integration and security architecture • Support DevSecOps practices and secure system development lifecycle • Evaluate and recommend cybersecurity tools and technologies • Implement and maintain security controls per NIST 800-53 • Support penetrationtesting and security assessment activities • Assess and recommend access control systems, application and file security, security practices, intrusion detection/prevention • Perform system administration, configuration, patching, upgrades, and More ❯
first step into a fast-growing field. Key Responsibilities: Monitor and analyse security alerts to identify potential threats. Assist in investigating and resolving security incidents. Support vulnerability assessments and penetrationtesting activities. Help implement security policies, procedures, and compliance standards. Learn and apply industry best practices, tools, and frameworks (e.g., ISO 27001, NIST, CIS). Requirements: Bachelors degree More ❯
Collaborate closely with cybersecurity and compliance teams to navigate security reviews, audits, and approval processes. Identify potential security risks within network configurations and recommend mitigations. Participate in vulnerability assessments, penetrationtesting, and remediation efforts related to network infrastructure Qualifications: Proven experience in network engineering with a focus on security compliance. Strong understanding of security protocols, encryption, and network More ❯
digital transformation organisation delivering critical projects across energy, water, renewables, and manufacturing. The Senior ICS OT Cyber Security Engineer will secure and optimise industrial control systems, conduct threat assessments, penetrationtesting, and design technical solutions to mitigate cyber risks. The role involves mentoring junior engineers, collaborating with stakeholders, with occasional travel to client sites and the Stone office. More ❯
other security tools, but experience with other cyber tools would also suffice. Participating in the change management process to ensure proposed changes are reviewed for security risk. Contributing to penetrationtesting planning, coordination and tracking of remediation. Maintaining risk logs and status dashboards for security findings and control effectiveness. Supporting reviews of cloud and on-premises systems to More ❯
to proactively enhance the organization's network security posture Ensure compliance with relevant security regulations and standards and assist in audit processes as needed Conduct regular security assessments including penetrationtesting and vulnerability assessments to identify and remediate potential security risks ESSENTIAL EXPERIENCE 12 years of Proven experience in network security with a strong understanding of network security More ❯
as the Cybersecurity Assessment Team's principal Operational Technology SME. Participate in the development and implementation of comprehensive Cybersecurity program strategies, including OT security engineering design review, vulnerability assessments, penetrationtesting, and incident response planning. Provide technical expertise and guidance to DHS on OT services security matters, including threat analysis, risk mitigation strategies, and secure network and systems More ❯
in complex infrastructure environments A strong technical background across Networks, Security, Firewall, Vulnerability Management, SIEM and EDR technologies Experience with cyber security concepts, such as Threat Modelling, Incident Response, PenetrationTesting (external/internal) Advanced knowledge of cloud products and services e.g. Azure, Microsoft 365 Emotionally intelligent and able to recognise and manage the needs and expectations of More ❯
guidance. Review technical documentation (e.g., designs, network diagrams, data flows) to ensure alignment with security policies and architecture. Conduct Information Security Impact Assessments and Data Protection Impact Assessments. Support penetrationtesting and vulnerability assessments, tracking remediation to closure or handover to BAU. Translate technical risks into business language for stakeholders. Maintain alignment with ISO27001 and other frameworks (e.g. More ❯
Clydebank, Dunbartonshire, Scotland, United Kingdom Hybrid / WFH Options
Nine Twenty Recruitment Ltd
firewalls, intrusion detection systems, endpoint protection, log monitoring, and vulnerability scanning. Investigates and documents security breaches and cyber incidents, including assessment of impact and coordination of remediation efforts. Coordinates penetrationtesting with internal or external parties as appropriate. Drives business-wide understanding of secure development practices and general information security awareness. Represents the company during audits and performs More ❯
SCI) clearance, with polygraph. Bachelor's degree in a related scientific or technical discipline Approximately 5+ years of related work experience Working knowledge of cyber operations and/or penetrationtesting Ability to conduct network forensics and internet traffic characterization Strong analytic and critical thinking skills, including the ability to think strategically Ability to effectively express complex ideas More ❯
computer or information systems design/development/analysis roles. In addition, it may also include engineering hardware and/or software, programming, computer/network security, vulnerability analysis, penetrationtesting, computer forensics, information assurance, systems engineering, and/or network and systems administration. Completion of military training in a relevant area such as JCAC (Joint Cyber Analysis More ❯
and network access. Performs research and analysis a t the deepest levels of total system product to include concept, design, fabrication, test, installation, operation, maintenance, and disposal. Designs encryption, penetrationtesting, and vulnerability analysis solutions of various security technologies. Integrates architectural features into existing infrastructures and designs cyber security architectural artifacts. Provides full assessments of system's security … posture. Performs security testing to verify cyber security integrity of the system. Designs and recommends mitigations. Conducts architectural analysis and relates existing system to future needs and trends. Embeds advanced forensic tools and techniques for attack reconstruction. Develops security policies and procedures to be applied across multiple system architectures. Provides technical expertise and guidance to more junior team members. … written communication Linux experience, specifically with security hardening BASH or other Linux scripting to validate security compliance Familiarity with ICD 503 and NIST 800-53 Experience executing DISA SCAP testing Experience with Xacta and eMASS Splunk configuration experience is a PLUS Active Top Secret clearance with SCI eligibility Must be able to pass CI poly within 6 months of More ❯
Leading the cultural shift towards secure software development across product teams Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetrationtesting, vulnerability management, and remediation efforts Acting as a software security SME, advising teams on secure design, risk More ❯
London, South East, England, United Kingdom Hybrid / WFH Options
Akkodis
Leading the cultural shift towards secure software development across product teams Defining and implementing the software security strategy in line with business goals Collaborating with developers to automate security testing and embed security requirements into the SDLC Supporting penetrationtesting, vulnerability management, and remediation efforts Acting as a software security SME, advising teams on secure design, risk More ❯
Liverpool, Merseyside, North West, United Kingdom Hybrid / WFH Options
Curveball Solutions
objectives. Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile securityMDM (MAM/BYOD)to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 securityleveraging Purview, Conditional Access, MFAto safeguard modern workplaces. … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
L33, Knowsley, Merseyside, United Kingdom Hybrid / WFH Options
Curveball Solutions
Draft, maintain, and implement information security policies and Standard Operating Procedures (SOPs). Configure and oversee mobile security—MDM (MAM/BYOD)—to protect business continuity. Lead vulnerability assessments, penetration tests, firewall policy enforcement, and remediation efforts. Author compelling tender responses, clearly demonstrating technical capability and strategic value. Enhance Microsoft 365 security—leveraging Purview, Conditional Access, MFA—to safeguard … through closure. Strong understanding of ITIL, CAB, and structured change management. Skilled in crafting and updating security policies, SOPs, and managing tender documentation. Hands-on expertise with MDM tools, penetrationtesting, and policy-based firewalls. Experience designing and delivering compliance aligned services across GDPR, Cyber Essentials, ISO 27001. Proficient in using Microsoft 365 security stack: Purview, Defender, Conditional More ❯
Analyst Location: Newport, RI Full Time (Y/N): Y Status (Exempt/Non-Exempt): Exempt Clearance: Top Secret/SCI Primary Responsibilities: • Analysis, documentation and development of integration, testing, operations, and maintenance of system security. • Use data collected from a variety of cyber defense tools (e.g., IDS alerts, firewalls, network traffic logs.) to analyze events from environments to … Detection System, policy server, IAVA management, Defense Information Systems Agency, Host Based Security System, Secure Configuration Compliance Validation Initiative, and Secure Configuration Remediation Initiative tools. • Virtual Private network management, penetrationtesting, forensics research and analysis, web content filter management, security incident reporting, and vulnerability scanning. • Knowledge of cybersecurity principles, cyber threats and vulnerabilities. • Analyze network alerts from enterprise More ❯
Strong experience in building secure web and mobile apps Experience with Security architecture, Application Security assessments, penetrationtesting, vulnerability assessment, Secure SDLC, and Static code reviews Certified Secure Software Lifecycle Professional (CSSLP) (desirable) Responsibilities: - Design, develop, and implement security frameworks and solutions to safeguard company's assets and infrastructure. - Conduct regular security audits and risk assessments to identify More ❯
and outside contacts. Strong interpersonal skills and good judgment with the ability to work alone or as part of a team. Desired Experience Eight (8+) years in vulnerability management & penetration-testing corrective actions. Eight (8+) years supporting DoD defensive cyber operations: system protection, incident handling, reporting, recovery. Physical Demands Must be able to lift 25 pounds on occasion. More ❯
to assess system designs, configurations, and operational practices to ensure they meet security requirements. You will play a critical role in identifying non-compliance, conducting vulnerability assessments, and coordinating penetrationtesting, while providing valuable process improvements and developing standards and guidelines for security controls. Key Responsibilities: Analyze design specifications, design documentation, configuration practices and procedures, and operational practices More ❯
Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerability remediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerability management and penetrationtesting programs. Maintain strong identity, access, and privilege management controls. Compliance & Assurance (30%) Manage and maintain ISO 27001 certification and audit processes. Ensure ongoing compliance with PCI DSS More ❯
Milton Keynes, Buckinghamshire, South East, United Kingdom
Oscar Associates (UK) Limited
Manage security environments across Azure and AWS infrastructure. Lead incident response efforts and coordinate vulnerability remediation activities. Manage continuous security monitoring, alerting, and detection systems. Administer vulnerability management and penetrationtesting programs. Maintain strong identity, access, and privilege management controls. Compliance & Assurance (30%) Manage and maintain ISO 27001 certification and audit processes. Ensure ongoing compliance with PCI DSS More ❯
enhance the cybersecurity posture of assigned programs by tracking evolving cyber threats, adopting emerging technologies, and applying industry best practices. Perform continuous risk assessments, conduct vulnerability scans, and support penetrationtesting activities to proactively identify and mitigate potential threats. Provide expert technical guidance to multi-disciplinary teams and stakeholders on cybersecurity solutions, compliance strategies, and secure system architecture. More ❯
scalable, and adaptable cybersecurity solutions to meet the evolving needs of the warfighting customer. This program supports a range of key roles, including specialists in information security, cyber engineering, penetrationtesting, and Navy validation, all working together to enhance the security and resilience of naval systems and installations. About The Role Peraton is seeking qualified individuals to join More ❯