London, South East, England, United Kingdom Hybrid / WFH Options
Circle Recruitment
required: Demonstrable experience in analysing and deconstructing Android applications ( Java essential; native code experience advantageous) Strong understanding of Android OS security features and architecture Proficiency in vulnerability identification and penetrationtesting techniques Ability to work independently, with excellent attention to detail and analytical skills Comfortable navigating large, unfamiliar codebases Excellent communication skills and a collaborative approach to problem … point during the recruitment process, if there is a better way for us to communicate, please do let us know. Developer, Engineer, Programmer, Java, Android, Mobile OS, Malware, Virus, Penetration Test, Threat, OSCP, Cyber, Infosec, Security, Information Security, Pentest #vacancy #jobadvert #recruit #hiring #jobsearch #careers #talent #recruitment #job Circle Recruitment is acting as an Employment Agency in relation to More ❯
experience must be in computer or information systems design/development/analysis may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Requirements AA + 7 yrs or B.A. + 5 yrs or Masters +3 yrs More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Identify, analyze, map, and/or protect against vulnerabilities, intrusions and threats to computer More ❯
Experience must be in computer or info systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Network and system administration may account for some, but not all, of the experience. Completion of military training in a relevant area such as JCAC (Joint Cyber More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Strong knowledge of web/mobile security (OWASP Top 10, API security), cloud security (AWS), and CI/CD pipeline hardening Familiar with SAST/DAST tools, vulnerability scanners, penetrationtesting frameworks, and monitoring platforms (e.g. Splunk, ELK, Datadog) Understanding of GDPR and data privacy best practices Tremendous opportunity offering plenty of scope for career progression in a More ❯
must be in computer or information systems design/development/analysis, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Preferred Completion of military training in a relevant area such as JCAC will be More ❯
in computer or information systems design/development/analysis roles may include may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration Excellent communication and collaboration skills to interface across NSA Strong target and content discovery More ❯
analysis, and metadata analysis. Education and Training Qualifications: Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering. Additionally, must have experience in network or system administration. If not credited toward education requirements, completion of military More ❯
in computer or information systems design/development/analysis. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Location: Annapolis Junction MD Salary: 125K-135K Background Relevant experience must be in computer or information systems design/development, programming, information/cyber/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, and/or systems engineering Experience in network or system administration Requirements AA + 7 yrs or, B.A. + 5 yrs or Masters More ❯
cyber solutions. Develops and automates secure systems to support cyber offensive, defense and full spectrum cyber operations. Provides DevOps solutions enabling software quality assurance for vulnerability research, reverse engineering, penetrationtesting (red/blue teams), and develops specialized cyber software solutions and tools based on mission requirements. Applies system knowledge. of subject matter (hardware, software, networks, cloud, etc. More ❯
in computer or information systems design/development/analysis. In addition, it may also include: Engineering hardware and/or software Programming Computer/network security Vulnerability analysis Penetrationtesting Computer forensics Information assurance Systems engineering and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
Leicester, Leicestershire, England, United Kingdom
Sanderson
life cycles, QA, CI/CD, and DevOps. Technical knowledge: Development : C#, JavaScript, JSON, GitHub workflows Platform : Azure, Microsoft stack Data : CRM data models & integration Infrastructure : Security, cyber, pen-testing, scalable environment If this role sounds of interest and you would like to know more, do not hesitate to contact me on Reasonable Adjustments: Respect and equality are core More ❯
life cycles, QA, CI/CD, and DevOps. Technical knowledge: Development : C#, JavaScript, JSON, GitHub workflows Platform : Azure, Microsoft stack Data : CRM data models & integration Infrastructure : Security, cyber, pen-testing, scalable environment If this role sounds of interest and you would like to know more, do not hesitate to contact me on Reasonable Adjustments: Respect and equality are core More ❯
Surrey, England, United Kingdom Hybrid / WFH Options
Ashdown Group
as you will inherit an existing client base and a busy order book. With over three decades of expertise, our client has grown into a trusted name in cybersecurity, penetrationtesting, compliance, cloud recovery, and enterprise-grade data protection. This is an exciting opportunity to join a business at the forefront of the industry, working with mid-market More ❯
New Malden, London, United Kingdom Hybrid / WFH Options
Ashdown Group
as you will inherit an existing client base and a busy order book. With over three decades of expertise, our client has grown into a trusted name in cybersecurity, penetrationtesting, compliance, cloud recovery, and enterprise-grade data protection. This is an exciting opportunity to join a business at the forefront of the industry, working with mid-market More ❯
Washington, Washington DC, United States Hybrid / WFH Options
Kyrus Tech, Inc
/attack operations leadership experience (note this is distinct experience from the above and cannot overlap). Minimum 3 years of hands-on experience with using modifying and customizing penetrationtesting and red teaming software frameworks (Cobalt Strike, Kali, etc.) to meet operational requirements. Minimum 2 years of independently conducting every phase of a red team exercise on More ❯
Senior NFT Consultant - London Reference Code: 262580-en_GBContract Type: PermanentProfessional Communities: Quality Engineering & Testing About the job you're considering Join our team as a Senior Non-Functional Testing (NFT) Consultant , for one of our financial service organisations. In this role, you won’t just be executing tests — you’ll be leading test assurance and governance across … COO, Head of IT) and suppliers, ensuring that non-functional requirements are met with precision and foresight. This is a strategic leadership role where your expertise in Operational Acceptance Testing (OAT), performance testing, and stakeholder engagement will be critical. You’ll shape test strategies, influence supplier delivery, and ensure operational readiness across cloud, data, and infrastructure programmes. Hybrid … management Collaborate closely with SIAM to understand the Ops requirement and coordinate with suppliers to ensure the solution covers SIAM requirements Create NFT test strategy, providing assurance on NFT testing approach including performance, pen testing, operational acceptance, etc. You can bring your whole self to work. At Capgemini building an inclusive future is part of everyday life and More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Claranet Limited
on meeting or exceeding sales-related KPIs (you may be required to provide evidence) Working knowledge of at least three of the following technology areas – PaaS, IaaS, SD-WAN, PenetrationTesting, MDR/EDR, PowerBI, Ethernet/Broadband, Private Cloud, Databases. More ❯
Position Overview Support mission-critical operations by designing, developing, and executing automated testing solutions for secure continuous operations systems. You will play a pivotal role in validating and verifying functionality, performance, and security of both IT and operational technology (OT) components under strict compliance standards. Key Responsibilities Develop comprehensive test plans, automated test scripts, and test cases to validate … system requirements across SCOR platforms. Conduct functional, integration, regression, performance, and security testing-including vulnerability and compliance checks. Integrate automated tests within CI/CD pipelines; support DevOps workflows. Hire for Belonging+1Jobed.ai+1 Log, track, and manage defects; collaborate with stakeholders to drive timely resolution. Maintain and enhance automation frameworks in tools like Selenium, TestNG, JMeter, Appium, Postman, or Robot … Framework. Prepare reports, dashboards, and documentation aligned with FBI governance and compliance standards. Participate in User Acceptance Testing (UAT) and feedback coordination. Required Qualifications Bachelor's degree in Computer Science, Engineering, or related technical field-or equivalent experience. Minimum 5-8 years of experience in automation testing within complex IT/OT environments. Expertise in scripting languages such More ❯
Security, SPAA, incident response, cyber security, insider threat, computer forensics, vulnerability assessment and management, network data capture, intrusion detection, log management, auditing, security incident and event management (SIEM), and penetration testing. Personnel assigned to this role will serve primarily on the Operations & Response (O&R) Team; however, this role may also support the Vulnerability Assessment and Penetration Test … and mitigation; analyzing security system logs, security tools, and data; network monitoring, and intrusion detection using host-based and network-based intrusion detection systems (IDS) and log management applications; testing, installing, patching, and upgrading computer hardware and operating systems (Windows, and UNIX) in an enterprise environment; identifying, collecting, processing, documenting, reporting, cyber security/incident response events; architecting, engineering … developing and implementing cyber security/incident response policies and procedures; engineering, testing, installing, patching, and upgrading various information security hardware and software applications. • 3 years' experience using one or more of the following security tools: SourceFire, Arcsight, Splunk, NetWitness, Guidance Software, Digital Guardian, SureView, Intelliview, Nessus, and Foundstone. • 3 years' experience with Federal cybersecurity standards, industry best practices More ❯
CHECK TL/TM Penetration Testers required CHECK Penetration tester/CTL & CTM/Web & Inf/Outside IR35/Fully Remote/£600 pd/ASAP Start/3 Months SR2 have partnered with an exciting, specialist Cyber Security Consultancy looking to expand their consultant CHECK team ahead of projected growth and upcoming projects. The CTL will … lead on high-assurance CHECK penetration tests and ITHC projects and occasionally assist on other commercial engagements. The CTM role will support CHECK engagements, uphold testing standards and create high quality reports. We are currently looking for: CTL dual badge CTL Inf CTL Web CTM CTL requirements: A CTL Qualification - Inf, Web or Dual at Chartered or Principal … level. Extensive background in penetration testing. Currently holding, or the ability to obtain SC clearance. Passionate and proactive in your testing approach. Excellent communication skills. CTM Requirements: Extensive background in penetration testing. Ideally holding CRT. Currently holding, or the ability to obtain SC clearance. Excellent communication and a proactive ability to collaborate. Contract Details 3 Months initially More ❯
Reading, Berkshire, South East, United Kingdom Hybrid / WFH Options
Queen Square Recruitment Limited
Senior Manager Vulnerability Management Location: Reading, UK (Hybrid 4 days onsite) Type: Contract (6 months) | Rate: £475/day | Start: ASAP Our client, a leading global organization in IT services, is seeking a Senior Manager Vulnerability Management to lead and More ❯
Barrow-In-Furness, Cumbria, Barrow in Furness, United Kingdom Hybrid / WFH Options
Experis
team. Technical Skills Provide remediation recommendations; Monitor remediation activities; Report on the progress of remediation activities; Provide evidence on closure of remediation activities. Organise, Scope and Facilitate ITHC Regression testing Communicate and report technical vulnerabilities to a non-technical audience Translate and map vulnerabilities to threats and risks. Work with the client's third-party Pen Testing partners … to understand and manage the findings of their testing Identify remediation dependencies and establish remediation prioritisation plans. Work with the vulnerability owners to provide recommendations for remediation, short term containment and/or short-term mitigating controls etc. Create relevant risk acceptance reports where remediation is not possible in the short to medium term. You can bring your whole More ❯