Leeds, West Yorkshire, United Kingdom Hybrid / WFH Options
Confidential
structures. Self-starter and capable of independent working Team player and adept at working in multi-disciplinary and diverse teams Desirable Software engineering experience Penetrationtesting skills Life at BAE Systems Digital Intelligence We are embracing Hybrid Working. This means you and your colleagues may be working in more »
across the Network infrastructure Reviewing network configurations and device hardening Ensuring compliance with industry best practice Development and maintenance of vulnerability management programs (Pen-testing, risk assessment, remediation planning) Designing and implementing network segmentation strategies to enhance network security and isolate sensitive data Conducting and organising security assessments including … vulnerability scanning and penetrationtesting Providing expert guidance on security related alerts and incidents Key Experience: experience in network security engineering (Cisco & Fortinet experience desired) with access control, VLANS and network segmentation techniques with pen-testing frameworks, security assessments and scanning tools to configure detection/prevention more »
Develop and Test Group Disaster Recovery Plans Maintain Information Security policies, making sure data centres and users adhere. Manage cyber security tools and regular penetration testing. Assist in the delivery of CyberEssentials+ (or similar as deemed appropriate) for group companies Verify application, data, and network security to assure confidentiality … systems, backup systems, ensuring continued system functions and maintaining data integrity and retrieval. Analyse network security events by participating in and supporting audit processes, penetrationtesting, and reviewing log reports from network systems and other systems for actionable items and remediation. Monitor and reports on the performance of more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Head Resourcing
and using purple team engagements to tune and validate detection tooling. Working collaboratively with IT teams to remediate vulnerabilities identified through red team engagements, penetrationtesting, and vulnerability scanning. Planning and coordination of large-scale security incident response, remediation and recovery efforts involving multiple parties and teams. Manage more »
detection and insider threat detection, malware analysis, reverse engineering, threat intelligence, decoys and deception, application of AI/ML techniques, orchestration and automation, and penetrationtesting across a variety of environments. The successful candidate will be expected to have a customer centric mind-set, but take an active more »
Nottingham, Nottinghamshire, East Midlands, United Kingdom Hybrid / WFH Options
NQB International
they boast a team of highly skilled professionals, including Ph.D. qualified researchers, Crest Registered Testers, and BSI 27001 lead auditors. With expertise in system penetration, network intrusion, incident response, user awareness, and information governance, they are at the forefront of developing and delivering cutting-edge solutions, strategies, and services more »
Cardiff, Wales, United Kingdom Hybrid / WFH Options
Persistent Systems
7. Hands-on experience on Kali Linux and NMAP. 8. Able to perform application scans using Burp enterprise, Veracode etc. 9. Perform Application pen testing for OWASP top 10 issues. 10. Web application firewall Administration and management 11. Able to work on Azure Devops Pipeline. Benefits: Focused on talent more »
London, England, United Kingdom Hybrid / WFH Options
Starling Bank
lead a growing vulnerability management team. A successful candidate will work with the team to analyse emerging vulnerabilities provided by threat intelligence sources and penetration testing. The vulnerability manager will collaborate with various technology and engineering teams to share vulnerability findings, provide guidance, and assist through the remediation process. more »
solid understanding and fascination with fundamental concepts in operating systems and networking. Displays a keen interest in security principles and protocols. Demonstrates experience in penetrationtesting and/or security surveillance. Exhibits eagerness to absorb new knowledge and technologies. Has practical experience with diverse operating systems and network more »
Glasgow, Scotland, United Kingdom Hybrid / WFH Options
Gen+
Skills Tracker) Configure and monitor school sync systems (Includes Glow/RM and Xporter sync systems) Maintain/Develop the platform staging site for testing, demos, etc. Bug Management – Collate information, document, test and raise bugs with the development partner using Jira Maintain progress Reports for the education team … issues to supplier when required Monitor and act upon the platform vulnerability system Monitor and verify platform backups Manage and act upon the annual penetrationtesting exercise Maintain Cyber Essentials accreditation for organisation Maintain and update the key security policies Supplier and Contract Management Manage technology partner to more »
Cardiff, South Glamorgan, Wales, United Kingdom Hybrid / WFH Options
Hays
technical risks. - Recommend and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetrationtesting and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring more »
Employment Type: Contract, Work From Home
Rate: £500.0 - £550.0 per day + £500-£550 Per Day Inside IR35
technical risks. - Recommend and implement risk treatment plans. - Support Project Manager and Cyber Risk Consultant in delivery of project activities. - Scope, Arrange and Support penetrationtesting and vulnerability testing. - Support development of Supply Chain Security Policy and Processes. SKILLS - Extensive security risk management knowledge. - Experience with SIEM Monitoring more »
Employment Type: Contract
Rate: £500 - £550/day £500-£550 Per Day Inside IR35
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Set2Recruit
Offer security advice based on best practices to IT or Systems Owners. - Evaluate and assess risks of new suppliers, software, systems, or technologies. - Perform penetrationtesting and analyze IT requirements for best practice security. - Identify and mitigate network vulnerabilities and monitor for security breaches. - Stay updated on security more »
implementation in GCP In-depth understanding of GCP services, security controls, and best practices. Proficiency in using GCP-specific security tools, vulnerability scanners, and penetrationtesting tools. Strong experience with infrastructure-as-code (IaC) using Terraform for GCP resource provisioning and management. Familiarity with CI/CD pipelines more »
security vulnerabilities across our client and their vendors and suppliers. Work with various teams across our clients Cyber Security function on efforts ranging from penetrationtesting, incident response, governance, risk, and compliance, and more. To be considered for this role, you should have: Must have prior experience in more »
Mitre Attack Framework). * Knowledge of a broad range of security capabilities, technologies and concepts (e.g. cryptography, data security, network security, endpoint security, security penetrationtesting, identity and access management, vulnerability management etc). Desirable skills/Preferred Qualifications: * Understanding of the interplay between cyber security risk factors more »
Being a proficient communicator that allows you to share your knowledge and collaborate with the development team. Preferred qualifications, capabilities and skills Knowledge of penetrationtesting techniques Knowledge of tools used in the security industry (e.g. Burp, OWASP ZAP) Python, Ruby, Go or a similar language that can more »
user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusion detection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company's services and there is an opportunity in more »
as a Threat and Vulnerability Engineer in a high performing environment or team and possess In-depth knowledge of threat landscape, vulnerability assessment, and penetrationtesting techniques. You will need to be skilled in python in order to function in the team and holding relevant certifications such as more »
GL20, Mitton, Gloucestershire, United Kingdom Hybrid / WFH Options
Four Squared Recruitment Ltd
a Technical Pre-Sales Consultant, you'll play a crucial role in supporting pre-sales activities across the core services, focusing on technical assurance, penetrationtesting, and incident response. Your duties will include responding to inbound sales enquiries, managing leads and opportunities in the CRM, arranging technical scoping more »
lead on security events and incidents reported or highlighted through internal processes and controls. Organise and support internal and external audits, vulnerability management processes, penetrationtesting and business continuity/disaster recovery planning. Contribute towards the annual budget and forecasting process for Infosec related items. Working across the more »
on prevailing (sometimes conflicting) evidence. Support and manage budget Responsibility Responsibility of information security incident management Responsibility for security assessments and assurance activities (e.g. penetrationtesting) and when to use them. Oversee and management of security compliance management and reporting in relation to any relevant regulatory or legal more »
throughout the SDLC Vulnerabilities - social, hardware, software, networking, including the related technology Vulnerability scanning of operating systems, applications, and networks. Web Application Security Pen Testing Approaches and Techniques, including Red vs Blue team activities. Monitoring, Detection, and recovery Requirements: Available to applicants aged 19 + No prior experience is more »