mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerability scanning, penetrationtesting, and security audits. Please apply for more details More ❯
BA1, Bath, Bath and North East Somerset, Somerset, United Kingdom
YT Technologies
mentoring: Proven ability to lead, mentor, and develop a high-performing governance, risk, and compliance (GRC) team. Vulnerability management: Experience scoping, overseeing and interpreting the results of vulnerability scanning, penetrationtesting, and security audits. Please apply for more details More ❯
limited to: Maintaining an Information Security Management Systems, effectively identify and manage IT risk and conduct risk assessments and inform mitigation strategies Supporting the Systems Engineering team to execute penetrationtesting, remediation processes and security checks and develop security tools, processes and technologies, keeping future certifications for security standards in mind such as Cyber Essentials or ISO27001 Creating More ❯
and clear with their opinions. Desirable qualifications, capabilities, and skills: Experience in a software engineering role, ideally with focus on security. Working knowledge of offensive security, Application and Infrastructure penetrationtesting (OWASP top 10, OWASP ASVS). Understanding of security vulnerabilities and remediation options in codebases & containers. Working knowledge of methods for authentication and authorization (ODIC, OAuth More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Ashdown Group
considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and penetrationtesting - Previous experience of delivering Cyber Essentials Plus - Knowledge of security frameworks - Generalist IT security background - Strong communication skills More ❯
Ashby de la Zouch, Ashby-de-la-Zouch, Leicestershire, United Kingdom
VIQU IT
the design, implementation, and management of cyber security technologies across the business Monitor and respond to security incidents, alerts, and helpdesk requests, maintaining robust threat detection Conduct vulnerability assessments, penetrationtesting, and phishing simulations to identify and mitigate risks Collaborate closely with IT teams to embed security best practices into system management and project delivery Stay up to More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
key lifecycle management, advanced threat modelling, SOC operations, securing microservices and APIs, DevSecOps best practices, vulnerability scanning, tools, approaches, vulnerability patching and vendor management for security Strong experience in penetrationtesting and hands-on coding in at least one of the following: JavaScript, Java, Python. Some other highly desirable skills include: Experience in hands-on configuration, deployment and More ❯
directly with SIEM/SOC and how to get the best from this service Ability to develop and evolve SOC and SIEM operation with third party Experience with network penetrationtesting and techniques Develop and promote best practice for information security, and conduct threat research Experience writing detail incident reports and documenting detections so that future breaches can More ❯
directly with SIEM/SOC and how to get the best from this service Ability to develop and evolve SOC and SIEM operation with third party Experience with network penetrationtesting and techniques Develop and promote best practice for information security, and conduct threat research Experience writing detail incident reports and documenting detections so that future breaches can More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Huddersfield, West Yorkshire, England, United Kingdom
Aindale KTD
Cyber Essentials & IASME Assured Level 1 assessments Working on Cyber Essentials Plus & IASME Assured Level 2 (Audited) audits Carrying out Internal Vulnerability Scanning (including customising reporting) Carrying out External PenetrationTesting (including customising reporting) Using enterprise level tools to analyse and assess vulnerabilities Assist with the evolving product and services portfolio available to clients Assisting the sales and More ❯
Chelmsford, Essex, South East, United Kingdom Hybrid / WFH Options
Keystream Group Limited
and cyber security strategy, ensuring alignment with their overall risk appetite and transformation goals. Oversee governance, risk, compliance, and security operations including incident response, threat intelligence, vulnerability management, and penetration testing. Direct the selection, deployment, and maintenance of appropriate security technologies and processes to protect ECCs data and assets. You will be responsible for designing and implementing the evolution More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! CTO Lead a Full-Stack Transformation More ❯
knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (preferably AWS) Cybersecurity best practices, disaster recovery, and penetrationtesting Demonstrated success in modernising platforms, leading performance turnarounds, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Success Will Be Measured By … and automation efficiency gains Noticeable improvement in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of a disaster recovery plan Positive user feedback on platform improvements Interested? Please Click Apply Now! Head of IT Lead a Full-Stack Transformation More ❯
Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (AWS preferred) Cybersecurity best practices, disaster recovery, penetrationtesting Demonstrated success in modernising platforms, optimising performance, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Real estate/estate agency sector … and automation efficiency gains Noticeable improvements in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of disaster recovery plan Positive user feedback on platform improvements Interested? Click Apply Now to lead the transformation. Head of Information Technology - Manchester - £80K + Bonus More ❯
Deep knowledge of: PHP 8+, MySQL 8, Apache 2.4, Redis AI/ML tools (speech/NLP, automation, prediction engines) Cloud infrastructure (AWS preferred) Cybersecurity best practices, disaster recovery, penetrationtesting Demonstrated success in modernising platforms, optimising performance, and delivering new systems Strong communication skills for cross-functional collaboration and business alignment Real estate/estate agency sector … and automation efficiency gains Noticeable improvements in platform speed, uptime, and stability Zero breaches or vulnerabilities post-security audits Seamless integration of tools into unified systems Successful implementation and testing of disaster recovery plan Positive user feedback on platform improvements Interested? Click Apply Now to lead the transformation. Head of Information Technology - Manchester - £80K + Bonus More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising and remediating vulnerabilities. Work closely with colleagues performing related penetrationtesting and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising and remediating vulnerabilities. Work closely with colleagues performing related penetrationtesting and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerability management and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. Data & Optimization Business intelligence. Manage analytics and reporting for site performance, engagement, and conversions. More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
extend. Local candidates will be preferred. Skills/experience required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Proficiency in vulnerability identification and penetrationtesting techniques Strong understanding of Android OS security features and architecture Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases … point during the recruitment process, if there is a better way for us to communicate, please do let us know. Developer, Engineer, Programmer, Java, Android, Mobile OS, Malware, Virus, Penetration Test, Threat, OSCP, Cyber, Infosec, Security, Information Security, Pentest #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Sanderson
risks. Own control frameworks - Maintain and improve controls to ensure alignment with standards like NIST CSF and COBIT. Drive assurance - Monitor the effectiveness of security controls, including outcomes of penetrationtesting and red team exercises. Collaborate with business units - Act as a security advocate and guide cross-functional teams in secure practices. Lead technical initiatives - Provide hands-on More ❯
Manchester, Lancashire, United Kingdom Hybrid / WFH Options
Smart DCC
testing. • Extensive experience of working within an architectural framework such as TOGAF or BCS to design Cloud based solutions. • Experience of running well-architected reviews for cloud workloads, security penetrationtesting and remediations. • Experience with ISO 27001 and other best practices. • Excellent written and oral communication skills including presentation skills and ability to articulate technical information and convey More ❯