to propose solutions for closing identified vulnerabilities in the infrastructure. Desired Qualifications: Certified Information System Security Professional (CISSP), NIST Cybersecurity Framework (NCSF), Certified Cloud Security Professional (CCSP) andor Certified Ethical Hacker (CEH) Knowledge and experience with Microsoft Office and Visio. Knowledge of WAN technologies including MPLS, SD WAN. Knowledge of cloud providers security (AWS, GCP or Azure). Prior More ❯
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
Experian Ltd
Center or Cyber Security Incident Response Teams Bachelor's Degree in Computer Science, Computer Engineering, Information Systems, Information Security or professional certification related to Digital Forensics, Incident Response, or EthicalHacking (e.g., GCIH, CEH, GCFE, GCFA, and CFCE). Knowledge of main concepts related to the Incident Response Life Cycle, MITRE ATT&CK Framework, Cyber Kill Chain, and More ❯
s degree in Computer Science, Information Security, or a related field. A master's degree is a plus. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM) are highly desirable. Scripting experience. FlexTrade Systems, Inc. is an equal opportunity employer and makes employment decisions without regard to race More ❯
effectively with a variety of stakeholders from different technology and business teams. Strong verbal and written communication skills. Professional certifications such as Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH), or Certified Information Security Manager (CISM). Strong knowledge of Operating System security and system hardening concepts such as CIS Benchmarks. Experience in working with information security More ❯
Security Architecture Professional (ISSAP) Health Care Information Security and Privacy Practitioner (HCISPP) GIAC Certified Intrusion Analyst (GCIA) GIAC Security Leadership Certificate (GSLC) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information Assurance System Architecture and Engineer (IASAE) Certification in one of the listed DoD 8570 Certifications is prerequisite. INTERVIEW PROCESS: STAGE More ❯
City of London, London, United Kingdom Hybrid / WFH Options
NextEnergy Group
hybrid networking, container/serverless security and DevSecOps tooling Demonstrable experience hardening corporate business platforms (ERP, CRM, HR, finance, M365, identity providers, SaaS) Working familiarity with offensive-security/ethical-hacking techniques; able to think like an attacker, interpret red-team reports and translate findings into architectural controls Strong grasp of OT protocols (Modbus/TCP, IEC … with Data Protection Officer, Risk and Compliance, Security Operations. CISSP, CISM, SABSA, TOGAF (Security), or Azure Security Speciality (desirable) ISA/IEC 62443 Cybersecurity Specialist or GIAC GICSP, demonstrating ethical-hacking capability (desirable) Experience navigating ISO 27001/27019 certification, NIS2 readiness, or TSO cybersecurity codes (desirable) The right to work in the UK. WHAT WE OFFER A More ❯
hybrid networking, container/serverless security and DevSecOps tooling Demonstrable experience hardening corporate business platforms (ERP, CRM, HR, finance, M365, identity providers, SaaS) Working familiarity with offensive-security/ethical-hacking techniques; able to think like an attacker, interpret red-team reports and translate findings into architectural controls Strong grasp of OT protocols (Modbus/TCP, IEC … with Data Protection Officer, Risk and Compliance, Security Operations. CISSP, CISM, SABSA, TOGAF (Security), or Azure Security Speciality (desirable) ISA/IEC 62443 Cybersecurity Specialist or GIAC GICSP, demonstrating ethical-hacking capability (desirable) Experience navigating ISO 27001/27019 certification, NIS2 readiness, or TSO cybersecurity codes (desirable) The right to work in the UK. WHAT WE OFFER A More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
skills Must have good understanding on network traffic flows and able to understand normal and suspicious activities. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Ability to learn forensic techniques Ability to reverse engineer attacks to understand what actions took place. Knowledge of ITIL disciplines such as Incident, Problem and More ❯
on cloud security (AWS, Azure, or GCP) and DevSecOps tooling. Assist in maintaining security assurance across the SDLC in line with MoJ and NCSC guidelines. Essential Criteria Penetration testing, ethicalhacking, or vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube, GitHub Advanced Security, IaC More ❯
St George's University Hospitals NHS Foundation Trust
of continued professional development within a Cyber security discipline Desirable Current or working towards Cyber Security certification(s) such as SSCP, CISSP, CEH, CISM, CRISC, etc CompTia Sec+ Certified Ethical Hacker Application of Cyber Security in a healthcare environment Skills and Knowledge Essential Ability to identify Cyber threats and malicious actors, and to classify and mitigate threats as they More ❯
that keep them resilient and ahead of cyber threats. The Role We are looking for an experienced Penetration Tester to join our team. You will conduct security assessments and ethicalhacking activities to identify vulnerabilities in client systems. This role requires a deep understanding of attack techniques, security frameworks, and risk mitigation strategies. Key Responsibilities Conduct penetration testing … Develop security testing methodologies and improve existing processes. Collaborate with clients to provide security recommendations and mitigation strategies. Stay up to date with the latest security threats, exploits, and hacking techniques. Assist in security awareness training and red team exercises. Provide clear and actionable reports to both technical and non-technical audiences. Requirements Proven experience in penetration testing and … ethical hacking. Proficiency in tools such as Burp Suite, Metasploit, Nmap, Wireshark, and Kali Linux. Strong knowledge of web application, network, and infrastructure security. Experience with scripting and automation using Python, Bash, or PowerShell. Certifications such as OSCP, OSCE, CEH, or similar are highly desirable. Understanding of regulatory compliance standards (ISO 27001, GDPR, NIST, etc.). Excellent problem-solving More ❯
attention to details. Certified Authorization Professional (CAP) Certified Network Defender (CND) Information Systems Security Architecture Professional (ISSAP) Certified Information Security Manager (CISM) Information Systems Security Engineering Professional (ISSEP) Certified Ethical Hacker (CEH) Computer Hacking Forensics Investigator (CHFI) Information assurance system architecture and engineer (IASAE) It is prerequisite to be certified in one of the listed DoD 8570 Certifications. More ❯
Linux). Proficiency in shell scripting, creating Snort rules, or other log-searching query languages. Confidence in handling common security incidents independently. Good understanding of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work with minimal supervision. Willingness to work in a 24/ More ❯
or other log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as EthicalHacking (Penetration Testing) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of More ❯
or equivalent experience Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
management, and encryption. Understanding of security frameworks such as NIST, CIS Controls, or ISO 27001. Formal industry recognised Cyber Security qualification such as ISC2 CISSP, ISC2 CISM or Certified Ethical Hacker (CEH) (desired). Security and Network technology experience. About us: We are an international engineering and construction company delivering state-of-the-art infrastructure and buildings projects for More ❯
tools and building security into existing SDLC processes Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP) Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps Excellent oral, written communication and presentation skills What we offer: At More ❯
tools and building security into existing SDLC processes, Knowledge of cloud Security Architecture of public clouds (such as AWS or GCP), Security certification such as CISSP, CCP, SANS, GAIC, Ethical Hacker, Experience in working in regulated company, preferably with a FinTech/banking background and experience in DevOps, Excellent oral, written communication and presentation skills. What we offer: At More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom Hybrid / WFH Options
Circle Group
advanced offensive roles , including Red Team and Adversarial Simulation Exposure to a broad range of real-world security challenges in varied environments Keywords: Penetration Tester, OSCP, OSEP, Offensive Security, EthicalHacking, Red Team, Web Application Security, Cyber Security Jobs UK, Cloud Security, Infrastructure Testing, Adversarial Simulation, Ethical Hacker, InfoSec, Application Security, UK Cyber Jobs, Security Testing, Cyber More ❯
tools. Strong verbal and written English communication skills. Interpersonal and presentation skills. Strong analytical skills. Understanding network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and EthicalHacking (Penetration Testing). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines (Incident, Problem, Change Management). Ability to work independently. Willingness More ❯
awareness training Requirements Demonstrable skills and capability in Security leadership and 3rd party management experience CISSP certification preferred. Compliance knowledge required in ISO27001, PCI and GDPR. Possibly a certified ethical hacker Knowledge of Security technologies is essential, such as network appliances, firewall administration, AD, IAM, PAM, SIEM, UEBA, AV, IDS/IPS and MDM solutions Understanding of common frameworks More ❯
seeking a talented and motivated Penetration Tester to join our clients growing cybersecurity team on a fully remote basis (mainland UK only). You will be responsible for conducting ethicalhacking and security testing engagements to identify vulnerabilities in client systems, applications, and infrastructure. This is an exciting opportunity to work across a range of industries while further More ❯
London, England, United Kingdom Hybrid / WFH Options
Lorien
seeking a talented and motivated Penetration Tester to join our clients growing cybersecurity team on a fully remote basis (mainland UK only). You will be responsible for conducting ethicalhacking and security testing engagements to identify vulnerabilities in client systems, applications, and infrastructure. This is an exciting opportunity to work across a range of industries while further More ❯