Cardiff, Wales, United Kingdom Hybrid / WFH Options
Yolk Recruitment Ltd
IT security awareness, implement best practices, and improve security capabilities. Manage security operations, guiding the team to resolve alerts and incidents. Conduct risk and vulnerability assessments and ensure the achievement of required certifications. Oversee incident response plans and ensure timely resolutions. Quality Assurance & Change Management: Manage the process, tools More ❯
infrastructure architect to deploy infrastructure solutions aligned with business needs and technological advancements. Implementing security measures such as firewalls, encryption, access controls, and conducting vulnerability assessments. Automating infrastructure setup and management through scripting and coding for efficiency and consistency. Monitoring system performance, resource utilization, and setting up logging to More ❯
Bristol, Gloucestershire, United Kingdom Hybrid / WFH Options
Pertemps
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
meet regulatory and industry standards. The Role Key Responsibilities: Identify security requirements and integrate controls into product development. Conduct risk assessments, threat modeling, and vulnerability analysis. Develop and implement risk management strategies using security frameworks. Collaborate with development teams to ensure security best practices and secure-by-design principles. … JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetration testing, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem More ❯
Security Testing & Penetration Testing (Ethical Hacking) Simulate attacks to find vulnerabilities. Tools: Burp Suite , OWASP ZAP , Metasploit . CEH , OSCP , CISSP certifications an advantage Vulnerability Testing Scan systems for known vulnerabilities. Collaborate with SecOps and DevSecOps teams. Security QA/Secure Code Testing Test software from a secure coding … AI compliance. Seniority Level Associate Industry IT Services and IT Consulting Employment Type Full-time Job Functions Information Technology Skills Test Automation Functional Testing VulnerabilityAssessment and Penetration Testing (VAPT) Test Management Selenium More ❯
and regulatory requirements, establishing and enforcing cybersecurity policies, standards, and guidelines to protect the University's assets and data. Conduct regular risk assessments and vulnerability analyses to identify potential threats and weaknesses in the University's infrastructure, implementing and overseeing risk management processes, ensuring that appropriate controls and countermeasures … higher education or similarly complex organisation, including management of staff and resources. Experience of gathering operational evidence on the performance of cyber security using vulnerabilityassessment tools. An awareness and understanding of networking and communication related concepts and cloud virtualisation techniques. Benefits Package Below is just a short More ❯
Reading, Oxfordshire, United Kingdom Hybrid / WFH Options
Summer Browning Associates
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
SUMMER-BROWNING ASSOCIATES LIMITED
assurance and the measurement of controls. Experience of IT Security documentation (policies, standards, processes, procedures and patterns). Experience of IT Health Check and Vulnerability Assessments Experience of risk and threat modelling. Qualifications: accreditation/assurances CISM/XCCP/ISO More ❯
and compliance frameworks. Lead application security initiatives (OWASP, NIST standards). Guide cloud infrastructure, DevSecOps, CI/CD, and API security efforts. Conduct audits, vulnerability assessments, and champion best practices. Be a trusted advisor on cloud security to engineering, ops, and legal teams. You’ll Bring: Proven experience as More ❯
Identify, manage, and mitigate security vulnerabilities in the delivery of your project(s) to minimise the risks, including use of IT Health Check and Vulnerability Assessments as required. Advise managers and produce recommendations for the implementation of security controls Assess the performance and effectiveness of security elements as directed More ❯
Chatham, Kent, South East, United Kingdom Hybrid / WFH Options
Intertek
will work on both infrastructure and applications, conduct IT Health Checks, and review IT configurations to identify gaps. About the Role Perform pen tests, vulnerability assessments and build reviews both remotely and at client sites, against network devices, servers, end user devices, cloud technologies, wireless networks, web and mobile More ❯
to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability assessments across a range of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will More ❯
to join our dynamic team based in Belfast. As a Pen Tester, you will be part of the delivery team, conducting penetration tests and vulnerability assessments across a range of technologies and a wide range of customers including software, fintech, manufacturing, engineering, legal, and public sector. Your insights will More ❯
and network coverage. Ensuring secure authentication, data encryption, and penetration testing for IoT devices. Conducting security tests on IoT devices, ensuring data privacy and vulnerability assessments. Verifying data integrity, synchronization, and handling of big data in IoT systems. Knowledge of writing & automating IoT testing scripts and integrating with CI More ❯
secure coding practices. Solid background in IT architecture design, systems integration (ERP, CRM, HRM, project management tools), and optimization. Proficiency in conducting risk assessments, vulnerability assessments, and penetration testing. Experience managing or working with Ops, DevOps, Jira, Helpdesk, and Development teams. Ability to lead complex IT projects and large More ❯
build innovative ways of assessing and managing technology risk. Principal Accountabilities Service Asset & Configuration: Support asset management strategies, collect and catalogue metadata, assist in vulnerability assessments, and ensure accuracy in asset data onboarding. Risk & Event Analysis: Analyse technology issues and risks, assist in risk assessments and control testing, and More ❯
Bradford, Yorkshire, United Kingdom Hybrid / WFH Options
Freemans Grattan Holdings (fgh)
engineers QA teams and digital experience owners to improve DevOps best practices and workflows within an Agile framework. Implementing security measures, compliance policies, and vulnerability assessments following OWASP guidelines and applicable UK regulations such as UK-GDPR, UK Payment Services Regulations and PCI-DSS. Supporting disaster recovery planning and More ❯
Strong communication and documentation skills. Knowledge of accessibility standards and compliance testing. Experience with API testing and integration testing. Knowledge of security testing and vulnerability assessment. As an equal opportunities' employer, we welcome applications from individuals of all backgrounds. However, for you to be eligible for this role, you More ❯
practices for cloud infrastructure. Ensure compliance with industry standards and regulations (e.g., GDPR, PCI DSS, relevant aviation regulations). Conduct regular security audits and vulnerability assessments. Performance Monitoring and Troubleshooting: Monitor system performance and identify potential bottlenecks. Troubleshoot and resolve infrastructure-related issues. Implement proactive monitoring and alerting systems. More ❯
Jenkins, GitLab CI). Promote best practices such as TDD and BDD to improve code quality and delivery velocity. Lead security assurance initiatives, including vulnerability assessments, secure code reviews, and penetration testing. Implement automated security validation tools (e.g., Burp Suite, OWASP ZAP). Ensure compliance with national cybersecurity regulations More ❯
programming with at least one modern language such as Java, C++, or C# including object-oriented design. Experience in penetration testing and exploitability-focused vulnerability assessment. Experience in platform-level security mitigations and hardening for Linux and Windows. PREFERRED QUALIFICATIONS Knowledge of overall system architecture, scalability, reliability, and performance More ❯
is essential . This includes configuring Azure-native security tools, leveraging cloud IAM, and ensuring best practices in Azure infrastructure design. Key Responsibilities: Security Assessment & Risk Analysis Update documentation on current security posture. Conduct risk assessments and gap analyses against industry standards (ISO 27001, NIST). Identify vulnerabilities and … and auditing procedures. Compliance & Regulatory Documentation Ensure adherence to GDPR, HIPAA, PCI-DSS, and other regulations. Prepare audit documentation and compliance mapping. Penetration Testing & Vulnerability Management Develop and execute penetration testing plans. Conduct vulnerability assessments and oversee remediation efforts. Training & Knowledge Transfer Create security awareness materials. Conduct training More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice More ❯
InTune Knowledge of administering and supporting Entra (Azure AD), Azure IaaS/PaaS Management of backup/recovery solutions Experience with operating system hardening, vulnerability assessments, security audits, penetration testing, intrusion prevention systems and other security control systems for example PAM, SIEM etc. Experience with endpoint security, content filtering … vulnerability scanning and anti-malware Knowledge of at least one scripting language (e.g. PowerShell) MS InTune device management (mobile and Windows 10/11 OS) Demonstrable knowledge of common vulnerabilities and exploitation techniques would be beneficial Familiarity with Cyber Essentials/Plus or ISO 27001 and ITIL best practice More ❯
City Of London, England, United Kingdom Hybrid / WFH Options
Sarafin Partners
platforms in accordance with the defined policies, standards and procedures, as well as with industry best practices and vendor guidelines Completion of threat and vulnerability assessments, in some cases followed by appropriate remedial action, to ensure that systems are protected from known and potential threats and are free from … role, the individual will need: Exceptional communication skills (both written and verbal) At least 18 months experience of working with cybersecurity principles, including risk assessment and management, threat and vulnerability management, incident response, and identity and access management Experience in developing, documenting and maintaining security procedures Knowledge of More ❯