will also review and improve Qualys configuration, policy, and deployment. KNOWLEDGE/EXPERIENCE Owned/Ran vulnerability management processes previously, end-to-end Conducted ethicalhacking/pentest activities Led Red Team/Purple Team exercises across Networks, Linux, and Windows Deep understanding of attacker tools, techniques, and more »
stakeholders effectively from cybersecurity analysts to threat intelligence experts A track record of successful delivery in penetration tests and red team exercises as an ethical hacker A high level of integrity, result-oriented approach, and composure under pressure Strong communication, influencing, and collaboration skills? Knowledge of detection rule development more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
AppCheck Ltd
training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in their web applications and hosted infrastructure and more »
Leeds, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
AppCheck Ltd
training plan that we will tailor around you. About AppCheck: AppCheck is a B2B cyber security software platform (vulnerability scanning) developed by industry leading ethical hackers and web application security experts. Our technology gives companies the ability scan for security vulnerabilities in their web applications and hosted infrastructure and more »
take action without being tasked, while keeping the team and leadership aware of the status of any projects taken on. Certifications involving incident response, ethicalhacking, digital forensics, or cyber security (GIAC, CISSP, SSCP, CISM, EC-Council, Offensive Security, etc.) highly desireable Discover the Unexpected Experian is the more »
Experience with network and application firewalls, intrusion prevention, anti-virus, and security tooling. Familiarity with Microsoft 365/Azure. Desirable: SSCP or CISSP CISM EthicalHacking/Purple Teaming more »
could lead to a compromise of the integrity and availability leading to customer harm. Experience and skills Required: Security scanning and testing, including Qualys, EthicalHacking, SAST & DAST Vulnerability management (CVSS) Hands on experience of modern security architecture along with diagnostic and monitoring tooling. Proficient in Cryptographic key more »
Proven ability to effectively collaborate Preferred Qualifications Certified Information Systems Security Professionals (CISSP ); Certified Information Systems Auditor (CISA ); Certified Information Security Manager (CISM ); Certified Ethical Hacker (CEH); GIAC certifications or equivalent security certifications Industry Thought Leadership Excellent written, oral, presentation skills, innovative thinker A proven record of success working more »
and free tools experience (Kali Linux suite, Metasploit, nmap, airsnort, Wireshark, Burp Suite, Paros, etc.) One or more of the following testing certifications: Certified Ethical Hacker (CEH); GIAC Certified Penetration Tester (GPEN); Offensive Security Certified Professional (OSCP); or equivalent development or testing certification (ECSA, CEPT, CPTE, CPTS, etc) In more »
engagements Support networking and business development activities Collaborate with RSM consulting professionals across risk and technology consulting with a variety of credentials including Certified Ethical Hacker (CEH), Certified Information Systems Security Professionals (CISSP ); Certified Information Systems Auditor (CISA ) and Certified Information Security Manager (CISM ) Basic Qualifications: Minimum B.A. or more »
nationality, ethnic or national origin, religion or belief, disability or age. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
job postings, our employees, or any other part of our company. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
disability needs. Visit ourFAQs for more information about requesting an accommodation. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
result in summary dismissal if the discrepancy comes to light subsequently. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
of your employment with Microsoft and the country where you work. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
benefits (note, length of service and eligibility criteria may apply). Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
experience of design and configuration of security tool chains as part of a DevSecOps approach Relevant industry recognized Technical Qualifications (e.g. CISSP, CISM, Certified Ethical Hacker, Microsoft Cybersecurity Architect Expert, AWS Certified Security - Specialty) Experience of working in secure customer environments Experience of secure development using either Java or more »
highlight this to us and we will be happy to accommodate. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
skills for the right role and our obligations under the law. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
trust and hybrid is not a one-size-fits-all solution. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
trust and hybrid is not a one-size-fits-all solution. Explore more InfoSec/Cybersecurity career opportunities Find even more open roles in EthicalHacking, Pen Testing, Security Engineering, Threat Research, Vulnerability Management, Cryptography, Digital Forensics and Cyber Security in general - ordered by popularity of job title more »
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice more »
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice more »
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice more »
certification(s) such as Certified in Risk and Information Systems Control (CRISC), Certified Information Security Manager (CISM), Certified Information Systems Security Professional (CISSP), Certified Ethical Hacker (CEH). Must possess the ability to follow and/or create/modify operational and technical procedures and/or best practice more »