Operational Technology (OT) Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetrationtesting, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. More ❯
Operational Technology (OT) Cyber Security Engineer to join their Service and Support team. The role involves designing and securing OT networks across various critical industries, conducting advanced threat analysis, penetrationtesting, and vulnerability assessments. The engineer will develop and implement cybersecurity solutions, lead risk mitigation efforts, mentor junior team members, and support project management and business development activities. More ❯
IT, Networking, or Cybersecurity (or equivalent experience) Certifications such as Cisco CCNA/CCNP , Fortinet NSE , or CompTIA Security+ (advantageous) Demonstrable experience delivering Cyber services in: Threat & Vulnerability Management PenetrationTesting/Offensive Security SOC/MDR operations Third-Party Risk or Compliance (ISO, NIST, GDPR) Additional Information Must have the right to live and work in the More ❯
IT, Networking, or Cybersecurity (or equivalent experience) Certifications such as Cisco CCNA/CCNP , Fortinet NSE , or CompTIA Security+ (advantageous) Demonstrable experience delivering Cyber services in: Threat & Vulnerability Management PenetrationTesting/Offensive Security SOC/MDR operations Third-Party Risk or Compliance (ISO, NIST, GDPR) Additional Information Must have the right to live and work in the More ❯
Birmingham, West Midlands, England, United Kingdom
TXP
Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetrationtesting and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetrationtesting and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve More ❯
assessment, remediation, and threat intelligence program. Line management of the threat and vulnerability management team. Building sustainable relationships to champion the adoption of vulnerability and threat management, compliance, and penetrationtesting program across the Department. Manage the relationship with pen testing 3rd parties and the scheduling of tests. Develop, implement, and maintain the organisation's vulnerability management … and threat intelligence tools, risk assessment methodologies, and remediation planning in a multi cloud environment Experience of managing the scoping, execution, and assessment of outcomes from supplier led pen testing Excellent written and verbal communication skills including the ability to relate technical information to a non-technical audience Working independently and as part of a larger team to deliver More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
best practices. Strong analytical and prioritization skills with a pragmatic, risk-based approach to decision-making. Leadership experience Nice to have: If you have come from a development/penetrationtesting background this would be advantageous for my client. Pen testing experience Certifications (CEH)/OSCP This role is on a hybrid basis with 2 - 3 days More ❯
reviews of system architectures, applications, cloud services (IaaS, PaaS, SaaS), and network security. Assess IAM/PAM implementations and M365/Azure/Active Directory configurations. Conduct or oversee penetrationtesting, vulnerability assessments, and threat modelling. Review and approve technical designs and solution architectures from a security standpoint. Assurance, Compliance, and Audit Develop and maintain an IT Security … and resilience across the organisation. Collaborate with HR and L&D to embed cyber hygiene into inductions and ongoing learning. Incident Management and Business Continuity Oversee the development and testing of Incident Response, Disaster Recovery, and Business Continuity Plans. Provide senior escalation and leadership during security incidents. Conduct post-incident reviews and ensure lessons learned drive continuous improvement. Continuous More ❯
digital transformation organisation delivering critical projects across energy, water, renewables, and manufacturing. The Senior ICS OT Cyber Security Engineer will secure and optimise industrial control systems, conduct threat assessments, penetrationtesting, and design technical solutions to mitigate cyber risks. The role involves mentoring junior engineers, collaborating with stakeholders, with occasional travel to client sites and the Stone office. More ❯
other security tools, but experience with other cyber tools would also suffice. Participating in the change management process to ensure proposed changes are reviewed for security risk. Contributing to penetrationtesting planning, coordination and tracking of remediation. Maintaining risk logs and status dashboards for security findings and control effectiveness. Supporting reviews of cloud and on-premises systems to More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
Company Description BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. We provide enterprises with evidence-based risk across their entire attack surface to determine how they will respond to an attack. Our services include Attack Surface Management, PenetrationTesting, and Red Teaming. We're Hiring: Red Team Specialist UK (Remote) | BreachLock Inc. … defenses, and helping Fortune 500 clients improve their cyber resilience. What Youll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud infrastructure and specialised targets (IoT/OT) when required. More ❯
Company Description BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. We provide enterprises with evidence-based risk across their entire attack surface to determine how they will respond to an attack. Our services include Attack Surface Management, PenetrationTesting, and Red Teaming. 🚨 We're Hiring: Red Team Specialist – UK (Remote) | BreachLock Inc. … and helping Fortune 500 clients improve their cyber resilience. 🔧 What You’ll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud infrastructure and specialised targets (IoT/OT) when required. More ❯
Internal Penetration Tester - Hybrid in London - Inside IR35 - 6 months We are seeking an experienced Internal Pentester to join an international client secure their networks. This critical role, based in London (2-3 days per week), requires deep expertise in conducting manual and automated security assessments across networks, applications, cloud platforms, and infrastructure. You will identify and exploit vulnerabilities … play a key role in enhancing collaboration with development, cloud, and infrastructure teams, while ensuring robust security outcomes in sensitive and compliance-driven environments. Key Responsibilities: Plan and execute penetration tests - perform manual and automated testing across applications, APIs, internal/external networks, cloud environments, and Active Directory. Identify, exploit, and validate vulnerabilities - uncover security flaws such as … steps What You Will Ideally Bring: Application security knowledge - strong grasp of OWASP Top 10 and API security issues.Contract Details: Hands-on pentesting experience - 3-7+ years in penetrationtesting, red teaming, or offensive security across networks, cloud, AD, and web apps. Offensive security tooling - expertise with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap More ❯
access reviews, and incident response readiness. Provide insights and triage signals from security tooling (SAST, DAST, dependency scanning, SIEM). Work hands-on to perform internal security assessments or penetration testing. Manage relationships with external pentest providers, auditors, and assessors. Secure Development Lifecycle (SDLC) Partner with engineering teams to embed security in the SDLC and DevSecOps practices. Advise and … security leadership role. Strong understanding of security standards and frameworks (ISO 27001, SOC 2, CIS, NIST, GDPR, EU AI Act). Hands-on technical skills in areas such as penetrationtesting, application security, or infrastructure hardening. Familiarity with modern software development practices, DevSecOps, and cloud-native architectures (preferably Python eco-system, Kubernetes and Azure/AWS/GCP More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetrationtesting, vulnerability assessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
Snowflake, Databricks Splunk Certificated Architect (or Enterprise Security Admin) Bonus Points Track record of thought leadership and infosec community contributions (conference talks, blog posts, open source) Red team/penetrationtesting experience Deep cloud security knowledge (AWS/Azure/GCP) Kubernetes/container security knowledge Other security certifications (GIAC, HTB CAPE, PNPT, GCP/WS/Azure More ❯
3 THE CLOCKTOWER, MANOR LANE, HOLMES CHAPEL, CHESHIRE, England
UK IT NETWORKS LTD
and security teams. Role Assist in monitoring and maintaining the organisation’s information security systems and networks. Help identify, investigate, and respond to potential security incidents. Support vulnerability assessments, penetrationtesting, and system audits. Learn to implement and maintain firewalls, antivirus software, and other security tools. Assist in maintaining and updating security policies, procedures, and documentation. Help with More ❯
assessments aligned to relevant frameworks (ISO 27001, NIST, CIS, Cyber Essentials/Plus) Perform vulnerability assessments and develop mitigation strategies Support the deployment of Managed Detection and Response (MDR), PenetrationTesting, and Data Loss Prevention (DLP) solutions Advise clients on governance, incident response, and security awareness training Skills & Experience Proven experience in a Cybersecurity consultancy role Professional certifications More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerability remediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerability management and penetrationtesting programs. Maintain strong identity, access, and privilege management controls. Compliance & Assurance (30%) Manage and maintain ISO 27001 certification and audit processes. Ensure ongoing compliance with PCI DSS More ❯
and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetrationtesting exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity definition. Perform Vulnerability scans using Vulnerability Management tool More ❯
and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetrationtesting exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity definition. Perform Vulnerability scans using Vulnerability Management tool More ❯