporting, assurance audits, and scoping security solutions Acting as an escalation point for security-related technical queries and pre More ❯
part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve. BASIC QUALIFICATIONS Extensive experience performing security investigations, penetrationtesting, and/or incident response in the context of large organizations. In-depth understanding of security threats, hands-on experience detecting and defending from cyber attacks, and More ❯
security engineer. The successful candidate will have experience gained in a broad, hands-on security engineering position. Relevant certifications such as CISM and/or Microsoft certifications are desirable. Penetrationtesting experience or certifications would be beneficial. Hybrid working is available (3 days in central London). The salary is £75,000 base plus benefits and bonus. More ❯
Strongly Preferred AZ-400: Azure DevOps Engineer Expert Desirable Desirable Skills & Experience Experience with API standards and interoperability frameworks Familiarity with: Secure Software Development Lifecycles (SSDLC) Vulnerability management and penetrationtesting coordination SaaS or multi-tenant platform delivery models Data protection regulations (e.g. GDPR, ISO 27001) Disaster Recovery (DR), high availability (HA), and business continuity planning Observability tooling More ❯
Windows Server OSes Windows 10 & 11 Desktop MS 365 Apps The ideal candidate will possess a solid understanding of CIS & NCSC security best practices, along with expertise in Pen Testing and Vulnerability remediation. Requirements Strong technical skills in VMware, Veeam, HPE, SCCM, and more. Confidence in on-site client support in the financial industry. Effective communication skills. Ability to More ❯
processes. Help proactively assess security risk through product deep dives, threat modeling, and design, architecture and implementation reviews Review and improve existing security processes related to product assessments, pen testing, and bug bounty findings. Develop product security controls and supervising strategies to grow our threat detection capabilities. Seek opportunities for security tooling and automation WHAT YOU'LL BRING: 5+ … of common vulnerabilities and emerging threats. Experience with authentication and authorization standards, including OAuth and SAML, and their weaknesses. Detailed knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits. Experience with Cloud Computing providers like AWS, GCP, Azure. Problem solving skills to resolve problems effectively and creatively while maintaining a high More ❯
required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetrationtesting techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent communication skills and a collaborative approach to problem … point during the recruitment process, if there is a better way for us to communicate, please do let us know. Developer, Engineer, Programmer, Java, Android, Mobile OS, Malware, Virus, Penetration Test, Threat, OSCP, Cyber, Infosec, Security, Information Security, Pentest #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetrationtesting techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent communication skills and a collaborative approach to problem … point during the recruitment process, if there is a better way for us to communicate, please do let us know. Developer, Engineer, Programmer, Java, Android, Mobile OS, Malware, Virus, Penetration Test, Threat, OSCP, Cyber, Infosec, Security, Information Security, Pentest #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to More ❯
engineers. Drive Security Strategy & Standards Define and evolve our secure software development standards and guidelines. Lead the integration of security tools and automation into CI/CD pipelines. Coordinate penetrationtesting and assist with remediation and root-cause analysis. Lead with Thought and Action Stay current on application security threats, tools and trends and share knowledge internally. Mentor … collaboration skills; able to work cross-functionally with engineering, product and leadership. Nice-to-Haves Familiarity with JVM internals, Hazelcast or other distributed data systems. Experience conducting or coordinating penetration tests. Contributions to open-source security projects or involvement in the broader security community. BENEFITS 25 days Annual Leave + Bank Holidays + Quarterly Wellbeing Days Group Company Pension More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
the following skills and experience: - Relevant cyber certifications - Experience in either a Cyber Analyst or Cyber Engineer role - Knowledge on SIEM and EDR tools - Experience in network audits and penetrationtesting - Infrastructure support experience - Knowledge on security frameworks More ❯
India Payments organization. - Leverage this understanding to conduct architecture reviews, threat modelling and manual code reviews on web applications, mobile applications and other relevant services. - Interpret security tools and penetrationtesting results to stakeholders, providing advice on vulnerability remediation and risk mitigation. - Create relevant documentation and metrics to your stakeholders and business leaders and deliver these in a More ❯
roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensic analysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements More ❯
roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensic analysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements More ❯