posture across the business. A Day in the Life: Design and implement technical security architecture across IT systems, cloud platforms, and customer-facing services Lead advanced security operations including penetrationtesting, forensic analysis, threat hunting, and incident response Drive security automation initiatives and integrate DevSecOps best practices into our CI/CD pipelines Provide expert cybersecurity guidance to More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Actively participate the delivery of services provided by the Cyber Intelligence Centre including by not limited to Cyber Threat Intelligence, Security Posture Management, Cyber Security Incident Response, Threat Hunting, PenetrationTesting & Red Team Testing, and Cyber Risk Mitigation. Incorporate threat intelligence into CIC activities. Collaborate and assist with the investigation and resolution of complex security incidents. Support More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetrationtesting, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetrationtesting, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving More ❯
Senior Offensive Security Consultant | Remote (UK) | CHECK Team Member 🚨 We’re looking for a Senior Offensive Consultant (Penetration Tester) who lives and breathes hacking. You’ll have hands-on CHECK experience, ideally leading technical teams, and a passion for breaking things in the name of security. What You’ll Do: Deliver high-impact penetration tests & red-team engagements … Mentor junior penetration testers & peer review reports Engage with top-tier government & commercial clients Shape business strategy and contribute to proposals Share knowledge, grow your offensive security/penetrationtesting skills, and be part of something exciting What We’re Looking For: Proven experience in UK cyber security (CHECK, CREST, NCSC frameworks) Strong tech chops across networks … app security Excellent communicator who thrives in client-facing roles SC clearance eligible (DV a bonus)/(OSCP bonus) Bonus Points For: R&D or threat intel experience Application testing or ISO17025 environments That hacker mindset we all love We care about passion and skill, not paper. No degree? No problem. Join us to work on some of the More ❯
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Anson McCade
SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerability management, penetrationtesting, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation and reports. More ❯
glasgow, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerability management, penetrationtesting, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation and reports. More ❯
paisley, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerability management, penetrationtesting, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation and reports. More ❯
milton, central scotland, united kingdom Hybrid / WFH Options
Anson McCade
SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerability management, penetrationtesting, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation and reports. More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
london (city of london), south east england, united kingdom
AirSearch
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
detection, incident response, and recovery, ensuring minimal business disruption. Manage patching processes, AI-driven email intelligence tools, and network security across internal and customer-facing systems. Conduct risk assessments, penetrationtesting, and ensure compliance with standards such as ISO 27001, GDPR, and NIS2. Drive organisation-wide security awareness and training programmes. Maintain and test business continuity and disaster More ❯
City of London, London, United Kingdom Hybrid / WFH Options
Anson Mccade
SIEM query languages (KQL, SPL, AQL), and automation with Python/PowerShell. Deep understanding of incident response, threat detection, and frameworks (MITRE, NIST, CIS). Knowledge of vulnerability scanning, penetrationtesting, and network traffic analysis. Familiarity with ITIL processes (Incident, Problem, Change). Excellent stakeholder communication, with the ability to mentor and lead from a technical perspective. Desirable More ❯
Horsham, West Sussex, South East, United Kingdom Hybrid / WFH Options
Platform Recruitment Limited
platforms (Office 365, Azure, AWS) Experience working with or managing a SOC Practical 3rd line operational security background Familiarity with audits, compliance frameworks, and risk management Knowledge of pen testing, vulnerability scanning, and networking best practices Confident project management skills and ability to lead from the front This is an opportunity to be the go-to security expert in More ❯
of areas such as access management, IT operations, job scheduling/monitoring, data transfer (focusing on the completeness/accuracy of this), network security, cyber security, system development and testing, vulnerability assessment and penetrationtesting, and operational resilience. Must Haves: Previous experience as a technology auditor covering IT application and general controls, application development, information security, technology More ❯
culture through knowledge-sharing, pair programming, and hands-on support Ensure solutions comply with internal architecture and security guidelines, including secure coding practices and resolution of code vulnerabilities and penetrationtesting findings Champion modern DevOps practices including CI/CD, infrastructure-as-code, and automated testing Collaborate closely with Product Owners, Business Analysts, Designers, and other Engineers … e.g. Jenkins, Maven, Docker, Kubernetes, Terraform) Experience with cloud platforms (Azure, GCP, or AWS preferred) Strong understanding of software security principles and modern secure development practices Knowledge of automated testing frameworks (e.g. Jest, Testing Library, Cypress, Cucumber) Familiarity with tools like npm, Webpack, and source control systems like Git Experience with Agile delivery methodologies and iterative development Ability More ❯
Edinburgh, Midlothian, United Kingdom Hybrid / WFH Options
FDM Group
culture through knowledge-sharing, pair programming, and hands-on support Ensure solutions comply with internal architecture and security guidelines, including secure coding practices and resolution of code vulnerabilities and penetrationtesting findings Champion modern DevOps practices including CI/CD, infrastructure-as-code, and automated testing Collaborate closely with Product Owners, Business Analysts, Designers, and other Engineers … eg Jenkins, Maven, Docker, Kubernetes, Terraform) Experience with cloud platforms (Azure, GCP, or AWS preferred) Strong understanding of software security principles and modern secure development practices Knowledge of automated testing frameworks (eg Jest, Testing Library, Cypress, Cucumber) Familiarity with tools like npm, Webpack, and source control systems like Git Experience with Agile delivery methodologies and iterative development Ability More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯
measures in line with best practices to ensure that the client is protected against the latest cyber security threats • Work with third parties and internal teams to schedule proactive penetration tests, ensuring that vulnerabilities are resolved or mitigated • Support the delivery of security training to all end users • Regular monitoring of potential security risks externally and internally, provide clear … to protect against unauthorised access and potential threats • Proficient with SIEM, IDS/IPS, vulnerability scanners, and Azure security tools. • Experience of leading on technical vulnerability assessments and regular penetrationtesting of IT systems and processes to identify potential vulnerabilities and provide recommendations for risk mitigation • Experience in testing and reviewing new security solutions • A strong commitment More ❯