Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005 … NIST 800-53). Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005 … NIST 800-53). Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer More ❯
minimise business disruption in the event of a cyberattack. Drive threat intelligence programs, proactively identifying and mitigating emerging risks. Manage external teams of security penetration testers working on monthly cycles to test and improve security implementations. Design, implement, and manage robust security measures across networks, endpoints, cloud platforms, and … security into cloud environments (AWS, Azure, Google Cloud) and application development lifecycles. Implantation and management of SOC and EDR functions. Conduct regular vulnerability assessments, penetrationtesting, and red-team exercises, working closely with external partners to continuously test and improve security defences. Develop a comprehensive risk register, prioritising More ❯
and regulations. Collaborate with development teams to integrate security throughout the software development lifecycle (SDLC). Conduct regular security assessments, including vulnerability scans and penetrationtesting, to identify and mitigate risks. Stay up-to-date with the latest security trends, vulnerabilities, and emerging threats, and provide recommendations for More ❯
london, south east england, united kingdom Hybrid / WFH Options
Halian
and regulations. Collaborate with development teams to integrate security throughout the software development lifecycle (SDLC). Conduct regular security assessments, including vulnerability scans and penetrationtesting, to identify and mitigate risks. Stay up-to-date with the latest security trends, vulnerabilities, and emerging threats, and provide recommendations for More ❯
/CMMI Certification or alignment with recognised industry standards Compliance with applicable regulations & legislation Building and implementing governance & risk management processes Design implementation and testing of security tooling BC/DR & Incident response capability building and testing Production of threat intelligence reports and research Supply Chain Risk Management … base requirement to demonstrate understanding of and find ways to integrate activity with BlueVoyant colleagues across the globe, specifically Digital Forensics, Incident Response and PenetrationTesting specialists as well as wider BlueVoyant service offerings when appropriate, to produce threat-aware products, services and outputs that are impactful, efficient More ❯
Building Automation Cybersecurity team, gaining hands-on experience in real-world cybersecurity scenarios. Your responsibilities will include assisting in the development of cyber solutions, testing products, troubleshooting, implementing security measures, conducting vulnerability assessments and penetrationtesting, and participating in cyber assessments while learning about standards such as … systems. Assist in evaluating new cyber solutions and introducing innovative approaches to existing solutions. Assist in varying stages of cyber assessment vulnerability assessment and penetration testing. Assist in detailed design documents for various cyber solutions. Participate in design discussions with end customers and vendors. Manage existing cybersecurity platforms. Key … configuring Microsoft operating systems, firewall switches. Desirable Certifications: MCTS/MCSA (Microsoft) VCP (VMware) CCNA Offensive Security Certified Professional (OSCP) Practical Junior/Network Penetration Tester (PJPT/PNTP) Nice to have: Strong passion for cybersecurity and a desire to learn and grow in the field. Basic knowledge of More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
Secure Recruitment Ltd
meaning that Code Reading Skills are also desirable. Skills & Experience of the AppSec Engineer role: Hands-On Experience with Security Assessment Tools & Techniques including PenetrationTesting & Code Review. Use of Planned, Structured Methodologies for Conducting & Reporting on Web Application Penetration Testing. Understanding & Demonstrable Experience of Automated, Dynamic … Static Application Security Testing Tools, as well as Manual Security Testing to find Vulnerabilities & Logical Issues. Broad Understanding of SDLC & Technology Functions and how they relate to Information Security. Understanding of Industry Standard Information Security Practices. Ideally Offensive Security Certified Professional (OSCP) Certification (or similar is Desirable but … the Project Lifecycle. Taking Responsibility for the Security of Tested Products within Project Context. Conducting Manual & Automated Source Code Reviews. Contributing to & Utilising Security Testing Methodologies, Creating & Updating Technical Documentation as necessary. Liaising with Software Development Department to ensure Security is considered throughout SDLC. Identifying any Security Issues within More ❯
solutions. Support security incident detection, investigation, and response alongside the SOC and Red Team. Threat & Vulnerability Management Perform regular security assessments, vulnerability scans, and penetration tests, prioritizing remediation efforts. Develop automated remediation for common security risks and misconfigurations. Monitor and analyze security logs and alerts, fine-tuning detections and …/SOAR, network security, and automation tools. Familiarity with scripting (Python, PowerShell) and infrastructure-as-code (Terraform, Ansible). Deep understanding of vulnerability management, penetrationtesting, and security hardening. Knowledge of SOC processes, incident response, and forensics. Strong grasp of zero-trust architectures, identity security, and secure DevOps More ❯
a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetrationtesting tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, DNS More ❯
and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetrationtesting, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering, vulnerability scanning and More ❯
to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetrationtesting using industry-standard methodologies and tools. Deliver security awareness training and phishing simulations to internal stakeholders. Ensure compliance with company policies and More ❯
to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetrationtesting using industry-standard methodologies and tools. Deliver security awareness training and phishing simulations to internal stakeholders. Ensure compliance with company policies and More ❯
cases of technical security products, such as firewalls, anti-virus, web proxies, SIEM, IDS/IPS, DLP, and EDR. Familiarity with vulnerability scanning and penetrationtesting tools and techniques. Qualifications: A university degree in one of the following fields is preferred (but not required): Cyber/Information Security More ❯
performance issues and ensure business continuity. Monitor and maintain security infrastructure, including firewalls, VPNs, IDS/IPS, and endpoint protection. Conduct vulnerability assessments and penetration testing. Apply patches and updates to mitigate security threats. Lead response efforts in cyber-attacks or security breaches, including containment and remediation. Perform root More ❯
Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to More ❯
Oversee and maintain security equipment including firewalls, intrusion prevention systems (IPS), web application firewalls (WAF), and antivirus systems. Perform periodic security drills and regular penetrationtesting to ensure the integrity of security systems. Harden security controls across Windows and Linux environments and ensure regular patching and firmware upgrades. … encryption practices during usage, storage, transfer, and disposal. Conduct security evaluations on network and firewall policies and manage application security in both development and testing phases (SAST, DAST). Liaise with internal audit teams and international cybersecurity operations centres to implement security policies and controls. Provide cybersecurity training to More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
london, south east england, united kingdom Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC … term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder More ❯
and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetrationtesting, and remediation. Cloud Security : Maintain expertise in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely More ❯
and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetrationtesting, and remediation. Cloud Security : Maintain expertise in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely More ❯
and compliance requirements (e.g., ISO 27001, PCI DSS, GDPR). Vulnerability Management : Collaborate with SecOps to develop and implement vulnerability management programs, including assessments, penetrationtesting, and remediation. Cloud Security : Maintain expertise in cloud security best practices, including secure configuration, access management, and data protection. Integration : Work closely More ❯
incidents, including forensics when necessary. Security Services: Drive the delivery of services including Threat & Vulnerability Management, Privileged Access Management, IAM, DLP, Network Security, and Penetration Testing. Project Leadership: Lead IT/Cybersecurity improvement projects as an SME. Risk & Compliance: Evaluate IT changes for security risks, ensuring compliance with security More ❯
be responsible for conducting security reviews, threat modeling, developing tooling that will help detect security issues at scale, and hands-on security evaluations (pen-testing). The successful candidate must be comfortable diving into complex engineering discussions and leveraging deep security expertise to ensure proper risk assessment and threat … opportunities as you gain new security skills in the course of your duties. Key job responsibilities Security reviews for hardware including servers and devices. Penetrationtesting & vulnerability research. Threat modeling. Security training and outreach to internal development teams. Security guidance documentation. Assistance with recruiting activities. BASIC QUALIFICATIONS BS … ROM, microcode, custom ASIC/FPGA) - x86 and/or ARM chipset and firmware security (TPM, UEFI, TrustZone, Secure Boot, JTAG, PCIe) - Physical security testing at the machine level. Security testing of compute platforms (Server, PC or Mobile). Working with diverse physical tamper resistance and/or More ❯