Newcastle-under-Lyme, Newcastle, Staffordshire, England, United Kingdom Hybrid / WFH Options
Kingsgate Recruitment Ltd
concepts Strong analytical and problem-solving skills Good communication skills and the ability to explain technical concepts clearly Nice to Have (But Not Required): Personal or academic experience with penetrationtesting, malware analysis, or security tools Knowledge of scripting (e.g. Python, Bash, PowerShell) Internship, placement, or lab-based university project in security Familiarity with security frameworks or certifications … real users and systems Mentoring : One-on-one support to help you grow professionally and personally Career Pathways : Clear progression into specialised roles such as SOC Analyst, Security Engineer, Penetration Tester, or Risk Analyst Collaborative Culture : Join a team that values innovation, integrity, and inclusion Excellent Company Benefits We believe in supporting our people from day one. Here’s More ❯
Crewe, Cheshire, United Kingdom Hybrid / WFH Options
Matchtech
from our Crewe campus . In this role, you will report to the Functional Manager - Product Security Test & Incident Management and will be responsible for preparing and executing cybersecurity testing for automotive products in compliance with UNECE R . 155 and China GB 44495 regulations. This role plays a critical part in ensuring our vehicle systems are secure and … meet regulatory requirements across global markets. Responsibilities include: Manage and maintain test properties to ensure readiness for cybersecurity testing, including flashing, coding, debugging, analysis, and issue resolution on both test benches and vehicles. Develop cybersecurity test cases aligned with regulatory requirements (e.g., UNECE R155, GB 44495). Execute cybersecurity test cases and generate comprehensive test reports. Support cybersecurity homologation … and compliance testing activities for global regions. Coordinate and plan various levels of product security testing throughout the development lifecycle. About the Person The successful candidate will be a delivery-focused and results-driven cybersecurity test engineer , ideally with hands-on experience in product security testing within the automotive industry . They should possess strong technical skills More ❯
We are seeking an enthusiastic security consultant to join our team. Working alongside some of the best hacking minds in the country, you will be delivering pen testing services to a diverse range of clients, from presales through to delivery and debriefs. We are looking for a consultant with a minimum of two years experience in pen testing who can deliver the following: Web application testing API testing External & Internal Infrastructure testing (including build reviews) Mobile application testing (including knowledge of standards such as OWASP MASVS) Experience testing in any of the following areas is also desirable: Compiled application testing Cloud security reviews (including AWS & Azure) Kubernetes reviews Knowledge and development More ❯
We are seeking an enthusiastic security consultant to join our team. Working alongside some of the best hacking minds in the country, you will be delivering pen testing services to a diverse range of clients, from presales through to delivery and debriefs. We are looking for a consultant with a minimum of two years experience in pen testing who can deliver the following: Web application testing API testing External & Internal Infrastructure testing (including build reviews) Mobile application testing (including knowledge of standards such as OWASP MASVS) Experience testing in any of the following areas is also desirable: Compiled application testing Cloud security reviews (including AWS & Azure) Kubernetes reviews Knowledge and development More ❯
Pittsburgh, Pennsylvania, United States Hybrid / WFH Options
Reed Smith LLP
industry requirements, and regulatory expectations. Provide technical support and administration for LAN/WAN, remote access, IDS/IPS, and unified threat management systems, including troubleshooting, analysis, and the testing and deployment of new hardware and security applications. Deploy and manage policies for antivirus and endpoint detection and response agents in collaboration with system owners to ensure effective endpoint … the development and implementation of security policies and procedures, security awareness programs, and participation in IT audits preferred. Hands-on experience with operating system security, encryption technologies, forensic analysis, penetrationtesting, and vulnerability/risk assessment. Prior experience in the legal profession or professional services environment preferred but not required. Skills: Ability to design and implement secure infrastructure More ❯
welwyn garden city, east anglia, united kingdom Hybrid / WFH Options
PayPoint
from containment to recovery. You'll document incidents thoroughly, follow established playbooks, and help improve them over time. Automation will be key to streamlining investigations and enriching threat intelligence. Testing and Validation You'll take part in cyber crisis simulations, penetrationtesting, and table-top exercises to ensure our defences are robust and response plans are effective. More ❯
Azure, AWS, GCP, and containerized environments (Kubernetes, Docker) Architect, design, and implement secure cloud solutions, including network, infrastructure, IAM, firewalls, NSG, ASG, WAF, and cloud-native security tools Conduct penetration tests, forensic investigations, vulnerability assessments, SAST, DAST, and SCA Integrate security into Secure Software Development Lifecycle (SSDLC) and CI/CD pipelines Act as the primary security expert for … Stay ahead of latest cloud security threats, vulnerabilities, and emerging technologies What Youll Bring 7+ years in information security, including cloud security (Azure, AWS, GCP), advanced networking (Layer 47 ), penetrationtesting, and application security Microsoft Azure expertise with hands-on experience in NSG, ASG, and WAF configuration Scripting skills (Python, PowerShell, Bash or simmilar) for automation, troubleshooting, and More ❯
Azure, AWS, GCP, and containerized environments (Kubernetes, Docker) Architect, design, and implement secure cloud solutions, including network, infrastructure, IAM, firewalls, NSG, ASG, WAF, and cloud-native security tools Conduct penetration tests, forensic investigations, vulnerability assessments, SAST, DAST, and SCA Integrate security into Secure Software Development Lifecycle (SSDLC) and CI/CD pipelines Act as the primary security expert for … of latest cloud security threats, vulnerabilities, and emerging technologies What You’ll Bring 7+ years in information security, including cloud security (Azure, AWS, GCP), advanced networking (Layer 4–7 ), penetrationtesting, and application security Microsoft Azure expertise with hands-on experience in NSG, ASG, and WAF configuration Scripting skills (Python, PowerShell, Bash or simmilar) for automation, troubleshooting, and More ❯
IT, Networking, or Cybersecurity (or equivalent experience) Certifications such as Cisco CCNA/CCNP , Fortinet NSE , or CompTIA Security+ (advantageous) Demonstrable experience delivering Cyber services in: Threat & Vulnerability Management PenetrationTesting/Offensive Security SOC/MDR operations Third-Party Risk or Compliance (ISO, NIST, GDPR) Additional Information Must have the right to live and work in the More ❯
IT, Networking, or Cybersecurity (or equivalent experience) Certifications such as Cisco CCNA/CCNP , Fortinet NSE , or CompTIA Security+ (advantageous) Demonstrable experience delivering Cyber services in: Threat & Vulnerability Management PenetrationTesting/Offensive Security SOC/MDR operations Third-Party Risk or Compliance (ISO, NIST, GDPR) Additional Information Must have the right to live and work in the More ❯
Birmingham, West Midlands, West Midlands (County), United Kingdom Hybrid / WFH Options
TXP
Identify and remediate vulnerabilities using industry-standard tools Administer and configure security technologies (e.g., firewalls, SIEM, IDS/IPS, endpoint protection) Oversee access controls and identity management systems Conduct penetrationtesting and routine vulnerability scans Monitor networks and systems for threats; lead incident response efforts Perform root cause analysis and maintain incident response protocols Recommend enhancements to improve More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
best practices. Strong analytical and prioritization skills with a pragmatic, risk-based approach to decision-making. Leadership experience Nice to have: If you have come from a development/penetrationtesting background this would be advantageous for my client. Pen testing experience Certifications (CEH)/OSCP This role is on a hybrid basis with 2 - 3 days More ❯
response for security risks and issues raised by SOC teams Manage implementation of logging and SIEM integration for comprehensive monitoring Prioritise and oversee vulnerability remediation across the platform Support penetrationtesting activities and security audits Collaboration & Leadership: Build strong relationships with central security teams and contribute to communities of practice Manage escalations of security-related issues, risks, and More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
Company Description BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. We provide enterprises with evidence-based risk across their entire attack surface to determine how they will respond to an attack. Our services include Attack Surface Management, PenetrationTesting, and Red Teaming. We're Hiring: Red Team Specialist UK (Remote) | BreachLock Inc. … defenses, and helping Fortune 500 clients improve their cyber resilience. What Youll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud infrastructure and specialised targets (IoT/OT) when required. More ❯
Company Description BreachLock is a global leader in Continuous Attack Surface Discovery and Penetration Testing. We provide enterprises with evidence-based risk across their entire attack surface to determine how they will respond to an attack. Our services include Attack Surface Management, PenetrationTesting, and Red Teaming. 🚨 We're Hiring: Red Team Specialist – UK (Remote) | BreachLock Inc. … and helping Fortune 500 clients improve their cyber resilience. 🔧 What You’ll Do: Plan and execute full-scope red team engagements (TIBER-style, MITRE ATT&CK aligned) Perform focused penetration tests on web applications, mobile apps (iOS/Android), APIs, and backend services , as well as traditional network/cloud infrastructure and specialised targets (IoT/OT) when required. More ❯
Internal Penetration Tester - Hybrid in London - Inside IR35 - 6 months We are seeking an experienced Internal Pentester to join an international client secure their networks. This critical role, based in London (2-3 days per week), requires deep expertise in conducting manual and automated security assessments across networks, applications, cloud platforms, and infrastructure. You will identify and exploit vulnerabilities … play a key role in enhancing collaboration with development, cloud, and infrastructure teams, while ensuring robust security outcomes in sensitive and compliance-driven environments. Key Responsibilities: Plan and execute penetration tests - perform manual and automated testing across applications, APIs, internal/external networks, cloud environments, and Active Directory. Identify, exploit, and validate vulnerabilities - uncover security flaws such as … steps What You Will Ideally Bring: Application security knowledge - strong grasp of OWASP Top 10 and API security issues.Contract Details: Hands-on pentesting experience - 3-7+ years in penetrationtesting, red teaming, or offensive security across networks, cloud, AD, and web apps. Offensive security tooling - expertise with Nmap, Nessus, Masscan, Burp Suite, Metasploit, Cobalt Strike, Mimikatz, SQLmap More ❯
and implementation of the Colt Vulnerability Management Framework. Enhancing the scope and efficiency of current vulnerability scanning and management tools and integration between them. Design and manage the periodic penetrationtesting exercise. Collaborating with identified stakeholders to provide specialist guidance and support, ensuring effective vulnerability identification, prioritisation and remediation activity definition. Perform Vulnerability scans using Vulnerability Management tool More ❯
Cheshire, England, United Kingdom Hybrid / WFH Options
Morgan Law
of security incidents and policy violations Assist with risk assessments and security audits Implement and maintain security standards, and guidelines Work with third-party vendors and partners on pen testing and remediation activities Support awareness campaigns to improve cybersecurity hygiene among staff Assist in the development and implementation of disaster recovery and business continuity plans. Produce reports and metrics More ❯
Basingstoke, Hampshire, South East, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Bromsgrove, Worcestershire, United Kingdom Hybrid / WFH Options
First Choice Recruitment Services
in a similar role. Degree Educated would be an advantage A strong understanding of firewalls, intrusion detection systems and other security technologies is essential. Familiar with ethical hacking and penetrationtesting an advantage. The ability to analyse complex data and identify potential security threats is essential Excellent communication skills required to communicate with both technical and nontechnical stakeholders More ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
functional engineering Team environment. • Employ a high level of productivity and responsiveness, especially for time-critical requirements, with a team-oriented approach to interface with team members. • Support exploitation testing to improve integrity and security of weapon system environments. • Support testing and related activities across a wide variety of platforms and technologies using advanced techniques and methodologies, such … of Cybersecurity requirements Must possess (or be able to obtain within six months of employment start date) a DoD 8570.01-M certification (Security+, CISSP) Desired Skills: • Designing, development, documents, testing, and maintaining full spectrum cyber solutions • Developing and automating secure systems to support cyber offensive, defense and full spectrum cyber operations • Conducting vulnerability research, reverse engineering, penetrationtestingMore ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
functional engineering Team environment. • Employ a high level of productivity and responsiveness, especially for time-critical requirements, with a team-oriented approach to interface with team members. • Support exploitation testing to improve integrity and security of weapon system environments. • Support testing and related activities across a wide variety of platforms and technologies using advanced techniques and methodologies, such … of Cybersecurity requirements Must possess (or be able to obtain within six months of employment start date) a DoD 8570.01-M certification (Security+, CISSP) Desired Skills: • Designing, development, documents, testing, and maintaining full spectrum cyber solutions • Developing and automating secure systems to support cyber offensive, defense and full spectrum cyber operations • Conducting vulnerability research, reverse engineering, penetrationtestingMore ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
functional engineering Team environment. • Employ a high level of productivity and responsiveness, especially for time-critical requirements, with a team-oriented approach to interface with team members. • Support exploitation testing to improve integrity and security of weapon system environments. • Support testing and related activities across a wide variety of platforms and technologies using advanced techniques and methodologies, such … of Cybersecurity requirements Must possess (or be able to obtain within six months of employment start date) a DoD 8570.01-M certification (Security+, CISSP) Desired Skills: • Designing, development, documents, testing, and maintaining full spectrum cyber solutions • Developing and automating secure systems to support cyber offensive, defense and full spectrum cyber operations • Conducting vulnerability research, reverse engineering, penetrationtestingMore ❯
City of London, London, United Kingdom Hybrid / WFH Options
Sanderson Recruitment
AWS security controls, policies, and automation - Role-based and attribute-based access controls - Cryptographic protocols and secure key lifecycle management - Securing microservices, APIs, and DevSecOps best practices Skilled in penetrationtesting and hands-on coding with JavaScript, Java, or Python Strong understanding of vulnerability scanning, remediation, and vendor management Collaborative mindset with the ability to partner across engineering More ❯