Security Consultant (SecurityOperations) Location: Hybrid; with occasional travel expected to client site or Logiq’s offices in Bristol, Chippenham or Exeter. Salary: Negotiable, plus car allowance, plus up to 10% performance bonus*, plus excellent benefits package. Logiq is a fast-growing Technology Company, providing cutting-edge solutions to high-risk clients across Private and Public Sector. … Due to rapid growth in our Security Capability, we are looking for experienced Security Consultants to join our team. What is Cyber Risk Management? Cyber risk management ensures that organisations can anticipate, withstand, and recover from cyber incidents, aligning security efforts with business objectives, regulatory requirements, and industry best practices. It involves applying risk-based decision-making … to ensure security measures are proportionate to the threats faced, balancing protection, operational effectiveness, and compliance with the organisations need and context. As leading players in MOD’s cyber security transformation to Secure by Design (SbD), we are looking for team members and leaders who share our vision that cyber risk management is driven by business requirements and More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Jisc
dedicated to research and education. We're looking for a Threat intelligence engineer to help us protect this critical national asset. You'll be at the heart of our securityoperations, developing and maintaining the infrastructure that powers our cutting-edge cybersecurity services. Your focus will be on enhancing and managing our: SIEM (Security Information and Event … Management) systems SOAR (Security Orchestration, Automation, and Response) platforms Threat Intelligence tools and integrations You'll work closely with our threat intelligence teams to design and implement smart, automated solutions that keep our defences sharp and responsive. Why This Role Matters: The Janet network supports thousands of institutions and millions of users across the UK. Your work will directly More ❯
Gatling, Neoload. Functional Testing Verify that software functions as per business requirements. Integration Testing Focus on ensuring different modules/components interact correctly. Test APIs, databases, and service flows. Security Testing & Penetration … Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite, OWASP ZAP, Metasploit. CEH, OSCP, CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding perspective. Ensure compliance with secure development standards (OWASP Top 10, etc.). Test Management More ❯