processes and tools (e.g. automation of workloads) Carry out basic hands on security assessments (e.g. SSL Labs config or CSP evaluator, not full pen testing) Gather security KPIs and support drafting of security management reporting Own completion and accuracy of all security related product delivery evidence Technical scope Security … products (email filtering (including authentication protocols), AV, firewalls, WAFs, MS 365 Defender, SIEM) Security Testing (SAST, DAST) Virtualisation platforms and operating systems, including Hyper-V and Windows Server. Enterprise Systems (email, PKI, AD, GP, SCCM, Azure, M365, Intune) Application platforms (MS Dynamics, Power Platform) Cloud platforms (Azure) Detection engineering more »
of Information Security frameworks including NIST, ISO27001/17 and STRIDE Threat Modelling Framework. Understanding of general security practices such as encryption, IAM, PAM, penetrationtesting, container security, security information and event management etc. and supporting technologies. Ability to take ownership and work proactively . Organised with a more »
Gloucester, Gloucestershire, United Kingdom Hybrid / WFH Options
Confidential
new domains Provide domain knowledge for technical analysis, experimental development and subsequent engineering Researchers undertaking vulnerability & technical research are expected to: Know which pen-testing and reverse engineering tools and methodologies are appropriate to a given problem Have experience of advanced vulnerability assessment techniques such as fuzzing and code more »
operational developments and architect and implement new solutions. The post holder will also be responsible for maintaining network management systems, system diagrams, specification and testing of network hardware, development of processes and procedures and management of hardware support contracts. If you are looking for a challenge and want to … disciplines in IT are assessed in terms of vulnerabilities and exposure to internal or external attack. maintain network management systems, system diagrams, specification and testing of network hardware, development of processes and procedures and management of hardware support contracts. be responsible for meeting the performance objectives and ensuring the … to Master's level or proven equivalent experience Certified Information Systems Security Professional (CISSP) or equivalent. One of the following Certifications: GIAC Web Application Penetration Tester, Certified Ethical Hacker, Offensive Security Certified Professional (OSCP) Evidence of continuing professional development IT Infrastructure Library (ITIL) Foundation Level Cisco CCNA Certification (Switching more »
West End, London, Oxford Circus, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
risk assessments, and ensure compliance (ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetrationtesting, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business Continuity : Design more »
requests and competing priorities. Self-learning mind set - desire to learn new skills and willing to share knowledge within the team Knowledge of Pen testing and experience of supporting applications on AWS would be beneficial. Please Note: In order to be considered for this role, you will need to more »
Chichester, West Sussex, South East, United Kingdom
Natures Way Foods
essential. Key Responsibilities Responsible for educating the workforce on information security through training and building awareness. Threat modelling, mitigation, validation, including software and hardware penetration testing. Work with all functions of the IT department to design security into the system and drive security reviews. Develop tools to assist in more »
Spalding, Lincolnshire, East Midlands, United Kingdom Hybrid / WFH Options
Bakkavor
Oracle JavaScript frameworks such as AngularJS, NodeJS REST/SOAP services Authentication methods such as OIDC/JWT Secure coding standards (OWASP, STRIDE) and penetrationtesting (Burp Suite) Software development principles and architecture patterns Knowledge of testing methodologies (unit, integration tests) and tools Knowledge of DevOps with … demonstratable experience in building automation (builds, deployments, testing, infrastructure as code) Experience working with Waterfall and Agile methodologies. What you'll receive. As an equal opportunity employer, we're committed to providing a safe and rewarding environment for you to thrive in. This is why we work hard to more »
Leeds, England, United Kingdom Hybrid / WFH Options
Cyber Security Jobsite
structures. Self-starter and capable of independent working Team player and adept at working in multi-disciplinary and diverse teams Desirable Software engineering experience Penetrationtesting skills Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in more »
University Hospitals Bristol and Weston NHS Foundation Trust (UHBW)
to ensure that the Trust's counter-measures are fit for purpose and meet relevant Standards Lead in the development and execution of periodic testing of business continuity management and containment plans associated with Cyber Security incidents, including coordination of penetrationtesting where appropriate. Provide a point more »
security, compliance and identity services. Managed SOC Managed XDR Cloud Security (M365, Azure, AWS) Managed SIEM (Sentinel + multi vendor) Security Professional Services Pen Testing Red Teaming ISO27001/Cyber Essential Plus Apps/Infra testing You role will be to drive sales across through a mix of more »
security, compliance and identity services. Managed SOC Managed XDR Cloud Security (M365, Azure, AWS) Managed SIEM (Sentinel + multi vendor) Security Professional Services Pen Testing Red Teaming ISO27001/Cyber Essential Plus Apps/Infra testing You role will be to drive sales across through a mix of more »
effectively. Main Purpose of Role This role is key to supporting the Company with consistently high standards in the delivery of the range of penetrationtesting that we offer clients, including scoping, testing, and reporting. Key Responsibilities · Deliver CHECK penetrationtesting engagements. · Deliver non-CHECK … penetrationtesting engagements. · Scoping work as part of pre-sales. · Service delivery through reporting and quality assurance. · Working independently on-site for clients, within the Salus Cyber office and at home (if desired). · Maintaining your technical knowledge - understanding relevant national and international policies and standards as well … of technical articles and blog posts for marketing. · Assist in the creation of training material and methodologies for consumption by the wider team. · Providing penetrationtesting of all kinds - INF, APP, Mobile, Cloud, AD etc. · Giving guidance to new and developing team members with varying levels of skill more »
do this whilst learning about new technologies and approaches, with room to learn, develop and grow. Essential Requirements: Java experience Microservices Architecture Automated acceptance testing/BDD/Cucumber Performance and scalability testing, e.g. JMeter Penetrationtesting knowledge/OWASP Kubernetes/Container orchestration platform experience more »
Responsibilities: Product Security: Lead the assessment and enhancement of security measures for all software products developed for our hardware. Conduct in-depth security assessments, penetrationtesting, and vulnerability assessments. Drive the development of secure coding practices and guidelines. Cyber Security Leadership: Provide strategic vision and technical leadership for more »
Base Web Security Gateway Email Security Data Loss Prevention Anti-Virus Preferred Qualifications Experience in network/host vulnerability analysis, intrusion analysis, digital forensics, penetrationtesting, or related areas 2-3 years of hands-on SOC/TOC/NOC experience GCIA required. GCIH, GCFE, CISSP, Security + more »
vulnerabilities Fix detected vulnerabilities to maintain a high-security standard Support in the development of company-wide best practices for IT security Perform internal penetrationtesting if required Help colleagues install security software and understand information security management Be an escalation point for the service desk, resolving security more »
we help to protect our customers from current and emerging security threats. We provide a full spectrum of cyber security services including CREST-certified penetrationtesting, 24/7 threat monitoring, compliance support and security training to help organisations protect against today’s evolving threat landscape. Interested? If more »
Manchester, England, United Kingdom Hybrid / WFH Options
Henderson Scott
design and approach achieve the desired security outcomes and are operationally viable. Supporting change initiatives in utilising central security services, such as security monitoring, penetrationtesting, and access management. Ensuring security control requirements are met throughout the project life cycle, in collaboration with our Application Security Testingmore »
with cross-functional teams to identify security risks, and developing mitigation strategies. Implementing security controls and protocols across the organisation. Conducting vulnerability assessments and penetrationtesting to identify potential security weaknesses. Managing relationships with third-party vendors to ensure they meet our security requirements. Collaborating with the IT more »
About the Role Tesco Technology are looking for a Security Engineer reporting into the Vulnerability Management and Pentesting team. This is an exciting opportunity for a highly motivated security focused engineer to join our expanding organisation. The role will involve more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom
Be Technology
budgets for capital expenditure projects for management approval. Housekeeping: Document policies and procedures, disaster recovery planning, archiving, monitoring usage, software upgrades, web usage, licenses, penetrationtesting, cybercrime prevention, and insurance. Troubleshoot system and network problems. Install and configure computer hardware, operating systems, and applications, including site-specific installations more »
security black holes, and the ability to teach the ways of The Force to legions of small business owners. Responsibilities Include: · Scope and perform penetrationtesting and vulnerability research of complex proprietary software and hardware for client services. · Identify and assess vulnerabilities in systems and applications. This includes … utilising manual and automated testing methods to find and exploit code flaws, misconfiguration, and insecure software. · Write clear and concise penetrationtesting reports detailing findings and recommendations. · Provide recommendations for remediation of identified vulnerabilities. · Join senior leaders or stakeholders on client kick-off and discovery sessions to … answer questions from prospects and clients. · Develop and maintain security testing plans. · Consult with customers to demonstrate security testing results, explain the threat presented by the results, and provide expert advice on remediation. · Perform Cyber Essentials and Cyber Essentials Plus assessments. Essential Requirements · Offensive Security Certified Professional (OSCP more »
security across the UK. The role would see you developing and elevating the security best practice covering incident response and investigation, threat hunting/penetrationtesting, as well as identifying emerging technologies and business threats, plus much, much more. The technology stack is primarily based around Microsoft so more »