City of London, London, United Kingdom Hybrid / WFH Options
Global TechForce
overall security posture. Key responsibilities: Conducting comprehensive security assessments: This involves evaluating an organization's IT infrastructure, networks, systems, and applications to identify potential weaknesses and vulnerabilities. Performing vulnerability testing and penetrationtesting: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threat analysis schedules and staying More ❯
And Mitigation Collaborate with cross-functional teams to perform threat modelling, identify security risks, and implement effective countermeasures. Proactively assess the security posture of applications through code reviews, manual penetrationtesting, and static/dynamic security testing (SAST/DAST). Security Tooling And Automation Implement and maintain security tools used in the development and deployment processes … from you if you have... Application Security Expertise Deep understanding of identifying, assessing, and mitigating security risks in application designs, code, and deployed products. Experience managing and using security testing tools such as SAST, DAST, and vulnerability scanning solutions. Strong grasp of secure coding practices and proficiency in integrating security into the Software Development Lifecycle (SDLC). Technical Knowledge … And Implementation Experience Direct experience with threat modelling, security reviews, and penetration testing. Proven ability to secure cloud-native architectures, containerization technologies, and Infrastructure as Code (IaC) environments. Familiarity with industry standards and frameworks such as OWASP, BSIMM, PCI DSS, ISO 27001, and GDPR. Security Integration Experience Demonstrated ability to seamlessly integrate secure development practices into SDLC/SSDLC More ❯
London, England, United Kingdom Hybrid / WFH Options
Global TechForce
overall security posture. Key responsibilities: Conducting comprehensive security assessments: This involves evaluating an organization's IT infrastructure, networks, systems, and applications to identify potential weaknesses and vulnerabilities. Performing vulnerability testing and penetrationtesting: Using various tools and techniques (like Nessus, Burp Suite, Metasploit), you'll simulate attacks to uncover exploitable flaws. Developing threat analysis schedules and staying More ❯
of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetrationtesting activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security … as Tenable SME and guiding teams with best practice and training. Essential Experience of the Vulnerability Analyst: Proven hands-on Tenable experience is Essential. Experience conducting vulnerability assessments and penetration testing. Strong background in Threat and Vulnerability management. Experience with frameworks such as ISO27001, NIST and CIS. Comfort working with stakeholders or independently. Build VM functions from scratch. Strong More ❯
of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetrationtesting activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security … as Tenable SME and guiding teams with best practice and training. Essential Experience of the Vulnerability Analyst: Proven hands-on Tenable experience is Essential. Experience conducting vulnerability assessments and penetration testing. Strong background in Threat and Vulnerability management. Experience with frameworks such as ISO27001, NIST and CIS. Comfort working with stakeholders or independently. Build VM functions from scratch. Strong More ❯
Kensington, West Holland Park, Greater London, United Kingdom
VIQU Limited
of the Vulnerability Analyst: Leading the end-to-end vulnerability management process using Tenable . Develop, deploy and maintain a comprehensive vulnerability management program. Conducting regular vulnerability scans and penetrationtesting activities to proactively identify and assess security weaknesses across systems and infrastructure. Using Tenable to run regular assessments and deliver actionable insights. Partnering with IT and security … as Tenable SME and guiding teams with best practice and training. Essential Experience of the Vulnerability Analyst: Proven hands-on Tenable experience is Essential. Experience conducting vulnerability assessments and penetration testing. Strong background in Threat and Vulnerability management. Experience with frameworks such as ISO27001, NIST and CIS. Comfort working with stakeholders or independently. Build VM functions from scratch. Strong More ❯
Greater London, England, United Kingdom Hybrid / WFH Options
Gazelle Global
access controls on network device interfaces. Design secure networking in cloud platforms (AWS, Azure, GCP). Support incident response teams in investigating network-related threats. Collaborate with compliance and penetrationtesting teams to ensure end-to-end remediation. Requirements: Proven experience in network security across hybrid environments. Deep understanding of protocols, firewalls, routing, and switching. Familiar with PCI More ❯
implemented. Investigate and respond to security incidents and queries, coordinating with relevant teams. Continuously monitor IT infrastructure for vulnerabilities, anomalies, and other potential security issues. Plan and coordinate external penetration tests to identify and address security weaknesses. Compile and deliver regular reports (monthly and quarterly) on the organisation’s security status and risk landscape. Manage and maintain content on … Information Security Management Systems (ISMS) aligned with ISO 27001 standards. Strong skills in risk assessment, vulnerability identification, and development of practical security solutions for complex IT environments. Experience with penetrationtesting and vulnerability assessments; certifications such as CEH (Certified Ethical Hacker) are an advantage Solid hands-on experience managing and administering SIEM platforms for threat detection and incident More ❯
controls while supporting compliance efforts. You will be responsible for identifying and implementing modern security controls, maintaining a Security Information & Event Management (SIEM) solution and overseeing internal and external penetration testing. You will adhere to ISO27001:2022 standards, working closely with the compliance team during audits to retain certification and participate in risk assessments and security audits, ensuring alignment … of regulatory and client requirements. Skills, Knowledge and Expertise Experience Strong passion for cybersecurity, security engineering, and compliance. Basic experience or knowledge of penetrationtesting tools and methodologies. Experience working in a regulated industry (legal, finance, healthcare, etc.). (desirable) Hands-on experience with security automation or scripting (Python, PowerShell). (desirable) Knowledge Knowledge of SIEM tools, threat More ❯
work Manage vendor performance and escalations Security & Compliance: Act as primary point of contact for parent company security audits Develop and maintain security compliance documentation Coordinate and respond to penetrationtesting activities Implement security recommendations and remediation plans Ensure infrastructure meets corporate security standards Participate in security incident response planning Business Continuity: Lead disaster recovery planning for scientific … computing infrastructure Coordinate and execute DR testing Maintain DR documentation and procedures Develop and maintain business continuity plans Ensure RPO/RTO objectives are met Financial Planning & Technical Debt: Develop long-term capital planning for infrastructure Manage infrastructure budget and forecasting for AskBio European locations Identify and track technical debt Create remediation plans for technical debt Provide cost-benefit … optimization tools Demonstrated ability to work with scientific computing workflows Experience managing vendor relationships and contracts Knowledge of IT security and compliance requirements Experience with disaster recovery planning and testing Understanding of IT financial planning and budgeting Experience with audit responses and compliance documentation Strong experience with Linux administration and engineering Extensive knowledge of virtualization technologies, particularly VSphere Preferred More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Proactive Appointments
implement effective security controls, system hardening and security improvement projects with a particular focus in application/web hosting security. Assist in the management of patching, vulnerability analysis and penetrationtesting to ensure recommendations are risk assessed and implemented in a timely manner Senior Cyber Security Engineer - Skills: Experience in Security Engineering, Network Security, and/or working More ❯
that our applications withstand the evolving threat landscape. How you will contribute Assist GRC with performing technical security risk reviews and vendor assessments including code reviews, vulnerability scans, and penetration tests on internally developed applications. Contribute to the technical design of security systems and services to meet organizational needs whilst managing risks to embed security practices into the S … cloud/SaaS-based technology platforms. Certifications such as OSCP, GWAPT, or CSSLP are a plus. Bachelor's degree in a security-related field is preferred (i.e., Security Analysis, PenetrationTesting, Malware Analysis, Digital Forensics, Network Engineering, Computer Science). Strong technical knowledge across various Security Engineering pillars (Network Security, Cloud Security, Infrastructure Security, Email Security, and Endpoint More ❯
work Manage vendor performance and escalations Security & Compliance: Act as primary point of contact for parent company security audits Develop and maintain security compliance documentation Coordinate and respond to penetrationtesting activities Implement security recommendations and remediation plans Ensure infrastructure meets corporate security standards Participate in security incident response planning Business Continuity: Lead disaster recovery planning for scientific … computing infrastructure Coordinate and execute DR testing Maintain DR documentation and procedures Develop and maintain business continuity plans Ensure RPO/RTO objectives are met Financial Planning & Technical Debt: Develop long-term capital planning for infrastructure Manage infrastructure budget and forecasting for AskBio European locations Identify and track technical debt Create remediation plans for technical debt Provide cost-benefit … optimization tools Demonstrated ability to work with scientific computing workflows Experience managing vendor relationships and contracts Knowledge of IT security and compliance requirements Experience with disaster recovery planning and testing Understanding of IT financial planning and budgeting Experience with audit responses and compliance documentation Strong experience with Linux administration and engineering Extensive knowledge of virtualization technologies, particularly VSphere Preferred More ❯
cyber domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetrationtesting and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why More ❯
City of London, London, United Kingdom Hybrid / WFH Options
FIND | Creating Futures
cyber domains, and at least one of the below: Network and infrastructure security Security operations and incident response Threat intelligence and threat modelling Governance, risk & compliance (GRC) Cloud security Penetrationtesting and vulnerability management Excellent communication & presentation skills. Desirable: Certifications such as CISSP, CISM, CEH, CPENT, Security+, CySA+, OSCP, AWS, GCP or Azure Security Certs, or similar Why More ❯
expertise in AI security . Deep understanding of machine learning, neural networks, and adversarial attacks . Proficiency in cryptographic techniques and secure AI model development . Strong experience with penetrationtesting, threat intelligence, and security auditing . Familiarity with frameworks such as NIST AI Risk Management and Secure AI development guidelines. Excellent problem-solving skills and ability to … service, and other categories protected by federal, state or local law. Reasonable Accommodations If you require a reasonable accommodation in completing a job application, interviewing, completing any pre-employment testing, or otherwise participating in the employee selection process, please fill out the accommodations form by clicking on this link Accommodation for disability form . If you're unable to More ❯
Building a resilient cybersecurity culture Introducing new risk management techniques will undergo formal approval by the Change Approval Board (C.A.B). The role will also involve micromanaging cybersecurity engineers, penetrationtesting engineers, and other security personnel, ensuring compliance with NIST cybersecurity framework and DoD requirements. PHYSICAL DEMANDS: This position requires the ability to communicate and exchange information, utilizing More ❯
London, England, United Kingdom Hybrid / WFH Options
Moore Kingston Smith
plain English A client-focused mindset with strong problem-solving skills Industry certifications (e.g. ISO 27001 Lead Auditor, CISSP, CISA, CISM) are a bonus If you have exposure to penetrationtesting, vulnerability assessments, cloud security (e.g. AWS, Azure, GCP) or Operational Technology (OT) - that's a real plus! What's in it for you? A client-facing role More ❯
Ability to do research autonomously to always be ahead of any security threat. SSDLC practices in DevOps, CI/CD environment. OWASP Top 10, SANS CWE, OpenSAMM, BSIMM, etc. Penetrationtesting, vulnerability scanning. Design security monitoring tools. Designing pipelines that make use of SCA, SAST, DAST, IAST and RASP solutions. Qualifications: SANS/SEC-540: Cloud Security and More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
and security tooling recommendations Translate complex technical findings into actionable insights for both technical and non-technical audiences Collaborate across global teams including digital forensics, threat intelligence, and pen testing specialists Contribute to proposal writing and client RFPs as a subject matter expert Drive continuous improvement of services, tools, and processes within the consulting team Adhere to client and … London, England, United Kingdom 3 weeks ago Identity Security Consultant - CyberArk Exp London, England, United Kingdom 6 days ago London, England, United Kingdom 1 week ago Consultant, Application Security Penetration Tester Edinburgh, Scotland, United Kingdom 6 days ago Lead Cyber Security Advisory Consultant - Eviden London, England, United Kingdom 3 days ago London, England, United Kingdom 25 minutes ago London More ❯
and clear with their opinions. Desirable qualifications, capabilities, and skills: Experience in a software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetrationtesting (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth More ❯
London, England, United Kingdom Hybrid / WFH Options
ControlPlane
cloud infrastructures by implementing security measures that are "secure-by-design" and "secure-by-default." This engineering excellence has driven ControlPlane deeper into cybersecurity providing services like threat modelling, penetrationtesting, and supply chain security to ensure robust protection against cyberattacks in containerised and cloud-native environments. We are acclaimed for our contributions to securing highly regulated industries More ❯
cloud infrastructures by implementing security measures that are "secure-by-design" and "secure-by-default." This engineering excellence has driven ControlPlane deeper into cybersecurity providing services like threat modelling, penetrationtesting, and supply chain security to ensure robust protection against cyberattacks in containerised and cloud-native environments. We are acclaimed for our contributions to securing highly regulated industries More ❯
Rugby, England, United Kingdom Hybrid / WFH Options
Motorola Solutions, Inc
Docker) Experience working within teams of infrastructure and/or network engineers Experience operating within ITIL processes including service design, service operation and change management Experience working with security, penetrationtesting, IT Healthchecks and security certifications Desirable : A formal qualification (Degree) in Computing Science, Network Engineering or equivalent experience. Professional certifications such as networking, ITIL, cybersecurity, Microsoft etc. More ❯
Sheffield, South Yorkshire, England, United Kingdom Hybrid / WFH Options
Hays Specialist Recruitment Limited
to security incidents, ensuring effective investigation, containment, and resolution to a successful outcome. Threat Analysis: Using a combination of in-house tooling and external resources, conduct vulnerability analysis, and penetration tests to identify, evaluate, and mitigate potential threats. Policy Development: Refresh existing, and where required, author robust cyber security policies, procedures, and standards for the organization. Training and Awareness … a manufacturing environment. Proven experience in cybersecurity roles, with a focus on MOD-related projects. Strong understanding of MOD security standards and policies. Experience in conducting vulnerability assessments and penetration testing. What you will get in return This role is paying up to £75,000 per year, working 3-4 days per week in Sheffield with some hybrid flexibility. More ❯