Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
ISO27001, NIST 800-30/37/53, JSP 440, 604, and Defence Standards. Develop and maintain security documentation (e.g., RMADS, Security Assurance Documents, Security Management Plans). Conduct penetrationtesting, vulnerability assessments, and remediation activities. The Person Key Skills & Experience: Strong knowledge of risk management frameworks and methodologies (ISO 27001/2, ISO27005/31000, NIST … NIST 800-53). Experience with defence and government security standards (JSPs, Def Stan 05-138/139). Proficiency in security testing tools, technologies, and techniques. Ability to analyze and mitigate security vulnerabilities effectively. Strong problem-solving, decision-making, and communication skills. Qualifications & Requirements: Degree in Cybersecurity, Computer Science, or a related field (or equivalent experience). Industry More ❯
Welwyn Garden City, England, United Kingdom Hybrid / WFH Options
PayPoint plc
You'll also work on automating routine tasks to speed up our response times. From start to finish, you’ll oversee cybersecurity incidents, document findings, and suggest improvements. Security Testing & Business Support: You’ll take part in cyber-attack simulations, penetrationtesting, and security drills to ensure our defenses are strong. You'll also help identify critical More ❯
London, England, United Kingdom Hybrid / WFH Options
The Curve Group
The Curve Group Executive Search, Talent Acquisition & Recruitment Outsourcing Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/… in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
As a crucial member of the team, you will collaborate with a talented mix of Product Owners/Managers, Solution, Cloud and Enterprise Architects, Experience Designers, Business Analysts, and Testing specialists to build, deliver, and manage a portfolio of truly exciting products. In recent years, our products' size and scale have rapidly expanded, leading to significant growth in our … and management of Product/Platform security processes and automated tooling that prevent security issues. Support on threat modelling exercises for our products. Perform security-focused code reviews. Support penetrationtesting activities. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and … principles across our product engineering team. Manage escalations of security related issue, risk or exceptions, including audit actions Lead Clara’s relationships with central security teams (Security Architecture, Security Testing, Security Operations) and contribute to communities of practice. What will you need to do it? Excellent understanding of security controls within Azure environments Previous experience developing cloud-native applications More ❯
As a crucial member of the team, you will collaborate with a talented mix of Product Owners/Managers, Solution, Cloud and Enterprise Architects, Experience Designers, Business Analysts, and Testing specialists to build, deliver, and manage a portfolio of truly exciting products. In recent years, our products' size and scale have rapidly expanded, leading to significant growth in our … and management of Product/Platform security processes and automated tooling that prevent security issues. Support on threat modelling exercises for our products. Perform security-focused code reviews. Support penetrationtesting activities. Prioritise and oversee vulnerability remediation. Manage the implementation of logging and integration to the corporate SIEM for SOC monitoring. Lead Clara’s response to incidents and … principles across our product engineering team. Manage escalations of security related issue, risk or exceptions, including audit actions Lead Clara’s relationships with central security teams (Security Architecture, Security Testing, Security Operations) and contribute to communities of practice. What will you need to do it? Excellent understanding of security controls within Azure environments Previous experience developing cloud-native applications More ❯
Newcastle upon Tyne, United Kingdom Hybrid / WFH Options
NHS Business Services Authority
value. Assist in managing security incidents, vulnerabilities, and malfunctions, ensuring efficient resolution. Conduct forensically sound acquisitions of computer systems and media for evidence collection. Provide advice and guidance in penetrationtesting and improving service offerings. Carry out reviews, internal audits, and spot-checks to ensure effective operation of security measures. Provide expertise in the design and implementation of … science. This will require occasional periods of intense concentration to ensure any evidence collected can be used in a court of law. 16. Provide appropriate advice and guidance in penetrationtesting and improving the service offering. 17. Carry out reviews, internal audits and spot-checks to ensure the effective operation of (but not limited to): IDS/IPS More ❯
You'll also work on automating routine tasks to speed up our response times. From start to finish, you’ll oversee cybersecurity incidents, document findings, and suggest improvements. Security Testing & Business Support: You’ll take part in cyber attack simulations, penetrationtesting, and security drills to make sure our defenses are strong. You'll also help identify More ❯
Reading, England, United Kingdom Hybrid / WFH Options
XPS Group
collaborative. The Role As a Senior Cyber Security Engineer w ith XPS you will: Using expert security knowledge, provide technical security guidance for securing IT assets, change control, security testing, secure systems design and making recommendations to implement effective security controls. Take ownership of day-to-day running of technical vulnerability management programme. Use expert security knowledge with a … particular focus in application security testing, web application firewalls, vulnerability management and securing development pipelines to make improvements. Provide security direction and leadership as required with ability to mentor other security team members. Carry out cyber security engineering tasks using best-practice service management (ITIL), to agreed SLAs/KPIs, whilst promoting and adhering to XPS workplace values. Develop … AV, email and web security gateways, firewalls, load-balancers, ACLs, TCP/IP, routing and switching. Knowledge of current and future security initiatives e.g. OWASP standards, SASE intelligence led penetrationtesting, zero-trust, threat centric security, risk-based vulnerability management. Come from an infrastructure/networks background to fully support XPS changes and security initiatives. Has, or is More ❯
Luton, Bedfordshire, United Kingdom Hybrid / WFH Options
Leonardo UK Ltd
Plan, lead the response to security incidents and breaches, providing expertise in root cause analysis, containment, and remediation. Vulnerability Management: Conduct regular security assessments, including vulnerability scanning and writing penetrationtesting Statement of Works, and manage the remediation of identified vulnerabilities. Security Tools & Technologies Advice: Provide guidance on the selection, implementation, and optimization of security tools such as … IA Technical Risk Assessments and the management of these Assessments Good understanding and appreciation of the Engineering development lifecycles and how the Product Security specialism aligns Ability to interpret Penetration Test Reports and write Remediation Action Plans An appreciation of the wider UK Government Assurance Processes (such as the legacy JSP 604 Assurance or the CAF GovAssure processes). More ❯
London, England, United Kingdom Hybrid / WFH Options
Smart Communications group
as PCI, GDPR, ISO 27001, SOC2, NIST. An understanding of application security principles, best practices, OWASP/related standards. Some knowledge/experience in scoping/undertaking internal pen testing and creation of external penetrationtesting scopes. Knowledge of security frameworks & controls, hardening standards & security best practices. An understanding of network protocols & practices, firewalls, intrusion detection/ More ❯
of deploying, maintaining, and configuring a wide range of security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetrationtesting tools, etc.) Knowledge of TCP/IP and related network protocols: knowledge of standard network protocols like TCP, ARP, ICMP, DHCP, DNS, HTTP, SNMP, VPN etc., and More ❯
and vulnerabilities, leveraging threat intelligence to proactively mitigate risks Perform proactive threat hunting, research, and analysis, delivering actionable intelligence to IT and security teams Perform security assessments, audits, and penetrationtesting using industry-standard methodologies and tools. Deliver security awareness training and phishing simulations to internal stakeholders. Ensure compliance with company policies and applicable regulatory frameworks. Undertake ongoing More ❯
About Darkshield Darkshield is an expert cybersecurity agency based in York, UK. We help organisations navigate an increasingly complex digital landscape by providing expert services in penetrationtesting, vulnerability assessment, managed security, incident response, and compliance. Our mission is to protect businesses from cyber threats by delivering tailored security solutions that keep them resilient and secure. The Role More ❯
English communication skills. Excellent interpersonal and presentation skills. Strong analytical skills. Good understanding of network traffic flows, normal vs. suspicious activities. Knowledge of Vulnerability Scanning, Management, and Ethical Hacking (PenetrationTesting). Ability to learn forensic techniques. Ability to reverse engineer attacks. Knowledge of ITIL disciplines such as Incident, Problem, and Change Management. Ability to work independently with More ❯
London, England, United Kingdom Hybrid / WFH Options
Bridewell
Continue with Google Continue with Google Continue with Google Continue with Google Direct message the job poster from Bridewell Senior Talent Acquisition Business Partner - Cyber Security | Managed Security Services | PenetrationTesting | Data Privacy About Bridewell One of the most exciting prospects in the UK cyber security sector today, Bridewell is a leading cyber security services company specialising in More ❯
London, England, United Kingdom Hybrid / WFH Options
FSP
exceptional results that are aligned with business priorities. Our commitment to security and quality is reinforced by our ISO27001 and ISO9001 certifications (UKAS), as well as our CREST approved penetrationtesting and SOC capabilities. Additionally, we are an IASME Cyber Essentials Certification Body and Cyber Essentials Plus certified. Find out more about our accolades here: https:// More ❯
log-searching query languages and methods. Must be confident to handle common security incidents independently. Must have good understanding of Vulnerability Scanning and management as well as Ethical Hacking (PenetrationTesting) Knowledge of ITIL disciplines such as Incident, Problem and Change Management. Ability to work with minimal levels of supervision. Education Requirements & Experience Minimum of 2 to More ❯
and/or Microsoft Azure), including native security features and best practices Deep knowledge of modern security concepts, attack vectors, malware, security analytics, and threat intelligence Understanding of security testing and vulnerability management, including pen testing, CVSS, and CVE Experience with security standards such as ISO 27001, 27002, 27017, and 27108 DESIRABLE SKILLS AND EXPERIENCE CISSP, CISM, CCSP More ❯
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
St. Albans, Hertfordshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
Reading, Berkshire, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
Guildford, Surrey, United Kingdom Hybrid / WFH Options
Deloitte LLP
and, where relevant, notify leadership to incorporate information into processes, procedures, and audit preparedness activities. Perform technology security risk assessments. Where appropriate, leverage security shared services (VRA, VM, Pen Testing) and provide oversight and assurance of cybersecurity controls in development and deployment all the way through the system go-live. Hold great working relationships with the Security Architecture team More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
Due to the service of the role, it will now be based on an Umbrella solution. Essential skills/experience required: Certifications: OSCP or CREST/TIGER Scheme. Experience penetrationtesting, ethical hacking, or completing vulnerability assessments. Security testing tools (e.g., Burp Suite, OWASP ZAP, Nikto, Nmap, Metasploit, etc.). DevSecOps principles and tools (e.g., Veracode, SonarQube … Leader) - desirable Knowledge of UK public sector security and data protection standards (e.g., NCSC, Cyber Essentials Plus) - desirable Threat modelling and secure design practices - desirable Role/Responsibilities: Perform penetrationtesting and vulnerability assessments of web applications, APIs, and cloud infrastructure. Evaluate the automated security tooling into CI/CD pipelines (SAST, DAST, dependency checking, IaC etc), and … Cleared, Dv Clearance, Dv Check, Developed Vetted, Developed Vetting, Dv Strap, Active DV, Security, Cyber, Cybersecurity, Infosec, Cloud, AWS, Amazon Web Services, Azure, Python, Bash, Script, Scripting, Automate, Automation, Penetration, Pentest, Pentesting, Pen-Test, Pen-Testing, Hacking, Vulnerability, Threat, Engineer #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in More ❯
keeping our business safe from cyber-attacks. This role is technical and will help to deliver continuous operational security improvements across the Cyber Defence function including; Cyber Security Compliance, PenetrationTesting , External Attack Surface Management , Vulnerability Management and Cloud and Network security The role reports directly to the Cyber Defence Lead and is based in Edinburgh. The role … understand our external attack surface and raise actions for technical teams to remediate or mitigate risks.. Vulnerability Management, including deploying scans, prioritising based on context, and operating remediation workflows Penetrationtesting governance, including the scoping and scheduling of external penetrationtesting suppliers, the coordination of remediation actions and hands-on internal application and system testing … Experience with security tools, such as IDS/IPS, vulnerability scanners, AV, web and email filtering, webapp firewalls and DDoS protections, host-based protections and malware analysis engines, Pen testing and offensive security tooling. Familiarity with common enterprise technologies e.g. Microsoft, Linux, VMWare, Citrix Solid understanding of computer networking concepts and standards , including Network device & Firewall Hardening Passion for More ❯
educating DevOps teams in security best practices Conduct/Lead threat modelling and security design activities alongside Dev/Engineering Teams Work with 3rd parties to support vulnerability and penetrationtesting Process reports from external penetrationtesting vendors and coordinate feedback with teams to ensure actions are followed to mitigate identified risks Skills: Software engineering background … Security Frameworks e.g. OWASP SAMM/DSOMM etc Hands-on knowledge of information security processes such as security design review, threat modelling, OWASP Top 10, risk analysis, and software testing techniques Strong understanding of application security awareness, including the security of web applications Experience with risk management activities - identifying, assessing and providing remediation options for application and technology risks More ❯