london (city of london), south east england, united kingdom Hybrid / WFH Options
Maxwell Bond
tailored solutions. Maintain accurate pipeline management and revenue forecasting. Deliver against ambitious new business targets, landing deals typically in the £20k–£40k range . Cybersecurity Services You’ll Sell PenetrationTesting & Red Teaming Managed Detection & Response (MDR) Security Operations Centre (SOC) services Threat Intelligence & Risk Advisory Incident Response & Crisis Management Cloud & Endpoint Security Solutions What You Bring Proven More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Maxwell Bond
tailored solutions. Maintain accurate pipeline management and revenue forecasting. Deliver against ambitious new business targets, landing deals typically in the £20k–£40k range . Cybersecurity Services You’ll Sell PenetrationTesting & Red Teaming Managed Detection & Response (MDR) Security Operations Centre (SOC) services Threat Intelligence & Risk Advisory Incident Response & Crisis Management Cloud & Endpoint Security Solutions What You Bring Proven More ❯
Doncaster, South Yorkshire, England, United Kingdom
Lorien
Ability to develop and execute winning bid strategies in a fast-paced environment. Experience managing bid pipelines and reporting to senior stakeholders. Knowledge of cyber security services (e.g., Pen Testing, Risk Management, MSSP solutions) is highly desirable. Excellent communication, negotiation, and presentation skills. Proficiency in CRM and bid management tools. A strong professional network in IT or cyber security More ❯
Reading, Berkshire, England, United Kingdom Hybrid / WFH Options
Reed
play a key role in shaping the security posture of our organisation. About the Role As a Senior Application Security Engineer, you’ll bring deep expertise in application security testing, cloud security, and secure development practices. You’ll work closely with IT, development, and project teams to embed security into every stage of the software development lifecycle and drive … Proven experience in application security engineering. Strong knowledge of security tools and technologies (e.g. WAFs, AV, email/web gateways, ACLs). Expertise in secure coding practices and security testing (SAST, DAST, SCA, Pen Testing). Familiarity with OWASP Top 10, CWE, and remediation strategies. Hands-on experience with security testing tools and techniques. Excellent communication and More ❯
team Our team isaccountable for security within the mobile channel. Weprovide a suite of mobile security components,that provides an all-round security posture in mobile appsincluding associated services (penetrationtesting, obfuscation, consultancy etc.). Our mission is tob... More ❯
importance to the organisation recruiting. Responsibilities We are looking for a hands-on Cyber Security specialist to continuously monitor networks & systems for security breaches or intrusions. Identify threats via penetrationtesting and threat modelling, working with DevOps, IT and compliance teams to enforce policies, respond to risks and improve defences. Be a fixer of Cyber Security issues, capable More ❯
New Malden, Surrey, United Kingdom Hybrid / WFH Options
Saunders Scott
data, everywhere. Smart cloud, infrastructure and security solutions, supported by wide-ranging Professional Services and Managed Services capability, we deliver cutting-edge services such as server and storage solutions, penetrationtesting, compliance and risk management, and our flagship Cloud Solution, a powerful enterprise-grade platform that combines leading software, secure storage, and cloud recovery capabilities. Selling to customers More ❯
london, south east england, united kingdom Hybrid / WFH Options
Trust In SODA
platform. Their ideal candidate would have good knowledge of: Cloud (AWS) Containers (EKS, Docker, Helm) IaC (Terraform) CI/CD (ArgoCD, GitOps) Zero Trust Architecture Security Awareness (ISO, Pen Testing, Tooling) In return they would be offering a competitive salary along with a number of top benefits: Competitive salary Flex/hybrid Working Medical 25 days AL (+ public More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Trust In SODA
platform. Their ideal candidate would have good knowledge of: Cloud (AWS) Containers (EKS, Docker, Helm) IaC (Terraform) CI/CD (ArgoCD, GitOps) Zero Trust Architecture Security Awareness (ISO, Pen Testing, Tooling) In return they would be offering a competitive salary along with a number of top benefits: Competitive salary Flex/hybrid Working Medical 25 days AL (+ public More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Trust In SODA
platform. Their ideal candidate would have good knowledge of: Cloud (AWS) Containers (EKS, Docker, Helm) IaC (Terraform) CI/CD (ArgoCD, GitOps) Zero Trust Architecture Security Awareness (ISO, Pen Testing, Tooling) In return they would be offering a competitive salary along with a number of top benefits: Competitive salary Flex/hybrid Working Medical 25 days AL (+ public More ❯
Leeds, Yorkshire, United Kingdom Hybrid / WFH Options
Stott and May
ML infrastructure across data collection, preprocessing, model training, and deployment. Implement privacy-preserving techniques such as encryption, anonymisation, and federated learning. Crypto & Blockchain Security Oversee smart contract security audits, testing, and deployment pipelines. Protect user assets across wallets, custody solutions, and crypto exchange mechanisms. Monitor on-chain activity for suspicious behaviour, including rug pulls and flash loan attacks. Partner … with external firms for protocol audits, bug bounty programmes, and penetration testing. Infrastructure & Application Security Implement best practices in cloud security (AWS, GCP, Azure), container security, and zero-trust networks. Harden DevSecOps pipelines to ensure secure software delivery. Collaborate with engineering teams to integrate security by design into products. Compliance & Risk Management Ensure regulatory compliance with GDPR, SOC2, ISO More ❯
approach, scope, dependencies, timelines, and risk management. Define detailed cutover plans covering technical, functional, and business activities. Ensure alignment with the key program milestones (PB1, PB2, SIT, FVT, PCT, PenetrationTesting, Regression, Dress Rehearsal, and Go-Live). The skills required in order to be successful in the position: Proven experience as a Cutover/Implementation Manager on … large-scale ERP/HCM programs, ideally Oracle HCM Cloud with Oracle EBS coexistence Strong understanding of HR and Payroll business processes, payroll parallel testing Hands-on experience overseeing data migration, integrations (OIC), and environment management in Oracle projects. Demonstrated ability to manage complex dependencies between Cloud and on-premise systems. Knowledge of release and environment management disciplines in More ❯
coding. Collaborating with architects and developers to review designs and code for vulnerabilities. Embedding/improving threat modelling and secure development practices into the SDLC. Designing and integrating security testing plans. Performing and overseeing application security testing and driving remediation. Managing end-to-end vulnerability workflows, including bug bounty findings. Supporting incident response activities when needed. Monitoring and … in an on-call rotation. What we’re looking for 3+ years in software engineering plus 2+ years in application security. Strong knowledge of OWASP, application vulnerabilities, and security testing techniques. Experience with secure web application development and Agile/DevOps methodologies. Familiarity with pen testing, bug bounty, or hacker community collaboration. Strong communication skills – able to influence More ❯
Cambridge, Cambridgeshire, East Anglia, United Kingdom
Morson Edge
coding. Collaborating with architects and developers to review designs and code for vulnerabilities. Embedding/improving threat modelling and secure development practices into the SDLC. Designing and integrating security testing plans. Performing and overseeing application security testing and driving remediation. Managing end-to-end vulnerability workflows, including bug bounty findings. Supporting incident response activities when needed. Monitoring and … in an on-call rotation. What we're looking for 3+ years in software engineering plus 2+ years in application security. Strong knowledge of OWASP, application vulnerabilities, and security testing techniques. Experience with secure web application development and Agile/DevOps methodologies. Familiarity with pen testing, bug bounty, or hacker community collaboration. Strong communication skills – able to influence More ❯
bristol, south west england, united kingdom Hybrid / WFH Options
Lloyds Banking Group
our lab's goals and priorities. What you'll do Be responsible for all aspects of delivery of new solutions and features, creating low detail designs, lead software development, testing and operational stability, balancing priorities and ensuring adherence to group standards. Be responsible for leading a talented group of engineers, guiding and working alongside them on entire software development … lifecycle and manage the delivery of robust, scalable data applications and features. Ensure applications and code alignment with security principles, secure coding practices, addressing code vulnerabilities and PEN testing resolutions. Work with your team to deliver functional and non-functional requirements ensuring these are being met during design, software development and testing. Be solving technical problems at pace, identify More ❯
Contract Pen Tester – SC Cleared 🚨 I'm on the search for a INF/APP or CSTM certified consultants to deliver ITHCs and penetration testing. 🔹 £700 p/d (Outside IR35) 🔹 6 months (with extension) 🔹 Manchester & Newcastle (mix of on-site + remote) 🔹 SC clearance required If you’re a seasoned tester with these certifications and strong AWS/ More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
provided across the programme to ensure that the new technology is secure by design Support the teams to interpret security requirements of the project Conduct threat modelling and pen testing to identify threats and establish controls Support wider teams with security advice and guidance in both a verbal and written format Lead delivery of hands-on security engineering solutions … Crest/CHECK Strong understanding of shift left Proven experience with of working with development teams on security related topics Either hands on secure software development or applications security testing Likely come from a pen testing, SRE, or Software Development Background We invite individuals from underrepresented groups to apply for any of our roles and are committed to More ❯
Penetration Tester | CHECK CTL or CTM | Outside IR35 | Short Term Engagement My client is an exciting and growing consultancy based in London that requires a Pen Tester for a short-term contract. This role has been deemed as outside IR35 and will be remote-first, with the occasional trip into London required. Key Skills: Strong Pen Testing background More ❯
Manchester, Lancashire, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
security solutions, with a team that lives and breathes security research and sassy exploitation techniques. If you're tired of mundane web audits, boring infrastructure reports, and repetitive pen-testing tasks, this is your opportunity to jump into something unique and thrilling. The Role: We are seeking a highly technical Cyber Security Pentester/Researcher with a 'hacker mindset … systems. This role is perfect for someone who is already deeply involved in the Bug Bounty scene or a seasoned 'old-school hacker' looking to break free from traditional penetration testing. What You'll Do: Identify and Exploit Vulnerabilities: Use your technical prowess to identify and exploit external, web-facing vulnerabilities. Understand how these vulnerabilities occur and how they More ❯
and reporting, with a focus on realism and impact Creating or modifying tools, exploits, and payloads as needed not relying solely on off-the-shelf frameworks Supporting threat-led testing programs and integrating threat intelligence into operations Maintaining strict operational security and professional discipline in all activities What were looking for: 34+ years of true red teaming experience (not … general pen testing) A deep skillset in one or more areas: evasions, custom malware, cloud red teaming, physical access, phishing infrastructure, or post-exploitation Strong scripting or development background (e.g., Python, Go, C#, or C) Experience with major red team frameworks (e.g., Sliver, Mythic, Cobalt Strike) and a willingness to go beyond them Familiarity with adversary emulation frameworks and More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and More ❯
HackerOne is a global leader in offensive security solutions. Our HackerOne Platform combines AI with the ingenuity of the largest community of security researchers to find and fix security, privacy, and AI vulnerabilities across the software development lifecycle. The platform More ❯
of Mobile platform security, threat modelling and mitigation techniques Capable of conducting regular reviews of our mobile application security posture using your hands-on experience. Develop and maintain pen-testing security tools, scripts, policies and procedures In depth knowledge of mobile app security standards (Android/iOS) Desirable knowledge & experience Familiarity with mobile development, DevSecOps tooling, testing and More ❯