range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, PenetrationTesting and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured in the Security control, measures … go. Our roles are only available if you hold or fulfil the criteria to obtain a UK Security Clearance. Your future duties and responsibilities An opportunity for an experienced penetration testers has become available due to growth, joining the CGI Cyber Security business unit, one of the largest groups of cyber security specialists in the UK. CGI has a … long established reputation in this area, undertaking rigorous testing for a variety of commercial and public sector clients for over 30 years. Experience of the assessment of bespoke applications, cloud technologies and mobile applications (on diverse mobile platforms) would be of an advantage. You would join our established team of penetration testers with the possibility of progressing to More ❯
range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, PenetrationTesting and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured in the Security control, measures … go. Our roles are only available if you hold or fulfil the criteria to obtain a UK Security Clearance. Your future duties and responsibilities An opportunity for an experienced penetration testers has become available due to growth, joining the CGI Cyber Security business unit, one of the largest groups of cyber security specialists in the UK. CGI has a … long established reputation in this area, undertaking rigorous testing for a variety of commercial and public sector clients for over 30 years. Experience of the assessment of bespoke applications, cloud technologies and mobile applications (on diverse mobile platforms) would be of an advantage. You would join our established team of penetration testers with the possibility of progressing to More ❯
wideopen, north east england, united kingdom Hybrid / WFH Options
CGI
range of areas including Risk Assessments, Vulnerability Management, Accreditations (ISO27001, GDPR), GRC (Governance, Risk, Compliance), Security Architecture Design and Build (technical and Non-technical), Incident Response, Protective Monitoring Services, PenetrationTesting and much more. We take clients through a journey to improve their overall security posture and maturity to ensure they feel reassured in the Security control, measures … go. Our roles are only available if you hold or fulfil the criteria to obtain a UK Security Clearance. Your future duties and responsibilities An opportunity for an experienced penetration testers has become available due to growth, joining the CGI Cyber Security business unit, one of the largest groups of cyber security specialists in the UK. CGI has a … long established reputation in this area, undertaking rigorous testing for a variety of commercial and public sector clients for over 30 years. Experience of the assessment of bespoke applications, cloud technologies and mobile applications (on diverse mobile platforms) would be of an advantage. You would join our established team of penetration testers with the possibility of progressing to More ❯
SOC or NOC environment. Strong hands-on experience with SIEM tools, specifically QRadar Solid understanding of incident response methodologies and DFIR principles. Knowledge of network traffic analysis, vulnerability management, penetrationtesting, and malware reverse engineering. Familiarity with ITIL processes (Incident, Problem, Change). Strong written and verbal communication, with the ability to produce clear technical documentation and reports. More ❯
response for security risks and issues raised by SOC teams Manage implementation of logging and SIEM integration for comprehensive monitoring Prioritise and oversee vulnerability remediation across the platform Support penetrationtesting activities and security audits Collaboration & Leadership: Build strong relationships with central security teams and contribute to communities of practice Manage escalations of security-related issues, risks, and More ❯
Doncaster, South Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
DFS Furniture Ltd
techniques, and procedures (TTPs) within our environments. Continuously improve security processes, playbooks, and tooling based on real-world lessons 3. Assurance & Vulnerability Management Lead the technical support for our penetrationtesting programme, including sound scoping, engaging with pentesters, and owning the subsequent vulnerability remediation. Develop and implement a technical framework for the deeper assessment and management of Third More ❯
Arlington, Virginia, United States Hybrid / WFH Options
Millennium Corporation
and Cobalt Strike) Ability to operate in a critical fashion in dynamic environments Knowledge of FISMA and NIST 800 series standards In-depth knowledge of network mapping, vulnerability scanning, penetrationtesting, and Web Application testing In-depth knowledge of the procedures of Phishing Assessments, Wireless Assessments, Operating System Security Assessments, and Database Assessments Serves as Subject Matter More ❯
Central London, London, United Kingdom Hybrid / WFH Options
Halian Technology Limited
best practices. Strong analytical and prioritization skills with a pragmatic, risk-based approach to decision-making. Leadership experience Nice to have: If you have come from a development/penetrationtesting background this would be advantageous for my client. Pen testing experience Certifications (CEH)/OSCP This role is on a hybrid basis with 2 - 3 days More ❯
CI/CD pipelines and infrastructure-as-code (IaC) deployments across Azure. Lead container, API, and web application security initiatives, including code reviews. Support threat modelling, vulnerability management, and penetrationtesting activities. Drive logging integration with SIEM tools, enabling SOC monitoring and incident response. Coach engineering teams on cloud security principles and manage audit-related actions. What You More ❯
to proactively enhance the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetrationtesting and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security More ❯
Clydebank, Dunbartonshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetrationtesting with internal or external parties as appropriate. Drives business-wide understanding of secure development practices and general information security awareness. Represents the company during audits and performs More ❯
Leading the cultural shift towards secure software development across product teams Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetrationtesting, vulnerability management, and remediation efforts Acting as a software security SME, advising teams on secure design, risk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
Leading the cultural shift towards secure software development across product teams Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetrationtesting, vulnerability management, and remediation efforts Acting as a software security SME, advising teams on secure design, risk More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile securityMDM (MAM/BYOD)to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 securityleveraging Purview, Conditional Access, MFAto safeguard modern workplaces. … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA—to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Glasgow, Lanarkshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetrationtesting with internal or external parties as appropriate. Drives business-wide understanding of secure development practices and general information security awareness. Represents the company during audits and performs More ❯
City of London, London, England, United Kingdom Hybrid / WFH Options
How to Job Ltd
who are eager to develop their skills in a collaborative and fast-paced environment. Responsibilities: •Monitor and analyze security alerts to identify potential threats. •Assist with vulnerability assessments and penetration testing. •Support the implementation of security tools and protocols. •Investigate and respond to security incidents alongside the IT team. •Create detailed reports on security findings and recommendations for stakeholders. More ❯
background in incident response, SOC operations, and security investigations. Hands-on expertise with SIEM tools (Splunk, QRadar, Microsoft Sentinel). Deep understanding of network traffic analysis, vulnerability management, and penetration testing. Knowledge of DFIR principles, malware reverse engineering, and digital forensics. Familiarity with ITIL processes (Incident, Problem, Change). Experience with cloud platforms (AWS and/or Azure). More ❯
Hampton, Virginia, United States Hybrid / WFH Options
RMantra Solutions Inc
HCM Developer Location: Crystal City, VA Work Schedule: Remote position, but may be required to come to the office as needed Clearance: DoD Secret Responsible for designing, developing, documenting, testing and debugging applications software and systems that contain logical and mathematical solutions. Conducts multidisciplinary research and collaborates with equipment designers and/or hardware engineers in the planning, design … in conjunction with hardware product development, for medical, industrial, military, communications, aerospace, and scientific applications, applying principles and techniques of computer science, engineering, and mathematical analysis. Conducts vulnerability research, penetrationtesting, malware analysis and reverse engineering development of computer network operations tools Duties and Responsibilities: Responsible for technical solution design, development, deployment/cutover, and implementation covering all … presents options and recommendations to obtain desired results Design, plan, test and implement remediation's which meet functional and technical specifications of a large PeopleSoft HR application Conduct Unit testing and resolve issues found in testing Meet deadlines and manage multiple, dynamic priorities Effectively communicate and demonstrate experience working in a team-oriented environment Required Qualifications: Bachelor's More ❯
Corsham, England, United Kingdom Hybrid / WFH Options
NexGen Associates
will review documents for complex systems and assuring compliance against strict standards, advising on JSP policies, producing RMADS and PIA documentation, chairing security working groups, scoping vulnerability assessments and penetrationtesting activities, this will challenge you to grow your technical knowledge as well as use your current capabilities. Main duties: Ensuring project compliance to MOD JSP Policy and More ❯
swindon, wiltshire, south west england, united kingdom Hybrid / WFH Options
NexGen Associates
will review documents for complex systems and assuring compliance against strict standards, advising on JSP policies, producing RMADS and PIA documentation, chairing security working groups, scoping vulnerability assessments and penetrationtesting activities, this will challenge you to grow your technical knowledge as well as use your current capabilities. Main duties: Ensuring project compliance to MOD JSP Policy and More ❯
Arlington, Virginia, United States Hybrid / WFH Options
CGI
for cleared personnel, • Technical security controls: Implement, manage, and monitor security measures such as firewalls, intrusion detection/prevention systems, and access controls. • Vulnerability management: Conduct vulnerability scanning and penetrationtesting on networks and systems, and report on compliance using tools like Nessus, SCAP, and Splunk. • Secure system development: Apply security techniques and best practices to system and More ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
functional engineering Team environment. • Employ a high level of productivity and responsiveness, especially for time-critical requirements, with a team-oriented approach to interface with team members. • Support exploitation testing to improve integrity and security of weapon system environments. • Support testing and related activities across a wide variety of platforms and technologies using advanced techniques and methodologies, such … of Cybersecurity requirements Must possess (or be able to obtain within six months of employment start date) a DoD 8570.01-M certification (Security+, CISSP) Desired Skills: • Designing, development, documents, testing, and maintaining full spectrum cyber solutions • Developing and automating secure systems to support cyber offensive, defense and full spectrum cyber operations • Conducting vulnerability research, reverse engineering, penetrationtestingMore ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
functional engineering Team environment. • Employ a high level of productivity and responsiveness, especially for time-critical requirements, with a team-oriented approach to interface with team members. • Support exploitation testing to improve integrity and security of weapon system environments. • Support testing and related activities across a wide variety of platforms and technologies using advanced techniques and methodologies, such … of Cybersecurity requirements Must possess (or be able to obtain within six months of employment start date) a DoD 8570.01-M certification (Security+, CISSP) Desired Skills: • Designing, development, documents, testing, and maintaining full spectrum cyber solutions • Developing and automating secure systems to support cyber offensive, defense and full spectrum cyber operations • Conducting vulnerability research, reverse engineering, penetrationtestingMore ❯
Grand Prairie, Texas, United States Hybrid / WFH Options
Lockheed Martin
functional engineering Team environment. • Employ a high level of productivity and responsiveness, especially for time-critical requirements, with a team-oriented approach to interface with team members. • Support exploitation testing to improve integrity and security of weapon system environments. • Support testing and related activities across a wide variety of platforms and technologies using advanced techniques and methodologies, such … of Cybersecurity requirements Must possess (or be able to obtain within six months of employment start date) a DoD 8570.01-M certification (Security+, CISSP) Desired Skills: • Designing, development, documents, testing, and maintaining full spectrum cyber solutions • Developing and automating secure systems to support cyber offensive, defense and full spectrum cyber operations • Conducting vulnerability research, reverse engineering, penetrationtestingMore ❯