based IT projects. Ensure all IT projects meet security requirements by delivering relevant security documentation at each project quality gate. Manage security assessments and penetrationtesting, coordinating engagements and code reviews for both ongoing and new projects. Report on security incidents and risks, ensuring the timely identification and More ❯
party security providers. Prepare reports on security incidents and recommend improvements. Develop threat intelligence relevant to the business. Conduct threat hunting, vulnerability analysis, and penetrationtesting to identify risks. Continually assess security systems, suggesting appropriate tools and countermeasures. Prepare and maintain security and incident response documentation. Collaborate with More ❯
with Cyber Security and Network Security delivery teams. Clearly articulate and position Bytes' cybersecurity services, including Network Security, Compliance & Assurance (ISO 27001, PCI DSS), penetrationtesting, and vulnerability assessments. Provide thought leadership, offering expert guidance to customers, ensuring Bytes remains aligned with customer-specific requirements and outcomes. Maintain More ❯
it: Security Detection and Monitoring Incident Response Detection Engineering Malware Analysis (Static and Dynamic) Threat Hunting and Threat Intelligence (MITRE ATT&CK) Cloud Security PenetrationTesting Security Automation (SOAR) It would help if you had experience with the following: SIEM tools (Microsoft Sentinel, Splunk, ELK, Siemplify) Vulnerability Management More ❯
equivalent in Computer Science or IT related discipline is desirable Any exposure to Security Standards (PCI or ISO) Involvement in Audits or Compliance Enforcement PenetrationTesting experience (Kali Linux) Experience supporting site-to-site VPNs Network design, VLANs, routing, NAT Creation of PCI digital keys or security access More ❯
into more technical security work, focusing on cloud environments, or gaining recognised certifications to deepen your expertise - with potential development pathways ranging from Pen Testing through to Compliance, it's safe to say the the world is your oyster. The team get together once a week in the Chorley More ❯
tools, creativity, imagination, and expert knowledge to find cybersecurity risks in their networks, systems, and software. We're looking to grow our team of penetration testers in the UK. We test web and mobile applications, computer networks, cloud infrastructure, hardware devices, security awareness through social engineering, organizations through red … and deliver projects for our clients, large and small, across Europe and North America. You will perform various web application, API, mobile, and infrastructure penetration tests. You will also draft reports based on the assessment results and gathered evidence and help address client inquiries regarding these results. In addition … security assessments, you will participate in their refinement and improvement. In summary, you will: Execute offensive security and consultative engagements for our clients by testing their applications and infrastructure Author deliverables, such as technical and executive reports Engage with our clients to understand their requirements, update them on project More ❯
focused on enterprise clients. Proven track record of managing strategic relationships with enterprise organizations. Deep understanding of the cybersecurity landscape, vulnerability management, and security testing methodologies. Experience with enterprise security programs, compliance frameworks (ISO 27001, SOC 2, GDPR, etc.), and risk management. Strong business acumen and ability to translate … presentation, and negotiation skills. Ability to travel up to 15% of the time to meet with strategic clients. Preferred Experience in bug bounty programs, penetrationtesting, or vulnerability management platforms. Background in cybersecurity consulting or professional services. Experience with enterprise security tools and technologies. Certifications such as CISSP More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Context
vulnerabilities and responding to security incidents. Key Responsibilities * Collaborate with outsourced SOC to manage security incidents and alerts * Investigate and remediate issues identified in penetration tests * Work on Incident Response processes and plans to improve organisational security resilience * Maintain and optimise security tools, including QRadar, Sophos, Cisco Umbrella, and … in networking, core infrastructure and security * Ideally have hands-on experience with QRadar, Sophos, Cisco Umbrella and Qualys * Ability to remediate security issues from penetrationtesting reports * Understanding of security operations and incident response * Experience working with outsourced SOCs * Good knowledge of threat detection, vulnerability management and compliance More ❯
Familiarity with security frameworks like NIST, OWASP, and industry-specific standards, such as FDA cybersecurity guidelines Experience in assessing and managing security risks through penetrationtesting, threat modeling, and other methods Knowledge of compliance standards such as ISO 27001, HIPAA, GDPR, and others, with an understanding of Quality … security risk assessments and recommend solutions tailored to both technical and business objectives Provide guidance on best practices for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed More ❯
Familiarity with security frameworks like NIST, OWASP, and industry-specific standards, such as FDA cybersecurity guidelines Experience in assessing and managing security risks through penetrationtesting, threat modeling, and other methods Knowledge of compliance standards such as ISO 27001, HIPAA, GDPR, and others, with an understanding of Quality … security risk assessments and recommend solutions tailored to both technical and business objectives Provide guidance on best practices for secure coding, threat modeling, and testing of connected devices, ensuring industry standards are met Lead efforts to review and improve security measures, including vulnerability assessments and risk evaluations Stay informed More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and … mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So More ❯
Security reviews for new products, technologies, and services Secure design, architecture, and implementation Secure development life-cycle (SDLC) practices including threat modeling and security testing Influence decision-makers and stakeholders to achieve a consistently high security bar Conduct network and/or application penetrationtesting Create security More ❯
Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetrationtesting, vulnerability assessment, managed security, and more. Our mission is to protect businesses by delivering tailored, cutting-edge cybersecurity solutions that keep them More ❯
AN ABSOLUTE MUST. In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetrationtesting tools. Experience with Wiz and its integration for continuous security monitoring in GCP environments. Strong experience with infrastructure-as-code (IaC) using More ❯
against regulatory requirements defined against NCSC s Cyber Assessment Framework (CAF) dashboard reporting of CAF attainment status and tracking of assurance activities such as penetrationtesting and management of audit actions. Delivery of these services will require the role to engage with technical and non-stakeholders across our More ❯
against regulatory requirements defined against NCSC's Cyber Assessment Framework (CAF) dashboard reporting of CAF attainment status and tracking of assurance activities such as penetrationtesting and management of audit actions. Delivery of these services will require the role to engage with technical and non-stakeholders across our More ❯
Glasgow, Stobcross (historical), City of Glasgow, United Kingdom
Morson Talent
against regulatory requirements defined against NCSC’s Cyber Assessment Framework (CAF) dashboard reporting of CAF attainment status and tracking of assurance activities such as penetrationtesting and management of audit actions. Delivery of these services will require the role to engage with technical and non-stakeholders across our More ❯
application security industry experience with at least four of the following: threat modeling experience, secure coding, identity management and authentication, Web Application Security, cryptography, penetrationtesting, cloud security, mobile security, and network security Intimate knowledge and understanding of security engineering, web application security, system and network security, authentication More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
and help customers implement incident response plans, which outline steps to take in case of a security breach. Perform security assessments for customers, including penetrationtesting, to identify weaknesses in systems and networks and propose mitigation plans where required. Recommend, design and implement security tools and technologies such More ❯
Birmingham, England, United Kingdom Hybrid / WFH Options
Experis UK
since 2003 and our focus has always been on excellence in cyber security. We have teams that offer world class services in red teaming, penetrationtesting, threat intelligence, research and development, detection and response, governance, risk, and compliance, and plenty more. Our business is global and so are More ❯
with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯