City of London, Greater London, UK Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
City of London, Greater London, UK Hybrid / WFH Options
The Curve Group
Cyber Vulnerability Management Analyst Fixed Term Contract (Maternity Cover) 18 months Must have experience working on Tenable.IO, analysed vulnerabilities form penetrationtesting reports, work with vendors to remediate vulnerabilities, has patch management experience, has patched/worked on windows, Linux and Azure cloud systems, analyse and remediate SOC/NOC alerts. Our Client is a globally recognised, successful … in line with our long-term goals. The role of Cyber Vulnerability Management Analyst is to deal with all remediation work in relation to identified vulnerabilities inclusive of patch testing and implementation within SLA. The job holder will work very closely with all third-party vendors involved in the remediation process. The job holder will also prepare the necessary More ❯
financial services or large-scale enterprises, with an understanding of regulatory requirements in IT and cybersecurity. Security certifications such as CISSP, CISM, CCSK, or similar. Familiarity with vulnerability management, penetrationtesting, and reviewing IT and security clauses in contracts. Knowledge of control frameworks and audit methodologies within second line risk functions. Strong communication and influencing skills, capable of More ❯
experience with cloud platforms (AWS, Azure, or GCP) - cloud security knowledge preferred. Familiarity with virtualization technologies and associated security controls. Demonstrated experience in at least one of the following: PenetrationTesting : Offensive security and exploitation techniques. Digital Forensics : Host, network, or memory-based investigation. Threat Hunting : Detection engineering and hypothesis-driven threat investigation. Knowledge of modern security tooling More ❯
Colorado Springs, Colorado, United States Hybrid / WFH Options
OSAAVA Services
Description: We are seeking Cybersecurity Software Evaluators to assess and analyze the security of software applications used in high-security government environments. This role involves conducting cyber evaluations, security testing, and risk assessments on software applications to ensure compliance with Department of Defense (DoD) cybersecurity standards. This position is initially for a few months with the potential for long … Test applications for compliance with DoD cybersecurity frameworks, including NIST 800-53, RMF, and STIGs. • Work closely with developers, security engineers, and system administrators to implement security recommendations. • Perform penetrationtesting and vulnerability assessments on government software systems. • Document findings, create security reports, and provide actionable recommendations for remediation. • Assist with the development of secure coding practices and … with the ability to maintain it in valid status. • Bachelor's degree in Cybersecurity, Computer Science, or related field (or equivalent experience). • 5+ years of experience in cybersecurity, penetrationtesting, or software security evaluation. • Certifications such as CISSP, CEH, OSCP, or GIAC GWEB are highly preferred. • Experience with secure coding practices and software vulnerability assessment tools (e.g. More ❯
value. Assist in managing security incidents, vulnerabilities, and malfunctions, ensuring efficient resolution. Conduct forensically sound acquisitions of computer systems and media for evidence collection. Provide advice and guidance in penetrationtesting and improving service offerings. Carry out reviews, internal audits, and spot-checks to ensure effective operation of security measures. Provide expertise in the design and implementation of … science. This will require occasional periods of intense concentration to ensure any evidence collected can be used in a court of law. 16. Provide appropriate advice and guidance in penetrationtesting and improving the service offering. 17. Carry out reviews, internal audits and spot-checks to ensure the effective operation of (but not limited to): IDS/IPS More ❯
value. Assist in managing security incidents, vulnerabilities, and malfunctions, ensuring efficient resolution. Conduct forensically sound acquisitions of computer systems and media for evidence collection. Provide advice and guidance in penetrationtesting and improving service offerings. Carry out reviews, internal audits, and spot-checks to ensure effective operation of security measures. Provide expertise in the design and implementation of … science. This will require occasional periods of intense concentration to ensure any evidence collected can be used in a court of law. 16. Provide appropriate advice and guidance in penetrationtesting and improving the service offering. 17. Carry out reviews, internal audits and spot-checks to ensure the effective operation of (but not limited to): IDS/IPS More ❯
firewalls, intrusion detection/prevention systems and WAFs. Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST. Experience of external penetrationtesting scopes. Experience securing code reviews and security approvals Experience in Cryptography management & enhancements We value teamwork, collaboration & technical excellence – the company are heavily weighted toward technical staff More ❯
Central London, London, England, United Kingdom Hybrid / WFH Options
hireful
firewalls, intrusion detection/prevention systems and WAFs. Knowledge of security compliance standards relevant to the SaaS industry, such as PCI, GDPR, ISO 27001, SOC2, NIST. Experience of external penetrationtesting scopes. Experience securing code reviews and security approvals Experience in Cryptography management & enhancements We value teamwork, collaboration & technical excellence – the company are heavily weighted toward technical staff More ❯
Security Tooling: Contribute to the creation and maintenance of in-house tools that enhance our security capabilities and automation. Product Security Support: Assist in security assessments, threat modeling, and penetrationtesting, working closely with the Product Security team. Secure Development Lifecycle: Help implement and improve security gates within the SDLC. Adapt & Collaborate: Be prepared to dive into any More ❯
or Practitioner AWS Certified Security Familiarity with TCP/IP, DNS, firewalls, VPNs, and VLANs. Basic experience with SIEMs and security logs Understanding of vulnerability management practices Understanding of penetrationtesting, Threat Hunting, Red Teaming methodologies Familiarity with application security and OWASP Top Ten Scripting languages Experience with capture-the-flags Familiarity with audit principles and different information More ❯
Fort Belvoir, Virginia, United States Hybrid / WFH Options
Woodside Staffing Solutions & Consulting
years of experience with DOD Vulnerability Management System Bachelor's degree preferred DoD 8570.01-M Certification: DFARS Information Assurance Contractor DISA FSO certified CCRI Team Lead and certification in penetrationtesting, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification Penetration Tester (GPEN) Additional Qualifications: • Proven proficiency performing CCRI/vulnerability assessment/penetrationtesting on networks, databases, computer applications and IT frameworks. • Strong analytical and problem-solving skills for resolving security issues. • Strong skills implementing and configuring networks and networks components. • Command Cyber Readiness Inspection certification in at least one of the following areas: o Retina scan … Detect o Physical Security • Required to possess a DOD SECRET Clearance and be eligible for an IT-II upon assignment. • DISA FSO certified CCRI Team Lead and certification in penetrationtesting, such as: o Licensed Penetration Tester (LPT) o Certified Expert Penetration Tester (CEPT) o Certified Ethical Hacker (CEH) o Global Information Assurance Certification PenetrationMore ❯
Bristol, Avon, South West, United Kingdom Hybrid / WFH Options
Sparta Global Limited
partners as a 'Spartan' consultant. In this role you will undertake: Network Security - Understanding of firewall configuration, intrusion detection/prevention systems (IDS/IPS), and secure network protocols. PenetrationTesting & Vulnerability Assessment - Skills in identifying, simulating, and remediating vulnerabilities through tools (e.g., Nessus, Metasploit) and manual testing. Incident Response & Forensic Analysis - Ability to manage and respond to … review your application and invite you to the next stage if you showcase the right aptitude for success. Complete online assessments and a first-stage interview - These assessments are testing your aptitude for learning. Show us your potential and then your personality in a telephone interview. Final competency-based interview - Demonstrate your collaborative skills, problem-solving abilities, and growth More ❯
Code (Terraform, CloudFormation) Experience with Jira or similar ticketing systems Technical architecture review skills Vulnerability identification (CWE, OWASP) Operating systems and hardening techniques Development concepts like CICD, Pipelines, SDLC Penetrationtesting knowledge (useful) Familiarity with Cloud Development Kit (CDK), GitOps Experience in DevOps/agile environments Docker, Kubernetes, serverless, Helm Platforms like Snowflake, MongoDB, Terraform Cloud, GitHub, Databricks More ❯
Arnold, Nottinghamshire, United Kingdom Hybrid / WFH Options
Lockheed Martin
with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) • Understanding of Risk Management Framework (RMF) NIST SP 800-53 • Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtesting) • Strong problem-solving and troubleshooting skills • Excellent communication and collaboration skills • Technical curiosity to learn new skills and are ready to help across the team Security Clearance More ❯
Arnold, Missouri, United States Hybrid / WFH Options
Lockheed Martin
with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) • Understanding of Risk Management Framework (RMF) NIST SP 800-53 • Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtesting) • Strong problem-solving and troubleshooting skills • Excellent communication and collaboration skills • Technical curiosity to learn new skills and are ready to help across the team Security Clearance More ❯
King Of Prussia, Pennsylvania, United States Hybrid / WFH Options
Lockheed Martin
with infrastructure as code (IaC) tools (e.g., Terraform, Ansible) • Understanding of Risk Management Framework (RMF) NIST SP 800-53 • Understanding of security best practices and tools (e.g., vulnerability scanning, penetrationtesting) • Strong problem-solving and troubleshooting skills • Excellent communication and collaboration skills • Technical curiosity to learn new skills and are ready to help across the team Security Clearance More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
and collaborating across teams to enhance our cybersecurity posture across Europe. Main responsibilities Develop, implement, and maintain IT security policies, standards, and procedures. Lead security assessments, vulnerability scanning, and penetration testing. Monitor and respond to security incidents, conducting investigations and ensuring quick remediation. Oversee the implementation of security controls to safeguard digital assets and protect data. Manage the organization More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom Hybrid / WFH Options
GoDefend Limited
GoDefend is a growing UK-based cyber security company based in Newcastle upon Tyne, offering a wide-spectrum of cyber solutions whilst specialising in continuous vulnerability scanning and penetration testing. We are seeking a Penetration Tester with over three years of hands-on experience in offensive security. Youll join a growing, fast-paced cyber security team where your … remote working), is ideal for a technically skilled professional who is also confident communicating with clients and translating complex risks into clear business language. What Youll Be Doing: Conduct penetrationtesting across web applications, mobile apps, cloud platforms, and internal networks. Perform detailed vulnerability assessments and provide actionable remediation guidance. Create professional, jargon-free reports suitable for both … technical and non-technical audiences. Lead or support scoping calls with clients to define the scope and objectives of testing engagements. Act as a trusted advisor, clearly communicating findings, risk implications, and recommendations to stakeholders. Mentor junior testers and contribute to internal training and documentation. Investigate post-incident root causes and propose preventative security controls. Keep abreast of emerging More ❯
for you to cut your teeth on and a friendly, passionate team to develop and grow. The KPMG’s Cyber Defence (CDS) Team conducts client facing technical assurance and penetrationtesting and has a long and successful history in KPMG. Our clients are diverse and we cover many sectors with particular specialisms in Financial Services, High-end Defence … Assurance and Telecommunications. We work closely with the NCSC developing new schemes such as Cross Domain Solutions Testing ( and are members of all current NCSC and CREST testing schemes - as a result we conduct interesting and challenging work that isn’t on offer elsewhere. Our team is made up of skilled individuals at different stages in their careers … we are able to offer flexibility in base location, as well as embracing remote working. What will you be doing? Aspects of the role include: HACKING! Learning and developing penetrationtesting skills in: Infrastructure, Application (web, mobile, desktop), Cloud and AI. Working through a clear and defined certification pathway. Delivering penetration tests to some of our most More ❯
Security Engineer, you will implement and maintain robust security systems and protocols across our IT infrastructure. Your responsibilities include conducting risk assessments and vulnerability scans, mitigating vulnerabilities identified in penetrationtesting, and implementing preventative measures to protect against cyber threats. You will monitor the security infrastructure, detect and respond to potential threats, mentor and develop the IT security … SSO Manage MDM/MAM and Conditional Access Manage security certificates and keys Manage IDS and IPS Manage PAM systems Deliver Cyber Security Awareness Training Remediate vulnerabilities identified during penetrationtesting Handle ad-hoc IT security projects Experience - Essential The successful candidate will have good working knowledge and experience with the following technology stack: CrowdStrike EDR Mimecast Mail … Menlo Web Security Gateway KnowBe4 Digicert Certificates and Microsoft Certificate Services Ivanti or Automox patching AppCheck or Tenable WAS Desired Education: CISM, MS SC100, 200, 900, OSCP or other penetrationtesting qualifications. Industry: Financial services, SOC, Pentesting is desirable Personal Skills: Excellent interpersonal, written, and verbal communication skills Ability to handle multiple priorities, tasks, and projects simultaneously Clear More ❯