reviews. Maintaining a proactive approach to service delivery and effectively managing a busy workload Providing clear communication to clients throughout the end-to-end service delivery process Assisting with penetrationtesting activities such as open-source intelligence gathering Who We're Looking For: The following skills and experience are essential for the role: 3 years or more of … United Kingdom 1 week ago Principal OT Cyber Security Consultant, Utilities & Defence (UK Wide) Manchester, England, United Kingdom 1 week ago Manchester Area, United Kingdom 2 days ago OSCP Penetration Tester 6 months+ to £45k Manchester, England, United Kingdom 1 week ago Huddersfield, England, United Kingdom 3 months ago Northwich, England, United Kingdom 2 months ago Glazebury, England, United More ❯
detection and response. Conduct threat analysis and vulnerability assessments to support incident response activities. Develop and implement incident response plans tailored to OT environments. Support vulnerability management initiatives and penetrationtesting exercises. Contribute to policy development and ensure alignment with IEC62443, NIS, CAF, OG86, and HSE regulations. Work collaboratively with IT, engineering, and security stakeholders to maintain compliance More ❯
tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetrationtesting, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience with Python scripting More ❯
tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetrationtesting, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience with Python scripting More ❯
tech and collaborate with some of the brightest minds in the industry. Desired Experience (full job spec available): Strong experience working in technical security roles Experience in vulnerability assessment, penetrationtesting, and vulnerability management processes, etc. Familiarity with security incident response procedures. Excellent communication skills and the ability to collaborate with cross-functional teams. Experience with Python scripting More ❯
that our applications withstand the evolving threat landscape. How you will contribute Assist GRC with performing technical security risk reviews and vendor assessments including code reviews, vulnerability scans, and penetration tests on internally developed applications. Contribute to the technical design of security systems and services to meet organizational needs whilst managing risks to embed security practices into the S … cloud/SaaS-based technology platforms. Certifications such as OSCP, GWAPT, or CSSLP are a plus. Bachelor's degree in a security-related field is preferred (i.e., Security Analysis, PenetrationTesting, Malware Analysis, Digital Forensics, Network Engineering, Computer Science). Strong technical knowledge across various Security Engineering pillars (Network Security, Cloud Security, Infrastructure Security, Email Security, and Endpoint More ❯
and access control) to safeguard data transmitted over O-RAN and 5G Core interfaces. Develop JOTS Compliant solutions in both O-RAN and 3GPP environments for commercial deployment. Conduct penetrationtesting to identify vulnerabilities on RAN and Core network and recommend remediation measures. Requirements Minimum 3 years working experience within enterprise networking In-Depth technical understanding of 5G More ❯
Operator to join our adversary simulation team, delivering high-impact operations against some of the most complex enterprise environments in the UK and beyond. This isn't a typical penetrationtesting role. You'll be leading tailored campaigns that emulate real-world threat actors - from phishing initial access through to cloud-native post-exploitation and domain-level compromise … and encourages new ideas and perspectives High-autonomy environment with supportive, skilled peers. Annual training & research budget - use it for conferences, courses, or tooling. Access to red team labs, testing infrastructure, CTI, and sandbox environments. Opportunities to contribute to public research, tools, and community initiatives. Flexible work, sensible management, and zero micromanagement. How to apply If you are interested More ❯
London, England, United Kingdom Hybrid / WFH Options
Jumpsec Limited
Operator to join our adversary simulation team, delivering high-impact operations against some of the most complex enterprise environments in the UK and beyond. This isn’t a typical penetrationtesting role. You’ll be leading tailored campaigns that emulate real-world threat actors — from phishing initial access through to cloud-native post-exploitation and domain-level compromise … and encourages new ideas and perspectives High-autonomy environment with supportive, skilled peers. Annual training & research budget — use it for conferences, courses, or tooling. Access to red team labs, testing infrastructure, CTI, and sandbox environments. Opportunities to contribute to public research, tools, and community initiatives. Flexible work, sensible management, and zero micromanagement. How to apply If you are interested More ❯
with engineering and DevOps teams to implement security controls across cloud infrastructure (ideally AWS), including access control, encryption, and logging. Leading the incident response process and managing third-party penetrationtesting and vulnerability management activities. The ideal Information Security Lead will have experience with the following: 3-5 years of hands-on experience in an information security or More ❯
managing and developing security teams. Excellent communication skills to influence stakeholders on security and privacy matters. Knowledge of Vulnerability and Threat Management processes, SIEM, EDR, WAF, SSO, VA tools, PenetrationTesting, Cyber Breach Insurance, MSSP services. Experience managing large projects and multiple initiatives. Familiarity with relevant laws and compliance standards. Desirable Bachelor's or Master's degree in More ❯
London, England, United Kingdom Hybrid / WFH Options
MAC Recruit Group Ltd
of the strongest personal development packages in the industry — including sponsored certifications and supported paths to leadership. To be successful in this role, you will have: Proven experience in penetrationtesting, with skills in web, mobile, cloud and internal infrastructure Exposure to professional Red Teaming projects OSCP/CRTO certification, and OSEP, CTRL or OSWE certifications would be More ❯
Enfield, Middlesex, England, United Kingdom Hybrid / WFH Options
Eden Brown Synergy
mitigate, and respond to risks and potential threats. * Utilise Microsoft Sentinel and related tools to analyse security data, detect anomalies, and respond effectively to incidents. * Oversee vulnerability assessments and penetrationtesting to ensure robust security measures are maintained. * Contribute to the development and execution of incident response plans, ensuring prompt action to contain and remediate security incidents. * Maintain More ❯
are expected to be travelling approximately 20% of the time. An Information Security or Information Technology-related qualification or a number of related certifications Proven experience with scanning and PenetrationTesting tools A broad knowledge of IP networks, its protocols, and different system architectures Remarkable interpersonal and communication skills. Active listening ability Strong time management skills and the More ❯
London, England, United Kingdom Hybrid / WFH Options
Jobgether
and security tooling recommendations Translate complex technical findings into actionable insights for both technical and non-technical audiences Collaborate across global teams including digital forensics, threat intelligence, and pen testing specialists Contribute to proposal writing and client RFPs as a subject matter expert Drive continuous improvement of services, tools, and processes within the consulting team Adhere to client and … London, England, United Kingdom 3 weeks ago Identity Security Consultant - CyberArk Exp London, England, United Kingdom 6 days ago London, England, United Kingdom 1 week ago Consultant, Application Security Penetration Tester Edinburgh, Scotland, United Kingdom 6 days ago Lead Cyber Security Advisory Consultant - Eviden London, England, United Kingdom 3 days ago London, England, United Kingdom 25 minutes ago London More ❯
London, England, United Kingdom Hybrid / WFH Options
Lunar Energy
networking and network security Proficiency in one or more scripting programming languages (Python, Ruby, Bash, etc.) Linux Desirable Skills: Experience with serverless technologies Experience with Typescript Proficiency in application penetrationtesting, ethical hacking, and vulnerability assessments Interest in the IoT and renewable energy industry Joining us gives you: A competitive salary and stock options package 25 days annual More ❯
improve our security posture. - Monitor and analyze emerging cyber threats, vulnerabilities, and exploits relevant to our infrastructure and products. Qualifications Minimum Qualifications - 5+ years of hands-on experience in penetrationtesting, vulnerability research, exploit development, or being a member of a red team. - Leading distributed high-performance teams, driving and delivering company-level cross-functional projects for at More ❯
Selby, North Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Drax
containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetrationtesting of OT systems to identify weaknesses and recommend security improvements. Policy Development: Contributing to development and maintenance of cybersecurity policies and procedures specific to OT environments. Compliance More ❯
containment, eradication, and recovery procedures. Vulnerability Management: Identifying and assessing vulnerabilities in OT systems and coordinate with relevant teams to remediate them. Security Assessment: Conducting security assessments and facilitate penetrationtesting of OT systems to identify weaknesses and recommend security improvements. Policy Development: Contributing to development and maintenance of cybersecurity policies and procedures specific to OT environments. Compliance More ❯
part of our working culture. When we feel supported in the workplace and at home, there's nothing we can't achieve. BASIC QUALIFICATIONS Extensive experience performing security investigations, penetrationtesting, and/or incident response in the context of large organizations. In-depth understanding of security threats, hands-on experience detecting and defending from cyber attacks, and More ❯
London, England, United Kingdom Hybrid / WFH Options
Forter
the stack (OS, Network, Application, Database, Storage, etc.) Excellent communication skills, including the ability to drive cross-team security initiatives Nice-to-Have Experience with threat modeling, security audits, penetrationtesting, or SAST tools Contributions to security research, blogs, talks, or open-source security projects Benefits include: Competitive salary Quarterly company bonus Private health insurance, including vision and More ❯
required Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) PIM/PAM Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
required Familiar with NIST, ISO 27001, ITIL Azure - 5 years experience Info Sec (Azure AD, Defender, Sentinel) PIM/PAM Audits and report writing Assessments Vulnerability Management and Pen Testing Zero Trust Architecture Automation (eg powershell, python More ❯
of vulnerabilities across cloud and app layers. Deliver security controls via code (Terraform, YAML, scripting). Support and improve cloud security posture (GCP/Azure). Run internal pen testing and security assessments. Build and manage a Security Champions network. Be a visible, vocal SME on all things AppSec. What You'll Bring Strong hands-on experience in AppSec More ❯
Crawley, England, United Kingdom Hybrid / WFH Options
JR United Kingdom
ESSENTIAL KNOWLEDGE, SKILLS & EXPERIENCE Deep technical understanding across skills like Microsoft Sentinel, Tenable Vulnerability Management, Azure update Manager, and related technologies. Qualifications include Microsoft Security Certifications (e.g., SC200), Pen Testing/Related Certifications. DESIRED KNOWLEDGE, SKILLS & EXPERIENCE Knowledge in Microsoft Intune (Security-focused), Privileged Access Management (PAM), and Cloud Email Security Solutions is advantageous. Training can be provided if More ❯