Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
to the development of security policies, standards, and guidelines Conduct vulnerability assessments, risk analysis, and system accreditation Investigate major security breaches and recommend control improvements Select and apply appropriate penetrationtesting approaches; provide expert advice and reporting Lead vulnerability assessment activities and recommend tools, actions, and controls Perform risk assessments, identify mitigation strategies, and report findings Support compliance …/information security roles. Experience in information security incident response & investigations. A good knowledge of General Data Protection regulations (UK-GDPR) Experience working with legal, audit and compliance teams. Penetrationtesting support. Risk assessment (including supplier risk assessment), control recommendation, mitigation and remediation. On call Requirement: There will be an element of compensated periodic on-call in this More ❯
work on site and will be paid for • Splunk Enterprise System Administrator course completion • Splunk Enterprise Data Administrator course completion • Splunk Enterprise Cluster Administrator course completion • Prior experience in penetrationtesting, red team operations, incident response or computer forensics. • Experience working with orchestration tools such as Packer/Vagrant, Ansible, Puppet, Salt or similar • Capable of handling stressful … situations and demonstrated strong oral and written communications skills. • Excellent interpersonal skills, sound judgment, good administrative and organizational skills. • Technical certifications in penetrationtesting or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA Network+, Security+, Linux+ More ❯
Polygraph Clearance Status: Must be Current JOB DESCRIPTION: Inferno Systems is currently looking for proactive and self-motivated individuals for our Technical Operator positions to work closely with our Penetration Testers. You should have multiple years conducting targeting in support of cyber operations, specifically conducting vulnerability research on targets and systems to gain network/system access. You should … the operational environment to identify appropriate equipment/systems required to meet operational needs. • Devise new techniques by applying technical capabilities in innovative scenarios DESIRED SKILLS • Prior experience in penetrationtesting, red team operations, incident response or computer forensics. • Ability to interact and communicate with individuals from diverse backgrounds and cultures and to convey technical information to non … sound judgment, good administrative and organizational skills. • Knowledge of the process and techniques for recruiting. • Knowledge writing methods and systems as well as policies and regulations. • Technical certifications in penetrationtesting or cyber security such as SANS GIAC certifications (GPEN, GXPN, GCIH, GWAPT, GCFA, etc), Offensive Security (OSCP), Certified Ethical Hacker (CEH) • General technical certifications such as CompTIA More ❯
london, south east england, united kingdom Hybrid / WFH Options
Energy Institute
troubleshoot issues with A/V systems in meeting rooms. Assist in the development of IT policies and procedures Contribute to the implementation and monitoring of security measures and penetrationtesting Perform other duties as assigned by the IT Manager or Director of Digital Transformation Nature and Scope At the Energy Institute, technology isn't just a tool … abilities and the capacity to diagnose and resolve complex technical issues efficiently. Excellent customer service skills, with a user-focused approach. Solid cybersecurity awareness and a foundational understanding of penetrationtesting methodologies or security auditing principles. Demonstrable experience in incident response, particularly in identifying, containing, and escalating cyber incidents. Experience in Microsoft Windows systems administration, particularly Windows Server More ❯
london (city of london), south east england, united kingdom Hybrid / WFH Options
Energy Institute
troubleshoot issues with A/V systems in meeting rooms. Assist in the development of IT policies and procedures Contribute to the implementation and monitoring of security measures and penetrationtesting Perform other duties as assigned by the IT Manager or Director of Digital Transformation Nature and Scope At the Energy Institute, technology isn't just a tool … abilities and the capacity to diagnose and resolve complex technical issues efficiently. Excellent customer service skills, with a user-focused approach. Solid cybersecurity awareness and a foundational understanding of penetrationtesting methodologies or security auditing principles. Demonstrable experience in incident response, particularly in identifying, containing, and escalating cyber incidents. Experience in Microsoft Windows systems administration, particularly Windows Server More ❯
slough, south east england, united kingdom Hybrid / WFH Options
Energy Institute
troubleshoot issues with A/V systems in meeting rooms. Assist in the development of IT policies and procedures Contribute to the implementation and monitoring of security measures and penetrationtesting Perform other duties as assigned by the IT Manager or Director of Digital Transformation Nature and Scope At the Energy Institute, technology isn't just a tool … abilities and the capacity to diagnose and resolve complex technical issues efficiently. Excellent customer service skills, with a user-focused approach. Solid cybersecurity awareness and a foundational understanding of penetrationtesting methodologies or security auditing principles. Demonstrable experience in incident response, particularly in identifying, containing, and escalating cyber incidents. Experience in Microsoft Windows systems administration, particularly Windows Server More ❯
security architecture and assurance to OFFICIAL and above classifications. Provide specialist advice and knowledge of Public Cloud (Azure, AWS, GCP) cloud-based security architectures. Define and lead external security testing (e.g ITHC) of solutions on the public cloud (Azure, AWS, GCP), cloud native platforms (Docker, Kubernetes, etc.), and Software as a Service (SaaS) solutions. Formulate HMG Information Assurance Risk … across IaaS, PaaS, SaaS and Serverless architectures Implementing Information Security and Privacy Standards and Frameworks (e.g. ISO 27k, NIST800-53, CIS, GDPR) Leading security working groups and external security testing (ITHC, PenetrationTesting, etc) of cloud solutions at high HMG classification levels (OFFICIAL required, SECRET desirable) or equivalent in other industries Designing & delivering secure systems & tooling: Working … and principles Working within environments utilising DevOps, DevSecOps, SRE, CI/CD, Infrastructure & Security as Code (Docker, Git, Terraform) Managing technical assessments of security related technologies, vulnerability assessments and penetration tools and techniques Enabling & informing risk-based decisions: Working with higher impact or more complex risks, advising on the impact and whether this is within risk tolerance Understanding and More ❯
Engineer, you will work on developing and implementing advanced cyber defense technologies, securing sensitive systems, and supporting risk management processes. You will ensure compliance with cybersecurity frameworks, lead cyber testing initiatives, and contribute to obtaining and maintaining Authority to Operate (ATO) within secure systems. What You'll Do: • Cyber Artifacts Management: Manage and assess cyber artifacts to ensure proper … documentation and readiness for cyber assessments. • Cyber Testing: Develop, execute, and analyze cyber testing efforts including penetration tests, vulnerability assessments, and cybersecurity audits. • Risk Management Framework (RMF) Implementation: Guide and support the implementation of the RMF process, including categorizing information systems, selecting security controls, and managing security control assessments. • STIG Compliance: Ensure systems are compliant with Security … and clients to ensure alignment with project goals and compliance with cybersecurity best practices. • Documentation & Reporting: Assist in the creation of technical documents, maintain a detailed record of cyber testing activities, and ensure accuracy in reports for security reviews. Key Responsibilities: • Manage and review cybersecurity artifacts for accuracy and compliance with government standards. • Develop detailed cyber testing scenarios More ❯
Für den Standort München suchen wir: SENIOR CYBER SECURITY PENETRATION TESTER (D/F/M) Your tasks: Execution of penetration tests on web applications, networks, cloud environments, and mobile applications, as well as participation in red team exercises Identification, exploitation, and documentation of vulnerabilities in compliance with ethical testing standards Development and implementation of security testing … may also have been acquired through other means. Advanced knowledge and experience in the above-mentioned areas of responsibility Advanced knowledge and experience in application, network, and cloud security testing Proven knowledge and experience with penetrationtesting tools (e.g., Burp Suite, Metasploit, Nmap, Kali Linux, Wireshark, etc.) and scripting experience for automation (Python, PowerShell, Bash, etc.) Strong More ❯
Manchester, North West, United Kingdom Hybrid / WFH Options
FryerMiles Recruitment
Penetration Tester - Manchester Hybrid - £50,000 - £60,000 (DOE) FryerMiles are delighted to be partnered with a leading cyber security consultancy that work with a diverse range of clients on exciting projects and engagements who are looking to hire an experienced penetration tester. This is hybrid position that requires office presence twice a week in the clients Manchester … a British Citizen and be eligible for SC Clearance, so unfortunately sponsorship cannot be offered for this position. Experience & Requirements: 2+ years of hands on experience working as a penetration tester in a consultative capacity Demonstratable experience in delivering Web Application and Infrastructure/cloud tests Relevant penetrationtesting certifications (OSCP, CRT, CCT) Experience of relevant toolings … such as Nessus, Qualys, Kali etc.. Experience mentoring or assisting junior/graduate testers Eligibility to be SC Cleared This client do pen testing differently & are not your typical offensive security consultancy & there are many perks and bonuses that are on offer. If you think this position could be a good fit for you, then please apply directly or More ❯
post-quantum cryptographic algorithms • System Administration and Engineering (15%) Support integrated quantum computing and classical computing environments Monitor and optimize system performance for quantum workloads 2) Security Implementation and Testing (25%): • Cryptographic Security Support (15%) Maintain classified and unclassified encryption systems Support cryptographic key management infrastructure Assist with security assessments of quantum communication protocols • Network Security and Testing (10%) Support penetrationtesting and vulnerability assessments Monitor and respond to security incidents in quantum environments Help maintain security protocols and compliance frameworks 3) System Administration (15%) • Linux System Administration (10%) Administer and optimize Linux-based quantum computing platforms Support system deployment and configuration management Monitor system performance and reliability metrics • Infrastructure Support (5%) Support virtualized and …/IP, basic routing protocols, and network troubleshooting • Basic understanding of encryption and cryptography concepts including symmetric/asymmetric encryption • Network configuration experience with switches, routers, and basic network testing • Some experience with virtualization or cloud platforms • Basic security monitoring and incident response knowledge • Strong problem-solving skills and ability to work collaboratively in a team environment • Effective communication More ❯
the software development lifecycle (SDLC). Automation: Develop automated security processes and tools to detect and prevent vulnerabilities in CI/CD pipelines. Vulnerability Management: Conduct regular vulnerability assessments, penetrationtesting, and ensure timely remediation of findings. Protect all company data, especially sensitive information, from internal and external threats by creating comprehensive defenses against potential intruders. Take charge More ❯
TCP/IP, routing protocols (BGP, OSPF), VLANs, and network troubleshooting • Strong encryption and cryptography background including symmetric/asymmetric encryption, PKI, and secure communication protocols • Network design and testing experience including performance optimization and security validation • Infrastructure implementation experience (virtualization, cloud platforms, HPC) • Security monitoring, incident response, and vulnerability assessment knowledge • Excellent problem-solving skills and ability to … Firewall and network encryptor experience (Juniper, Cisco, Fortinet) • Enterprise networking expertise with high-speed optical networks • Network protocol analysis and packet capture experience (Wireshark, tcpdump) • Experience in network performance testing and optimization • Understanding of quantum computing architectures and quantum error correction • Programming experience in Python, C++, or similar languages for network automation • Active TS/SCI clearance Physical Demands … Implement quantum key distribution (QKD) systems. Test and validate post-quantum cryptographic algorithms. Design integrated quantum and classical computing environments. Optimize system performance for quantum workloads. Security Implementation and Testing (25%) Manage classified and unclassified encryption systems. Implement and maintain cryptographic key management infrastructure. Conduct security assessments of quantum communication protocols. Perform penetrationtesting and vulnerability assessments. More ❯
Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetrationtesting, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving More ❯
Bristol, Kendleshire, Gloucestershire, United Kingdom Hybrid / WFH Options
SSR General & Management
and compliance with MOD and HMG security standards (JSP, Def Stan 05-138/139). Proficiency in security threat modeling and risk assessments. Knowledge of secure development practices, penetrationtesting, and vulnerability assessments. Ability to communicate security risks and strategies to technical and non-technical stakeholders. Experience in incident response and remediation. Strong analytical and problem-solving More ❯
essential condition of employment. Responsibilities What You'll Do Lead the implementation and management of SIEM systems, Fortinet tools, and endpoint detection & response (EDR) solutions. Conduct vulnerability assessments and penetrationtesting to stay ahead of cyber threats. Strengthen identity and access management (IAM) through Active Directory, Entra ID, MFA, and Zero Trust principles. Safeguard networks with advanced VPN More ❯
Bradford, West Yorkshire, Yorkshire, United Kingdom Hybrid / WFH Options
Yorkshire Water
Cyber Security Operations role. Experience in information security incident response & investigations. A good knowledge of General Data Protection regulations (UK-GDPR) Experience working with legal, audit and compliance teams. Penetrationtesting support. On call Requirement: There will be an element of compensated periodic on-call in this roll. Once you are settled in role, you will join the More ❯
security of NHSCFA ICT infrastructure and information systems. You will work to proactively monitor IT systems; identify, manage and resolve security incidents, vulnerabilities, security alerts and threats; potentially perform penetrationtesting; and contribute to maintaining security certifications, assurances and accreditations. Potential applicants can contact Simon Clark at simon.clark@nhscfa.gov.uk for an informal chat if they have any questions … assist the team with identifying and resolving security incidents, vulnerabilities and risks. This can include, but is not limited to, proactively monitoring ICT systems, analysing firewall rules and performing penetration tests. They will maintain a solid knowledge of the information security principles and practices, ensuring that timely technical support is provided to satisfy the organisation's business needs. About More ❯
Security Classification Assessor Test Engineer (SCATE) Level 1 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 1. We are looking for a security professional who reviews and evaluates Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can perform … Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetrationtesting and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools More ❯
Security Classification Assessor Test Engineer (SCATE) Level 3 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 3. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can … Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetrationtesting and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools More ❯
Security Classification Assessor Test Engineer (SCATE) Level 2 - Penetration Tester LV8D Solutions is looking for a Security Classification Assessor Test Engineer (SCATE) Level 2. We are looking for a security professional who reviews and evaluates NRO Information Systems (IS) and recommends to the Government changes that can improve information confidentiality, integrity, and availability as well as someone who can … Unix, Mac OS, and other operating systems Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms Software engineering Program design and implementation Configuration management System maintenance Integration testing Information system engineering Penetrationtesting and analysis System certification activities and efforts related to system certification and accreditation Research, development, integration, and distribution of IS security tools More ❯
Unix, Mac OS, and other operating systems • Configuring and supporting VMware, Xen, Hyper V and other virtualization platforms • Software engineering • Program design and implementation • Configuration management • System maintenance • Integration testing • Information system engineering • Penetrationtesting and analysis • System certification activities and efforts related to system certification and accreditation • Research, development, integration, and distribution of IS security tools More ❯