days - Company Pension Scheme - Private medical Cover - Life Assurance - Extensive non-taxable benefits THE ROLE This is an exciting opportunity to join our Industry Penetrationtesting function, as a Senior Security Consultant (CHECK Team Leader) supporting the next phase of Cyberforts growth. Youll be joining a culture of … knowledge sharing and continuous learning with expert peers in Penetrationtesting and SecOps. We work across a number of sectors with a diverse client base. We aim to create an environment where everyone can reach their full potential. We work together, we are passionate, creative, and we embrace … difference. In this role youll work within our Pentesting and SecOps team, strengthening the consulting team and providing expert working knowledge in penetrationtesting and security consultancy. As a Senior Security Consultant (CHECK Team Leader), you will have in-depth technical knowledge and experience of penetration testing. more »
resilience. We deploy our people to implement solutions on behalf of clients or to support them in developing their own capabilities. Our CREST-Certified Penetration Testers, work with organisations of all sizes and types to detect and remediate vulnerabilities before malicious actors can gain access and compromise or steal … recommendations to safeguard their assets. What you’ll be doing: professional cyber security consultancy to internal and external stakeholders. the delivery of PGI’s penetrationtesting and overseeing Cyber Essentials Plus engagements. on the design and delivery of new as well as existing service lines associated with cyber … development or delivery of exercises – such as CTF challenges. cyber security exercises, trouble-shooting technical configuration, or guiding participants through scenarios. accurate scoping of penetrationtesting opportunities to sales colleagues for new and existing clients. sales colleagues with client pre-engagement activities including, proposals, presales activities such as more »
CTL - Senior Penetration Tester - £70k -£90k *REMOTE WORKING* *On-Site travel required irregularly* The Role A Forensic and Offensive Cyber-Security provider that supports Government Agencies, Commercial Organizations and Legal firms, and many other industry sectors both nationally and globally , require a CHECK accredited Penetration Tester to join … to train, develop and manage some of the leading offensive security SME's whilst working in a professional and trusted working environment. CTL - Senior Penetration Tester Responsibilities Oversee and conduct a range of penetrationtesting engagements including web applications, infrastructure, APIs, wireless networks, cloud platforms, and mobile … emulating real-world threats to provide a comprehensive overview of clients vulnerabilities Working on client site occasionally to deliver Internal Infrastructure, Wifi and Physical Testing engagements CTL - Senior Penetration Tester Requirements Proven experience leading penetrationtesting engagements within a CHECK environment Proficiency in conducting a wide more »
Graduate Penetration Tester (Red Team) Hybrid WFH to £60k Do you have an academic record of achievement combined with an interest in Cyber Security/PenetrationTesting? You could be progressing your career as a Penetration Tester at a rapidly expanding scale-up software house that … highly complex network cyber security platform, working on Greenfield projects, collaborating with, and learning from a hugely talented team. Your role: As a Graduate Penetration Tester you will manage client engagements, perform security tests and report findings; you'll be using an industry standard tools combined with in-house … reviews to discover any issues with customer infrastructure and web applications. You'll be pro-active and will have the opportunity within Red Team testing to try anything and everything to outmanoeuvre the defenders and gain access to customer networks. WFH Policy: There's a remote interview/onboarding more »
high calibre individual with a solid background in Security Engineering preferably with a degree in a security related field (ie. network engineering, computer science, penetrationtesting, digital forensics) and strong technical knowledge across various security pillars (network/cloud/infrastructure/email/endpoint). To be … Optimisation platforms also accepted). Data Classification and Labelling, Microsoft Purview. Bachelor's degree in a security related field is preferred (ie, Security Analysis, PenetrationTesting, Malware Analysis, Digital Forensics, Network Engineering, Computer Science). Strong technical knowledge across various Security Engineering pillars (Network Security, Cloud Security, Infrastructure more »
and driving the application security and privacy initiatives Perform threat modeling and architecture review on upcoming features and products Perform regular security assessments through penetrationtesting and code reviews of products Encourage and train developers in secure coding practices Develop security features in our product and scale security … re experienced in working with highly technical engineering teams You have performed threat modeling and architectural review for years You like bug hunting and penetrationtesting (bonus points if you share your Bugcrowd/HackerOne profiles) Experience in AWS is a plus Experienced contributing to the security community more »
OFFICIAL and above classifications. Provide specialist advice and knowledge of Public Cloud (Azure, AWS, GCP) cloud-based security architectures. Define and lead external security testing (e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. … Serverless architectures Implementing Information Security and Privacy Standards and Frameworks (e.g. ISO 27k, NIST800-53, CIS, GDPR) Leading security working groups and external security testing (ITHC, PenetrationTesting, etc) of cloud solutions at high HMG classification levels (OFFICIAL required, SECRET desirable) or equivalent in other industries Designing … utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is more »
risk, and data privacy issues. The analyst serves as an expert on cybersecurity protection, detection, response, and recovery. This individual is responsible for coordinating penetrationtesting and managing internal and external cybersecurity analysts to detect, mitigate, and analyze threats. Works closely with other teams to develop controls such … security technologies by developing selection criteria to identify appropriate security solutions to support strategic, operational needs, and security requirements. Participate in the development and testing of the security incident response plan, act as the incident response leader. Develop security, risk, and compliance reports and alerts. Participate in the yearly … review of policies and procedures to support information security, risk, and security compliance activities. Participates in developing, testing, and implementation of disaster recovery procedures for the cybersecurity technology in place. Manages cybersecurity projects to ensure that the delivery is on-time, within budget, and adopted to meet the company more »
Greater London, England, United Kingdom Hybrid / WFH Options
Luware
ensure technical compliance with relevant regulations and standards Identify and assess security risks and vulnerabilities to the company’s products Plan, scope and review penetrationtesting reports, new software patch releases and vulnerability scan reports, to develop remediation plans with our operational support teams to mitigate issues based more »
solutions '€¢Experience of threat intelligence '€¢Leadership and mentoring experience and skills '€¢Understanding of low-level concepts including operating systems and networking '€¢Commercial experience in PenetrationTesting and/or Security Monitoring '€¢Understanding of networking and infrastructure design '€¢Knowledge/experience of one or more System administration (Linux, Windows more »
solutions Experience of threat intelligence Leadership and mentoring experience and skills Understanding of low-level concepts including operating systems and networking Commercial experience in PenetrationTesting and/or Security Monitoring Understanding of networking and infrastructure design Knowledge/experience of one or more System administration (Linux, Windows more »
proactive, confident, credible, and persuasive team player. Collaborate and support developers, analysts, and data scientists to continually improve and innovate. Conduct SAST and DAST testing as well as penetrationtesting and threat simulations to identify potential risks. Have a practical understanding of firewall networking, ingress, VPNs, and more »
role in ensuring the successful delivery of a high-quality system. Responsibilities: Manage the test plan and strategy for the Salesforce implementation project. Orchestrate testing throughout the project lifecycle, collaborating with business users, system integrators, and technical teams. Oversee the planning, design, and execution of comprehensive test suites to … guarantee a defect-free system. Manage all aspects of end-to-end testing, including planning, risks, issues, and stakeholder communication. Develop and maintain high-quality test scripts for various testing methodologies. Champion the use of testing tools and best practices. Prepare and guide business users through testing activities. Identify and escalate functionality or quality issues, recommending improvement solutions. Manage penetrationtesting with third-party vendors. Effectively communicate test results to program managers, product owners, and stakeholders. Qualifications: Track record in testing Salesforce CRM implementations (experience with Oracle CX to Salesforce migrations is a more »
deliver that? You'll enjoy a varied and challenging workload that includes… Regularly performing web application, infrastructure, IoT, cloud, API, wireless and mobile application penetration tests Performing Red Team and social engineering testing as required Report writing and client presentation of test findings Produce supporting marketing materials: topical … tips Client consulting on required remedial actions Assisting with the development of junior members of the team Contribute to the evolution of the security penetrationtesting methodology and processes You'll need: Ability to perform black box, grey box and white box tests dependent on client needs Ability … technical detail into language board-level executives can understand. Ability to write deliverables to a high standard Experience with Attack & Threat Modelling Red Team testing and social engineering attack methodologies Extensive knowledge of the OWASP Testing Methodology Knowledge of networking protocols and the OSI Model Working knowledge of more »
maintaining, and configuring various security technologies within a large and complex environment (anti-malware/EDR, SIEM solutions, vulnerability scanners, patch management, CASB, DLP, penetrationtesting tools, etc.). Knowledge of TCP/IP and related network protocols, including standard protocols like TCP, ARP, ICMP, DHCP, DNS, HTTP more »
City of London, London, United Kingdom Hybrid / WFH Options
CyberSec Talent Ltd
opportunity to a thriving financial services organisation, with global coverage who embraces technology, delivers quality service and innovative solutions for their clients. As a Penetration Tester, you will oversee client engagements, conduct security assessments, and present comprehensive reports to leadership. Youll utilise a blend of tools, resources and have … Location They offer hybrid working that encourages the positives of team collaboration at their London office 2 days per week. Key Responsibilities Conduct thorough penetration tests on computer systems, networks, and web-based applications to identify vulnerabilities. Develop and simulate real-life cyber-attacks to test the resilience of … security systems. Prepare detailed reports documenting the results of penetration tests, including descriptions of the tests performed, the findings, and recommendations for security enhancements. Work closely with the cybersecurity team to validate and remediate vulnerabilities. Stay updated on the latest industry security standards and compliance requirements. Collaborate with IT more »
years experience across different technical disciplines within the Cybersecurity landscape. Experience using vulnerability scanning tools such as Nessus, Qualys, Rapid7, Wiz, OpenVAS, and penetrationtesting frameworks like Metasploit. Knowledge of security and risk frameworks, plus regulatory compliance frameworks e.g. NIST, Cobit, ISO 27001. Understanding of OWASP, MITRE, CVSS more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, PenetrationTesting,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards relevant to the SaaS industry, such as more »
Central London, London, United Kingdom Hybrid / WFH Options
Hireful
the role entails, but some key points to be considered: - Demonstrable experience of managing security solutions (secure Code Scanning, SIEM, IPS, IDS, Vulnerability Scanning, PenetrationTesting,) directly, or through an MSSP, in a cloud-based environment. - Knowledge of security compliance standards relevant to the SaaS industry, such as more »
knowledge of current Security standards – NIST, ISO 27001, GDPR, CyberEssentials Solid knowledge of IT Security Operations – tools, processes and policies – patching, vulnerability scanning, pen testing Comfortable working in all forms of Cloud environments Extensive stakeholder management skills and outstanding communication skills – verbal and written more »
provisioning to retirement. Implement and manage Mobile Device Management (MDM) solutions for company devices, integrating security tools to ensure data protection. Review Vulnerability and Penetration Test Results: Analyse vulnerability and penetration test results to identify potential security weaknesses, in either cloud infrastructure, applications or 3rd party SaaS. Provide … Disaster Recovery: Develop and maintain a comprehensive disaster recovery plan for critical internal services, incorporating security tooling for threat detection and response. Conduct regular testing and updates of the DR plan, ensuring security measures are aligned with business continuity goals. The skills required Proven experience in Azure infrastructure management … cost control, cloud networking, security tooling, IDM, and staff/contractor onboarding/offboarding. Strong knowledge of scripting languages. Proficiency in vulnerability and penetrationtesting, as well as remediation strategies. Additional Information Competitive salary Excellent additional benefits including pension, great holiday entitlement, private medical and dental insurance. Flexible more »
West End, London, United Kingdom Hybrid / WFH Options
Eligo Recruitment Ltd
risk assessments, and ensure compliance (ISO27001, SOC2, Cyber Essentials+), and formulate IT policies. IT Security: Manage malware, AV, password security, MFA, SSO, vulnerability scanning, penetrationtesting, and encryption. Device Management: Handle Mobile Device Management (MDM) using Kandji, Apple Device Enrolment Program (DEP), and asset management. Business Continuity : Design more »
and principles to effectively govern delivery. Information Security and Business Continuity Demonstrate in-depth knowledge of information security and business continuity, including analysing + testing Trust-wide capabilities and identifying improvement areas. Ensure that our security posture is maintained, monitored/measured and be responsible for leading interventions where … public during the event, and ensuring we can manage the recovery process and incorporating learning. Lead, plan and execute all required vulnerability audits, security & penetration tests, forensic audits, or related investigations ensuring all findings are evaluated, and where appropriate, fed into continuous service improvement activities to continuously improve our … security posture and resilience. Responsible for supporting the design, development, testing and transition of any new information security services into operations. Provide subject matter expert leadership in major incidents and events caused by or affecting information security. Act as the Problem Owner for information security and business continuity matters more »
commissioning new services. Ensure operating procedures are provided to the Infrastructure Operations function in a comprehensive and timely manner. Oversee the configuration, installation and testing of network hardware, and software; includes but not limited to routers, switches, firewalls and SD-WAN. Where necessary, support Infrastructure Operations in monitoring, collecting … business. Recommend, cost-justify and lead execution of modifications to the existing infrastructure design to improve efficiency, reliability, and performance. Participates in disaster recovery testing and rehearsals. Who You Are: Minimum 10 years of experience in infrastructure support, delivery and design. The Infrastructure Solution Architecture Manager must be a … that enable applications and data). experience to include building an enterprise architecture. Planning and supporting processes and adhering to best practices. Knowledge of penetrationtesting methodologies. Knowledge of Intrusion detection/prevention systems (IDS/IPS/WAF) and vulnerability assessment tools. Extensive switching, routing and firewall more »
to plan and deliver targeted remediation activities after cyber security incidents; Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetrationtesting and vulnerability scanning; Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams; Acting … Understanding organisations’ vulnerability to specific cyber security threats; Delivering remediation projects for clients who have had cyber security incidents, and assisting plan cyber transformations; Testing and improving cyber incident response plans, runbooks and processes; Contribute to capability development, proposition development and thought leadership initiatives; Provide mentoring and oversight to more »