in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
experience must be in computer or information systems design/development/analysis. May also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
CI Polygraph (Fullscope highly preferred) - Bachelor's or Master's degree in Computer Science, Cybersecurity, Information Systems, or related field. - A Minimum 5 years of experience in network exploitation, penetrationtesting, or defensive cyber operations. Proficiency in scripting languages (e.g., Python, Bash, PowerShell). Strong understanding of TCP/IP, DNS, HTTP/S, and other core networking More ❯
cyber network operational capabilities to develop exploitation plans and make operational adjustments as plans are executed. Successful candidates may also have experience programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Required Experience: Level 3: At least 8 years demonstrated experience within the Department of More ❯
in conjunction with the Navy tactical configuration development and associated tactical applications, applying principles and techniques of network engineering, cybersecurity engineering, and systems administration. Conduct vulnerability research, malware analysis, penetrationtesting, and reverse engineering development of computer network operations, as required. Conduct installation and integration of Commercial Off-The-Shelf (COTS) cybersecurity tools and applications and perform proof More ❯
Rogerstone, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising and remediating vulnerabilities. Work closely with colleagues performing related penetrationtesting and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the More ❯
Newport, Gwent, United Kingdom Hybrid / WFH Options
Hays Technology
the business has an accurate view of the vulnerabilities in its asset estate and follows an agreed methodology for prioritising and remediating vulnerabilities. Work closely with colleagues performing related penetrationtesting and risk assessment activities, providing accurate and timely technical information regarding assets and the status of vulnerabilities. Prepare and deliver regular, high-quality management reporting regarding the More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
plans tailored to OT environments Lead security awareness training for OT personnel and partners Ensure compliance with standards such as NIS Directive, NCSC CAF, ISO 27001 Conduct audits and penetrationtesting of OT systems Advise on secure integration of IIoT and other emerging technologies Your Profile 8+ years of cybersecurity experience, including 5+ years focused on OT or More ❯
Cheadle Hulme, Cheadle, Cheshire, England, United Kingdom
QA
businesses improve efficiency, security, and scalability through managed IT support, cyber security, cloud transformation, and consultancy. They offer services like proactive IT monitoring, data backup, identity and access management, penetrationtesting, and tailored technology roadmaps. With a focus on simplicity, security, and business growth, San-iT supports small to medium-sized businesses across various sectors, delivering practical, jargon More ❯
e.g. Function Apps, Logic Aps, Power Automate, External Entra ID ISO27001 implementation and maintenance Proactive and self-motivated Desirable but not required: Cyber Security experience - understanding of vulnerability, pen testing and communicate with CyberSec professionals. Please apply directly with an up today CV and we will be in touch More ❯
roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensic analysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements More ❯
roadmap Handle varied and complex security challenges, from system reviews to high-level risk assessments Work closely with third-party suppliers in relation to audits, forensic analysis and pen testing Requirements: Experience with ISO 27001 is essential Strong background in cyber security management Proven experience in identifying and mitigating security risks# Ability to make actionable recommendations for security improvements More ❯
Paddington, Greater London, England Hybrid / WFH Options
Nexus Jobs Limited
information and event management (SIEM), user and entity behaviour analytics (UEBA), point products like anti-virus (AV) and intrusion detection system/intrusion prevention system (IDS/IPS) and penetration testing. The Service Delivery team consists of approximately 20 staff who support and operate the Company’s services and there is an opportunity in that team for a Cyber More ❯
Leominster, Herefordshire, West Midlands, United Kingdom Hybrid / WFH Options
Kingspan
support for global and regional content teams. Data privacy (GDPR/CCPA) and cookie & consent management. Domain & DNS Management (e.g SSL certification) Cyber security operations including vulnerability management and penetration testing. Regulatory compliance in local markets. Code quality & security including release management and change controls. Data & Optimization Business intelligence. Manage analytics and reporting for site performance, engagement, and conversions. More ❯
and Prototypes: Demonstrating how sites function and look. • Troubleshooting UX Problems: Identifying and addressing issues related to responsiveness. • Adhering to Style Standards: Ensuring consistency in fonts, colors, and images2. • Testing and Analysis: Conducts vulnerability research, penetrationtesting, malware analysis and reverse engineering development of computer network operations tools. Required Qualifications: • An Active TS/SCI Clearance with More ❯
required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetrationtesting techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent communication skills and a collaborative approach to problem … point during the recruitment process, if there is a better way for us to communicate, please do let us know. Developer, Engineer, Programmer, Java, Android, Mobile OS, Malware, Virus, Penetration Test, Threat, OSCP, Cyber, Infosec, Security, Information Security, Pentest #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to More ❯