/IPS, SIEM) to detect and analyze potential threats. Investigate security alerts, logs, and incidents (e.g., malware, unauthorized access, breaches). Assist in incident response and remediation efforts. 2. Vulnerability Management Conduct vulnerability assessments and support penetration testing. Collaborate with senior teams to patch systems and mitigate risks. 3. Network Access Control (NAC) Configure switches and endpoints for …/IP telephony). Technical Skills: Hands-on experience with OSPF, BGP, STP, NAC, and IPT (Cisco). Proficiency in network monitoring tools, NDR, and SIEM systems. Knowledge of vulnerabilityassessment tools and patch management. Soft Skills: Ability to work under pressure and handle emergencies. Strong communication and collaboration skills. Working Conditions: Flexibility for after-hours/weekend More ❯
APIs), RBVM, EASM, DRP. Deep understanding of cybersecurity frameworks, tools, and trends. Strong interpersonal and communication skills to build trust and effectively convey technical concepts. Experience in threat analysis, vulnerabilityassessment, and risk management. Knowledge of industry regulations and standards. Must possess strong knowledge of security tools, technologies, and methodologies. Should have hands-on experience with cloud security More ❯
You will be joining an AppSec team focused on building security automation into delivery pipelines and conducting security focused tests against digital services. Key Responsibilities Perform penetration testing and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and make necessary recommendations. Collaborate … AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethical hacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC scanning, etc.). Secure More ❯
best practices across our technology stack. What Excites You Develop world-class security practices and controls within a high-growth financial technology business shaping the future of payments. Conduct vulnerability assessments, penetration testing, and risk analysis to identify and mitigate security weaknesses. Embed security by design and threat modelling principles into product development. Lead incident response efforts, coordinating with More ❯
Azure AD. Networking & Security Administer and maintain enterprise networks using Cisco Meraki (firewalls, switches, APs). Monitor and secure infrastructure using Sophos Endpoint Protection , firewalls, and MDM. Conduct patching, vulnerability assessments, and contribute to security audits. Tooling & Systems Administration Maintain Atlassian tools ( Jira , Confluence ) used for ITSM and project collaboration. Script and automate tasks (using PowerShell, Bash, or Python More ❯
South Croydon, London, United Kingdom Hybrid / WFH Options
LA International Computer Consultants Ltd
working collaboratively with senior Security colleagues across the organisation on a day-to-day basis. Working within Security Testing, you will play a leading role in delivering security testing, vulnerabilityassessment and continual security compliance capabilities in order to secure services and to ensure the best possible technical security risk-based advice is given to our customers. You … Work with the growing security testing team to scope, conduct, or support security assessments, pen testing and other non-functional security testing, appropriately recording and sharing any findings. Provide Vulnerability management and continual security compliance expertise across on premise and cloud-based solutions. Work collaboratively with project managers and programme leads to provide subject matter expertise on a range … determine deviations from acceptable/defined baselines. Communicate threat, vulnerabilities, and risk information to stakeholders in a clear and concise manner. Research and assess new threats and security/vulnerability alerts, and recommend remedial actions. Essential Criteria Proven understanding and experience of how technical security is applied in real life environments, technical security controls, threats and vulnerabilities (incl. threat More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
Exabeam, Sentinel, Chronicle) and endpoint security platforms to the level of administration and deployment. Exposure to SOAR tools, observability tools and data stream processing tools Hands-on experience with vulnerabilityassessment tools, penetration testing methodologies and forensic analysis techniques. Experience in writing content/polices for monitoring in line with MITRE ATT&CK framework Familiarity with regulatory requirements More ❯
maintenance of a secure software development lifecycle (SDLC) with a focus on secure coding practices in languages like Python, C++, Rust, Go and Kotlin/Java. Conduct threat modeling, vulnerability assessments and security code reviews across different platforms, ensuring security is embedded at every stage of the development lifecycle. Provide mentorship, guidance, and training on security best practices and … systems. Extensive experience with one or more cloud platforms such as AWS, Microsoft Azure and Alibaba Cloud used in a hybrid environment. In-depth knowledge of threat modeling, risk assessment and development of mitigation strategies for large-scale, complex systems in a fast-paced environment. Experience integrating security scanning tools into CI/CD pipelines and runtime environments. Experience More ❯
technical skills will directly impact the security of our systems and services Key Responsibilities Support the development and implementation of secure coding practices. Assist in application security testing and vulnerability assessments. Collaborate with developers to embed security into the SDLC. Help design and maintain automated security testing workflows. Contribute to vulnerability reporting and security recommendations. Apply security best … Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threat modelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx or similar application security tools and API Security. Proficiency in programming languages such as Python. Supplementary Information Our commitment to … Recent experience in a relation to Application Security, Pen testing, Application Development, or a DevOps Internship/Apprenticeship. Understanding of application security concepts, including secure coding practices, threat modelling, vulnerability management, and access control mechanisms. Previous Experience with CheckMarx or similar application security tools and API Security. Technical skills required Proficiency in programming languages such as Python. General information More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
next-gen tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerabilityassessment, penetration testing, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience More ❯
About Apexanalytix At Apexanalytix, we help some of the world’s largest companies stay ahead of risk. Our Cyber Threat & Vulnerability team provides cutting-edge analysis, monitoring, and intelligence on third-party and supplier cyber threats — helping procurement and risk leaders understand and act on the hidden risks in their extended supply chains. The Opportunity We’re looking for … a rare chance to be part of a tight-knit team tackling real-world threats at scale. What You'll Be Doing Supporting the delivery of threat intelligence and vulnerability assessments for global clients in the form of reports, briefings and alerts. Monitoring threat actor activity, emerging vulnerabilities and cyber trends relevant to third-party risk. Contributing to the … and verbal communication skills and can present findings clearly to non-technical audiences. You thrive in a team but can work independently and take initiative. You’re familiar with vulnerability management concepts, including CVEs, patching, and risk prioritisation. Nice-to-Haves Familiarity with supplier or third-party risk management. Knowledge of cyber threat intelligence frameworks and concepts. Experience or More ❯
and make well-considered and informed recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from various systems for breaches … and collaborating with them to fulfill security requirements. Review daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetration testing of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc in Cyber More ❯
Your mission As a Security Analyst, you oversee incoming security vulnerability reports from our researchers' community, while continuously sharpening your cybersecurity skills. All of this happens through dedicated interaction with the researcher's community and with the goal of offering the best possible service to both companies and researchers. For this role, you will be working US hours, 2pm … Outstanding interpersonal abilities, and strong written and verbal communication skills. Fluent in English, both written and spoken. At least 2 years of experience in pen testing, security testing, or vulnerability assessments. Stress resistant & able to maintain focus during incidents. A strong understanding of the (Ethical) Hacker culture. Attention to detail, analytical, and problem-solving skills. Able to independently find More ❯
to monitor systems and investigate anomalies. Lead the response to security incidents, including root cause analysis and remediation. Produce incident reports and support regular testing of response protocols. Conduct vulnerability assessments and penetration testing, and follow through on remediation. Evaluate, implement, and support key security tools (e.g., IDS/IPS, endpoint protection, patch management). Audit and optimise the More ❯
and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security More ❯
and maintain network security measures to protect organization's data and systems - Monitor network traffic for potential security breaches and respond appropriately to incidents - Conduct regular security audits and vulnerability assessments to identify and address security risks - Collaborate with cross-functional teams to implement security policies and procedures - Provide technical support and guidance to IT staff on network security More ❯
to monitor systems and investigate anomalies. Lead the response to security incidents, including root cause analysis and remediation. Produce incident reports and support regular testing of response protocols. Conduct vulnerability assessments and penetration testing, and follow through on remediation. Evaluate, implement, and support key security tools (e.g., IDS/IPS, endpoint protection, patch management). Audit and optimise the More ❯
and analyse security alerts and logs from various sources (e.g., SIEM and Defender). •Investigate and respond to security incidents, including malware infections, phishing attempts, and unauthorized access. •Conduct vulnerability assessments and assist in patch management and remediation efforts. •Support the implementation and enforcement of security policies, standards, and procedures. •Collaborate with wider IT colleagues and business units to More ❯
security best practices, such as identity and access management (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. Infrastructure Automation & DevOps : Develop Infrastructure as Code (IaC) using tools to automate infrastructure provisioning and management. Collaborate with DevOps teams to integrate cloud infrastructure with More ❯
security best practices, such as identity and access management (IAM), network security, encryption, and compliance with industry regulations (GDPR, SOC 2, HIPAA). Perform regular security assessments, audits, and vulnerability assessments for cloud infrastructure. Infrastructure Automation & DevOps : Develop Infrastructure as Code (IaC) using tools to automate infrastructure provisioning and management. Collaborate with DevOps teams to integrate cloud infrastructure with More ❯
platforms. A good understanding of network security and protocols like TCP/IP. Experience with technical concepts such as tunneling traffic and IP configuration. Experience delivering penetration tests and vulnerability assessments for networks, applications, and cloud services. Excellent communication skills, both verbal and written, with the ability to present to clients. Ability to manage time effectively and work to More ❯
cloud platforms and services and an understanding of different types of malware, threats, and vulnerabilities. Understanding of risk management and prioritisation principles and ability to conduct security audits and vulnerability assessments. Knowledge of programming or scripting languages (like Python, Bash, or PowerShell). Ability to gather, analyse, and apply information about threat actors and their tactics, techniques, and procedures More ❯