cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
cyber security strategies and roadmaps Technical proficiency in a wide range of cyber risk management services, including cyber threat, risk and control assessments, secure software development practices, penetration testing, vulnerability assessments, among others Sound knowledge of applicable laws, compliance regulations, and industry standards as it relates to privacy, security, and compliance Sound knowledge of applicable frameworks, including MITRE ATT More ❯
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerabilityassessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerabilityassessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
london (city of london), south east england, united kingdom
WillHire
and incident response workflows in a fast-growing tech environment . Key Responsibilities Assist in monitoring and analyzing network traffic, logs, and system alerts to identify potential threats Perform vulnerability assessments and help implement remediation strategies Participate in penetration testing and report exploitable weakens Assist with hardening of systems, identity & access management, and secure configuration of cloud assets Research … in CTFs, bug bounty, or cybersecurity clubs/communities What You'll Get Real-time exposure to cybersecurity operations within a tech-driven product environment Hands-on training in vulnerabilityassessment, threat hunting & compliance 1:1 mentorship from seasoned cyber professionals & exclusive learning resources Internship Certificate & Letter of Recommendation upon successful completion Opportunity for a Pre-Placement Offer … PPO) at WillHire or with our client organizations Hiring Process Online Application Resume + short write-up on your cybersecurity interests/projects Security Aptitude TestMCQ + scenario-based assessment on networking & cyber fundamentals Technical Interview Live discussion around vulnerabilities, tools, and problem-solving Managerial Interview Assess motivation, culture fit, communication skills Offer Formal internships offer with stipend details More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetration testing, vulnerabilityassessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
london (city of london), south east england, united kingdom
dnevo Partners
carrying out reviews and supporting improvements across technical and procedural controls. Strong skills in documentation, analysis, and reporting. Technical knowledge of cybersecurity concepts and practices. (Desirable) Familiarity with SIEM, vulnerabilityassessment, incident detection, and system hardening. (Desirable) Exposure to tools such as Microsoft Sentinel, Darktrace, Carbon Black, or Qualys. General IT knowledge, with an understanding of IT operations More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
knowledge of cybersecurity who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and More ❯
Cloud platform, providing stability and policies and procedures. Support the development and delivery of a comprehensive ISP for the entire organization. Perform periodic and on-demand system audits and vulnerability assessments of systems, internal applications and Cloud services to identify security vulnerabilities. Monitor compliance with the organization's information security policies and procedures among employees, contractors and third parties. More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
london (city of london), south east england, united kingdom
RiverSafe
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Qualifications and Skills 45 years of IT security auditing or consulting experience. Bachelors degree in information security or related field. Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. Strong understanding of cloud environments and network architectures. More ❯
Qualifications and Skills 45 years of IT security auditing or consulting experience. Bachelors degree in information security or related field. Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. Strong understanding of cloud environments and network architectures. More ❯
East London, London, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
City of London, London, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
Central London / West End, London, United Kingdom Hybrid / WFH Options
CONTROLCASE LIMITED
Skills • 4–5 years of IT security auditing or consulting experience. • Bachelor’s degree in information security or related field. • Deep knowledge of IT security controls, access management, logging, vulnerabilityassessment, and secure system configuration. • Experience with PCI DSS, ISO 27001/2, GDPR, NIS2, DORA, or similar compliance frameworks. • Strong understanding of cloud environments and network architectures. More ❯
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯
london (city of london), south east england, united kingdom
DJRecruit Asia
They are currently seeking a DeFi Security Engineer for their London office. This role focuses on supporting the security of their Crypto trading infrastructure and OTC platform Responsibilities: Conduct vulnerability assessments, threat modeling, and penetration testing across infrastructure, smart contracts, and OTC-specific components Lead system hardening, network segmentation, identity management, and rapid incident response for DeFi and OTC More ❯