and DevOps to implement security controls across infrastructure (e.g., access control, encryption, logging). Lead the incident response process and manage third-party pen testing and vulnerability management. Customer & Vendor Security: Support security questionnaires, RFPs, and due diligence for customer deals. Review third-party vendors and tools for security … COO & Co-Founder) covering your technical skills and experience. 3. A short task demonstrating how you'd approach a risk assessment, compliance, governance, and penetrationtesting, presented to Kuvera, Ashish (CTO), and Anil (Senior Project Manager). More ❯
common application security vulnerabilities (e.g., OWASP Top 10) and mitigation techniques. Proficiency in security tools and technologies such as static and dynamic analysis tools, penetrationtesting tools, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills. Relevant certifications such as CISSP, CISM, or CEH More ❯
common application security vulnerabilities (e.g., OWASP Top 10) and mitigation techniques. Proficiency in security tools and technologies such as static and dynamic analysis tools, penetrationtesting tools, and security information and event management (SIEM) systems. Excellent communication and interpersonal skills. Relevant certifications such as CISSP, CISM, or CEH More ❯
hygiene and quality control Support business and commercial activities including Statements of Work (SoW) and proposals Oversee and manage outcomes of internal and client penetrationtesting reports Provide security training to staff and clients as required Manage security tooling and training, ensuring compliance with policies, assurance, and technical More ❯
Introducing new risk management techniques will undergo formal approval by the Change Approval Board (C.A.B). The role will also involve micromanaging cybersecurity engineers, penetrationtesting engineers, and other security personnel, ensuring compliance with NIST cybersecurity framework and DoD requirements. PHYSICAL DEMANDS: This position requires the ability to More ❯
Ruby, Go, Swift, Java, .Net, C++ or similar object oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Manchester Digital
level across multiple projects, working with security tools, network security infrastructure technologies, and information security management frameworks (e.g. ISO 27001, NIST). Working with penetrationtesting and effectively translating cyber risk analysis into standards, patterns and approaches to enable the safe exploitation of current and emerging technologies. Understanding More ❯
Winchester, Hampshire, United Kingdom Hybrid / WFH Options
Evalian
About Us Evalian is a UK based consultancy specialising in cyber security, penetrationtesting, data protection and ISO compliance. We are excited to be expanding our cyber security offering to encompass managed security services, specialising in security monitoring, threat detection, and response. As we expand, we are looking More ❯
project management. Self-motivated, very detail-oriented and organized. Comprehensive understanding of customer/server technologies. Understanding of cyber security concepts (e.g. phishing tests, penetrationtesting, vulnerability scanning, SIEM, email security, endpoint Protection, MDM, etc.). Some technical proficiency in the following areas are required: Understanding public vs More ❯
Ruby, Go, Swift, Java, .Net, C++ or similar object-oriented language Information security professional certification Knowledge of system security vulnerabilities and remediation techniques, including penetrationtesting and the development of exploits or equivalent Experience applying threat modeling or other risk identification techniques or equivalent Experience implementing security solutions More ❯
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Inspire People
level across multiple projects, including working with security tools, network security infrastructure technologies, and information security management frameworks (e.g., ISO 27001, NIST) Experience overseeing penetrationtesting and the ability to effectively translate cyber risk analysis into standards, patterns, and approaches to enable the safe exploitation of current and More ❯
with Cyber Security and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetrationtesting, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain More ❯
Stroud, England, United Kingdom Hybrid / WFH Options
Ecotricity
Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate PenetrationTesting & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate More ❯
Stroud, south east england, united kingdom Hybrid / WFH Options
Ecotricity
Hardware Microsoft Windows Operating Systems (Server 2012 to 2022 & Windows 7 to 11) Linux Operating Systems On-Premise Active Directory Networking - Cisco/Fortigate PenetrationTesting & Vulnerability Management Applications Cloud based Web Proxy Anti-virus/Anti-malware tooling Disk/Data Encryption About You The right candidate More ❯
CHECK, CREST, CompTIA etc.). Application of Cyber Security in a healthcare environment. Good knowledge of one or more specialist areas such as compliance, penetrationtesting, or incident response. Experience Essential Relevant experience working in Cyber Security. Evidence of Cyber Security or other relevant work outside formal training More ❯
framework, including procedures and tools for identifying, assessing, monitoring, and reporting cybersecurity risks and vulnerabilities. Support the execution of risk assessments, vulnerability assessments, and penetrationtesting to identify potential cybersecurity risks and their impact on the organization. Provide dedicated security functions in accordance with the needs, risk level More ❯
security & management; Event Log analysis and troubleshooting; Working with external cloud and security providers; Cyber Security experience including resolving issues raised from external PEN testing; Analytical skills in monitoring, evaluating and reporting on risk scenarios; Strong report-writing skills both for policy management and for Team/Board reporting More ❯
recommendations to IT Security Manager. Examine security systems and web applications. Monitor security access across the organisation. Assist with conducting security assessments through vulnerability testing and risk analysis within good time and to a high standard. Assist with performing both internal and external security audits. Analyse security logs from … daily security logs for abnormal events and escalate them to the IT Security teams in a timely manner. Conduct technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation. Knowledge, skills and experience Essential skills: BSc … configuration for various devices, ensuring that all security protocols are effectively set up to protect against unauthorized access and potential threats. Substantial experience of testing and reviewing security solutions. Practical experience of effectively managing cyber incidents. Strong reasoning and advisory skills, with the ability to effectively engage with and More ❯
Greater Bristol Area, United Kingdom Hybrid / WFH Options
Matchtech
meet key regulatory standards (ISO 27001, NIST 800 series, JSPs, Def Stans). Authoring vital security documentation, including RMADS and Security Assurance Documents. Performing penetrationtesting and coordinating remediation efforts. What You Bring: A solid understanding of security frameworks such as ISO 27001/2, ISO 31000, NIST …/37/53. Hands-on experience with Defence Standards (JSPs, HMG, Def Stan 05-138/139). Strong knowledge of security testing tools and techniques. Excellent communication skills — able to explain complex risks and solutions clearly. A proactive, problem-solving mindset with a high level of personal More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Cyberteam
stays at the forefront of the constantly evolving field of Cybersecurity. This role also has the potential to lead/evolve into IT Security, PenetrationTesting, and Information Governance specialisations. Key Responsibilities: Conduct Cyber Essentials and Cyber Essentials Plus Assessment: Perform comprehensive assessments of organisations' cybersecurity practices, systems … to the Cyber Essentials Scheme Conduct in-depth vulnerability assessments to identify potential security weaknesses. Verify the effectiveness of CE security controls through rigorous testing and analysis. Document CE and CE+ assessment findings, including detailed reports and recommendations. Provide Guidance and Recommendations: Offer advice and guidance to organisations on More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Hunter Bond
5+ years of hands-on experience in InfoSec Strong grasp of security principles, best practices, and system hardening techniques. Solid experience with threat modeling, penetrationtesting, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity More ❯
london, south east england, united kingdom Hybrid / WFH Options
Hunter Bond
5+ years of hands-on experience in InfoSec Strong grasp of security principles, best practices, and system hardening techniques. Solid experience with threat modeling, penetrationtesting, and automated security validation. Deep knowledge of cloud, network, and systems security. Scripting skills in Python or PowerShell (or both). Familiarity More ❯