Tewkesbury, Gloucestershire, England, United Kingdom
Sanderson
Debian variants). Designing, planning, and rolling out software and upgrades. Troubleshooting issues and implementing fixes across the infrastructure. The role includes working with the security team and external penetrationtesting teams to ensure a very high security standard across the infrastructure. Benefits Competitive Salary Generous pension provision Performance and business development bonuses 25 days holiday per year More ❯
prioritization of remediation of findings. Ability to monitor network security systems, summarize results with dashboards or other tools and report to C-suite on a weekly basis. Familiarity with Penetrationtesting tools such as MITRE ATT&CK and developing remediation strategies, POAM, and implementation of the POAM. Interpersonal skills in supporting internal stakeholders, customers, and support contractors. Knowledge More ❯
subject matter expert (SME) for OT systems during audits, inspections, and vendor engagements. • Evaluate new technologies and develop risk-based strategies to enhance OT cybersecurity and system reliability. • Support penetrationtesting, vulnerability assessments, and patch management activities in live and test environments. • Participate in a 24/7 on-call rotation to support critical infrastructure operations. Qualifications: • Bachelor More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
security breaches and other cybersecurity incidents. - Document security breaches and assess the damage they cause. - Work with the security team to perform tests and uncover network vulnerabilities, such as penetration testing. - Fix detected vulnerabilities to maintain a high-security standard. - Recommend best practices for IT security. - Installing security measures and operating software to protect systems and information infrastructure, including More ❯
Docker, Kubernetes, IaC). Threat Modeling, Reviews & Remediation Lead threat modeling workshops across product and platform teams. Identify and assess vulnerabilities using SAST, DAST, SCA, manual code reviews, and penetration testing. Promote reusable remediation patterns for code and infrastructure vulnerabilities. Leverage threat intelligence to prioritize mitigations based on business risk. Engineering & Automation Build and maintain automation tools for vulnerability More ❯
Basingstoke, Hampshire, England, United Kingdom Hybrid / WFH Options
Corriculo Ltd
security team, monitoring and analysing real-time security events using SIEM tools to detect and respond to potential threats. The Cyber Security Engineer will conduct regular vulnerability assessments and penetration tests to identify and mitigate security risks and breaches, and will investigate security incidents and conduct forensic analysis to determine the root cause and recommend remediation actions. Outside of … Firewalls, VPN, EDR/XDR, mail filtering and other security products Experience of Security Information Event Management (SIEM) tools Any experience or knowledge of ISO27001 as well as with penetrationtesting/vulnerability scanning would be highly advantageous The list above is important, but not as important as hiring the right person! So if you don't meet More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Newcastle Upon Tyne, Tyne and Wear, North East, United Kingdom
HMRC
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
Professional Framework for one or more of the following capabilities: Cyber Security Advisory Security Architect Cyber Security Advisory Cyber Security Risk Manager Cyber Security Research, Development and Design Security Testing Person specification Ideal candidate: Be a leader in the delivery and development of technical security and expertise and capability of the wider team and drive the learning & development strategy … of appropriate ISO standards including 27001, 27002, 27005, 270017, 27018, 22301. Good working knowledge of Cryptography including symmetric & asymmetric encryption systems, infrastructure, risks, weaknesses and mitigations. Working knowledge of penetrationtesting skills and requirements Proven successful delivery of security aspects of major projects and demonstrable professional credibility and authority having been within a key security role working on More ❯
West London, London, England, United Kingdom Hybrid / WFH Options
Ashdown Group
considered suitable you will need the following skills and experience: - Experience in either a Cyber Analyst or Cyber Engineer role - SC Cleared/Clearance - Experience in network audits and penetrationtesting - Previous experience of delivering Cyber Essentials Plus - Knowledge of security frameworks - Generalist IT security background - Strong communication skills More ❯
Ashby de la Zouch, Ashby-de-la-Zouch, Leicestershire, United Kingdom
VIQU IT
the design, implementation, and management of cyber security technologies across the business Monitor and respond to security incidents, alerts, and helpdesk requests, maintaining robust threat detection Conduct vulnerability assessments, penetrationtesting, and phishing simulations to identify and mitigate risks Collaborate closely with IT teams to embed security best practices into system management and project delivery Stay up to More ❯
San Jose, California, United States Hybrid / WFH Options
Zscaler
stakeholders including engineering, security, business teams, external assessors, federal agencies, and leadership Working knowledge and experience with the various cloud computing services (e.g., IaaS, PaaS, SaaS) Coordinating 3PAO assessments, penetrationtesting, audits, and implementing continuous monitoring programs to ensure ongoing compliance and address security findings What We're Looking for (Minimum Qualifications) 8+ years of experience in federal More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
As a Vulnerability Management Analyst you will use Leading, Enterprise-Led Tools & take Responsibility for Reviewing the Results of Risk & Impact Assessment, Scheduling & Planning for Specialist Third-Party Vulnerability & PenetrationTesting, along with Reporting. Key Responsibilities of Vulnerability Management Analyst role would include: Conducting Vulnerability Scanning with leading Tools Scheduling of Scanning across Business, ensuring Reporting Requirements are More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
Oxford, Oxfordshire, United Kingdom Hybrid / WFH Options
Nomios
Why join Dionach by Nomios? Since being acquired by Nomios in late 2024, Dionach by Nomios has continued its dynamic growth as a leading information security company. Specializing in penetrationtesting and information assurance services, we offer an incredible opportunity to be part of an experienced team, build your skills, and grow professionally. Dionach by Nomios holds impressive More ❯
topics is equivalent to an Associate degree. Experience: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
experience with an associate degree Relevant experience Computer or information systems design/development/analysis. Engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
on current platform(s). Experience in managing and maintaining application integration leveraging current networking concepts (TCP/IP, routing, firewalls) Oversee and conduct regular cybersecurity vulnerability assessments and penetration testing. Develop and maintain security incident response plans and procedures. Develop and implement automation scripts and tools to streamline platform deployments, provisioning, and management tasks. Deploy and manage machines More ❯